Command Injection
A security vulnerability that allows attackers to execute arbitrary operating system commands on the host system through a vulnerable application.
A security vulnerability that allows attackers to execute arbitrary operating system commands on the host system through a vulnerable application.