2 lines
204 B
Plaintext
2 lines
204 B
Plaintext
![]() |
The following code is vulnerable to command injections because it is using untrusted inputs to set up a new process.
|
||
|
Therefore an attacker can execute an arbitrary program that is installed on the system.
|