2022-10-24 11:52:16 +02:00
|
|
|
OS command injections occur when applications build command lines from
|
|
|
|
untrusted data before executing them with a system shell. +
|
|
|
|
In that case, an attacker can tamper with the command line construction and
|
|
|
|
force the execution of unexpected commands. This can lead to the compromise of
|
|
|
|
the underlying operating system.
|
2022-08-05 15:17:13 +02:00
|
|
|
|