2 lines
204 B
Plaintext
2 lines
204 B
Plaintext
The following code is vulnerable to command injections because it is using untrusted inputs to set up a new process.
|
|
Therefore an attacker can execute an arbitrary program that is installed on the system. |