More Sources
Tools & Data
The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.