A authenticated attacker can execute arbitrary code using command ejection.
Filter
Select a date
Search by vendor
Materials
Advisories RSS feed