2024-09-10 08:42:55
CERTVDE
PUBLISHED
An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.