From what I understand, this allows arbitrary command execution. So, an attacker can specify a string of text that something on the affected system will just plop into a command line and execute.
somtwo
joined 1 year ago
When all the infrastructure is gone, let the user decide between starving and eating shit.
Mind giving a summary for the rest of us?