somtwo

joined 1 year ago
[–] somtwo@lemmy.world 3 points 1 week ago (1 children)

Mind giving a summary for the rest of us?

[–] somtwo@lemmy.world 4 points 1 month ago

From what I understand, this allows arbitrary command execution. So, an attacker can specify a string of text that something on the affected system will just plop into a command line and execute.

[–] somtwo@lemmy.world 9 points 11 months ago (1 children)

When all the infrastructure is gone, let the user decide between starving and eating shit.