Command Injection
A vulnerability that involves the execution of arbitrary commands in a host operating system (OS) resulting from insufficient input validation.


A vulnerability that involves the execution of arbitrary commands in a host operating system (OS) resulting from insufficient input validation.