Contact us:
Login | Register

Finding Command Injection

Published: 07 June 2021    Last Updated: 03 November 2022

Command Injection vulnerabilities occur where user supplied input is insecurely included within an operating system command, allowing an attacker to execute additional commands or alter the syntax of the executed command. This vulnerability typically allows for confidential data theft and may allow a threat actor to target internal network connections for further attacks.

Continue Reading