Search
❯
Feb 08, 20261 min read
similar to code injection attacks but where the injection executes an OS command