A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis