Solving RCE via argument injection
This exercise covers a remote command execution vulnerability in which an attacker can only inject arguments
This exercise covers a remote command execution vulnerability in which an attacker can only inject arguments