Vigilance.fr - ucf: code execution via Command Injection, analyzed on 21/01/2025
An attacker can use a vulnerability of ucf, via Command Injection, in order to run code. - Security Vulnerability

An attacker can use a vulnerability of ucf, via Command Injection, in order to run code.