Technology ❯ Cybersecurity ❯ Vulnerabilities ❯ Command Injection
Researchers tie two of the bugs to leftover debug code from an earlier fix.