When a CL script invokes a program by name, the so-called Library List is searched for a object with a matching name.
The following picture demonstrates the vulnerability: the program object is invoked based on the Library List: Read More
When a CL script invokes a program by name, the so-called Library List is searched for a object with a matching name.
The following picture demonstrates the vulnerability: the program object is invoked based on the Library List: Read More