> %(exec procedure_name) This opens a possible attack vector, though not easy to exploit reliably, if said scripts are not carefully designed. exec's also a name with certain connotations, eval or pipe are closer to the behavior described.
_______________________________________________ Nmh-workers mailing list Nmh-workers@nongnu.org https://lists.nongnu.org/mailman/listinfo/nmh-workers