>                %(exec procedure_name)
This opens a possible attack vector, though not easy to exploit reliably,
if said scripts are not carefully designed. exec's also a name with certain
connotations, eval or pipe are closer to the behavior described.

_______________________________________________
Nmh-workers mailing list
Nmh-workers@nongnu.org
https://lists.nongnu.org/mailman/listinfo/nmh-workers

Reply via email to