Avoid potential remote code execution through the `parameters` parameter. They were concatenated to the capture command String directly, which could lead to the injection of malicious code. Currently the problem isn't exposed because the potential attacker can't control the contents of the `parameters` map, since their contents are chosen from a limited set of values. |
||
|---|---|---|
| .. | ||
| src | ||
| pom.xml | ||