Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions. Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution

ProtonVPN Blog

All the latest privacy news and features from the Proton VPN team. Learn how we protect online privacy, security, and freedom through technology.