First, it addressed an OS command injection vulnerability, caused by insufficient validation of user-supplied input, found in ...