The big one here is "remote code execution" - the ability for a remote (ie, not on the box) attacker to run _whatever the hell code they want_ that the box can run.
Short answer - no real limit - if the machine can run it, the attackers can load/run it.
Short answer - no real limit - if the machine can run it, the attackers can load/run it.
Statistics: Posted by fnord — 2024-03-21 12:08pm