ImageMagick < 6.9.3-9 - Multiple Vulnerabilities

ImageMagick allows to process files with external libraries. This
feature is called ‘delegate’. It is implemented as a system() with
command string (‘command’) from the config file delegates.xml with
actual value for different params (input/output filenames etc). Due to
insufficient %M param filtering it is possible to conduct shell command
injection. One of the default delegate’s command is used to handle https

(link removed by moderator)

We’re closing this thread as off-topic and blanking the link. You’re all welcome to discuss the implications of certain real-life exploits or to roleplay about them, but this is just a link to an actual exploit without further context. Feel free to make another thread with a prompt for actual discussion.