An attacker can abuse a vulnerability to launch a shell with root privileges on most Linux machines just by holding the ‘Enter’ key for 70 seconds. Researchers Hector Marco & Ismael Ripoll unveiled ...
Of all the Linux commands, rm is notorious. It's easy to completely wipe out your system with one mislaid rm command as root.