Total vulnerabilities in the database
Vulnerability in (1) Book of guests and (2) Post it! allows remote attackers to execute arbitrary code via shell metacharacters in the email parameter.
Software | From | Fixed in |
---|---|---|
seth_leonard / post_it | - | - |
seth_leonard / book_of_guests | - | - |