Total vulnerabilities in the database
Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.
Software | From | Fixed in |
---|---|---|
great_circle_associates / majordomo | 1.90 | 1.90.x |
great_circle_associates / majordomo | 1.91 | 1.91.x |