A authenticated attacker can execute arbitrary code using command ejection.

Filter

Select a date

Search by vendor

Select a date

Search by vendor

Filter