Skip to content

Code execution vulnerability #2

@ghost

Description

In your code, you are using the function eval(), which allows the user to execute any python code inputted, like __import__('os').system('whoami') .

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions