Detailed analysis of security vulnerabilities
Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.
Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.