Invicti identified a Command Injection, which occurs when input data is interpreted as an operating system command.
This is a highly critical issue and should be addressed as soon as possible.
An attacker can execute arbitrary commands on the system.
Before invoking system commands within an application, consider using an API which allows you to separate commands and parameters. This can avoid many of the problems associated with command execution. See the external references for some examples. If this is not possible, whitelist all input and encode it in accordance with the underlying subsystem. (e.g. if it is Windows, then you need to escape from cmd.exe control characters)

You can search and find all vulnerabilities
