All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
[
{
"product": "curling.js",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
}
]