jiacrontab 1.4.5 allows remote attackers to execute arbitrary commands via the crontab/task/edit?addr=localhost%3a20001 command and args parameters, as demonstrated by command=cat&args=/etc/passwd in the POST data.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19793.json"