CVE-2020-28425EUVD-2022-654202.08.2022, 14:15This affects all versions of package curljs.Command InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTPrimary7.3 HIGHNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LsnykCNA7.3 HIGHNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:PBase ScoreCVSS 3.xEPSS ScorePercentile: 65%Affected Products (NVD)VendorProductVersioncurljs_projectcurljs*𝑥= Vulnerable software versionsKnown Exploits!https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404Common Weakness EnumerationCWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Referenceshttps://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404