CVE-2020-2842502.08.2022, 14:15This affects all versions of package curljs.Command InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7.3 HIGHNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LsnykCNA7.3 HIGHNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:PCVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 24%VendorProductVersioncurljs_projectcurljs*𝑥= Vulnerable software versionsKnown Exploits!https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404Common Weakness EnumerationCWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Referenceshttps://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404