CVE-2020-2845102.08.2022, 14:15This affects the package image-tiler before 2.0.2.Command InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HsnykCNA9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:PCVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 33%VendorProductVersionimage-tiler_projectimage-tiler𝑥< 2.0.2𝑥= Vulnerable software versionsKnown Exploits!https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029Common Weakness EnumerationCWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Referenceshttps://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8https://security.snyk.io/vuln/SNYK-JS-IMAGETILER-1051029