CVE-2021-23348
31.03.2021, 15:15
This affects the package portprocesses before 1.0.5. If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Vendor | Product | Version |
---|---|---|
portprocesses_project | portprocesses | 𝑥 < 1.0.5 |
𝑥
= Vulnerable software versions