CVE-2021-23363
30.03.2021, 15:15
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Vendor | Product | Version |
---|---|---|
kill-by-port_project | kill-by-port | 𝑥 < 0.0.2 |
𝑥
= Vulnerable software versions
References