CVE-2024-3566

EUVD-2024-32152
A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
Affected Products (NVD)
VendorProductVersion
golanggo
*
haskellprocess_library
1.6.19.0
nodejsnode.js
𝑥
≤ 21.7.2
phpphp
*
rust-langrust
1.77.2
yt-dlp_projectyt-dlp
*
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
nodejsnodejs
𝑥
≤ 21.7.2
ADP
haskellprocess_library
𝑥
< 1.6.19.0
ADP
rust-langrust
𝑥
< 1.77.2
ADP
thephpgroupthephpgroup
𝑥
< *
ADP
yt-dlp_projectyt-dlp
𝑥
< *
ADP
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bookworm
18.20.4+dfsg-1~deb12u1
fixed
bookworm (security)
18.20.4+dfsg-1~deb12u1
fixed
bullseye
12.22.12~dfsg-1~deb11u4
fixed
bullseye (security)
12.22.12~dfsg-1~deb11u7
fixed
forky
22.21.1+dfsg+~cs22.19.0-6
fixed
sid
22.21.1+dfsg+~cs22.19.0-6
fixed
trixie
20.19.2+dfsg-1
fixed