@pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution
Critical severity
GitHub Reviewed
Published
Aug 29, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Aug 29, 2022
Published to the GitHub Advisory Database
Aug 29, 2022
Reviewed
Sep 16, 2022
Last updated
Jan 27, 2023
All versions of package @pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution due to improper sanitization of getProcessByName function.
References