This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|roar-pidusage_project:roar-pidusage||roar-pidusage project roar-pidusage||*|
Arbitrary Code Execution
Arbitrary command execution in roar-pidusage