soyuka/pidusage <=1.1.4 is vulnerable to command injection in the module resulting in arbitrary command...
9.8CVSS
9.7AI Score
0.003EPSS
This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input...
7.3CVSS
7.4AI Score
0.001EPSS