Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:36844
HistoryAug 30, 2022 - 5:44 a.m.

Remote Code Execution

2022-08-3005:44:50
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
10
remote code execution
improper input sanitization
vulnerable software

0.005 Low

EPSS

Percentile

75.9%

@pendo324/get-process-by-name is vulnerable to remote code execution. The vulnerability exists due to the improper sanitizations of user input passed to the getProcessByName function, which allows remote attackers to inject and execute malicious code.

0.005 Low

EPSS

Percentile

75.9%

Related for VERACODE:36844