@pendo324/get-process-by-name is vulnerable to remote code execution. The vulnerability exists due to the improper sanitizations of user input passed to the getProcessByName
function, which allows remote attackers to inject and execute malicious code.
CPE | Name | Operator | Version |
---|---|---|---|
@pendo324/get-process-by-name | le | 1.0.1 | |
@pendo324/get-process-by-name | le | 1.0.1 |