All versions of package @pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution due to improper sanitization of getProcessByName function.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2022-08-29T05:05:10.294812Z
Updated: 2024-09-17T02:16:05.364Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-25644
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2022-08-29T05:15:08.257
Modified: 2023-08-08T14:21:49.707
Link: CVE-2022-25644
Redhat
No data.