2 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s). • https://advisory.checkmarx.net/advisory/CX-2021-4811 https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/src/index.ts#L211-L217 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands. El paquete gnuplot versiones anteriores 0.1.0 para Node.js permite una ejecución de código por medio de metacaracteres de shell en los comandos Gnuplot. • https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de https://www.npmjs.com/package/%40rkesters/gnuplot • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •