1 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Esto afecta a todas las versiones del paquete onion-oled-js. Si es proporcionada una entrada de usuario controlada por un atacante para la función scroll, es posible para un atacante ejecutar comandos arbitrarios. • https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91 https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •