Логотип exploitDog
bind:CVE-2016-4991
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-4991

Количество 2

Количество 2

nvd логотип

CVE-2016-4991

больше 3 лет назад

Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-p7w2-cg47-7v79

больше 3 лет назад

Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-4991

Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-p7w2-cg47-7v79

Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу