Description
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0973 | The issue occurs because tagName user input is formatted inside the exec function is executed without any checks. |
Github GHSA |
GHSA-6m8p-4fxj-pgc2 | OS Command Injection in mversion |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T22:40:15.601Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7688
No data.
Status : Modified
Published: 2020-07-01T17:15:14.250
Modified: 2024-11-21T05:37:36.867
Link: CVE-2020-7688
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA