This affects the package kill-by-port before 0.0.2.
If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands.
This is due to use of the child_process exec function without input sanitization.

Source: CVE-2021-23363

댓글 남기기

이메일은 공개되지 않습니다. 필수 입력창은 * 로 표시되어 있습니다

Time limit is exhausted. Please reload the CAPTCHA.