The following table lists the changes that have been made to the
CVE-2024-27980 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jan. 09, 2025
Action Type Old Value New Value Added Description Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled. Added CVSS V3 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Added Reference http://www.openwall.com/lists/oss-security/2024/04/10/15 Added Reference http://www.openwall.com/lists/oss-security/2024/07/11/6 Added Reference http://www.openwall.com/lists/oss-security/2024/07/19/3 Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/5MZN6PFXHTCCUENAKZXTGWPKUAHI6E2W/ Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/JUWBYDVCUSCX7YWTBX75LADMCVYFBGKU/