roar-pidusage@1.1.4 vulnerabilities

Cross-platform process cpu % and memory usage of a PID — Edit

Direct Vulnerabilities

Known vulnerabilities in the roar-pidusage package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Arbitrary Command Injection

roar-pidusage is a Cross-platform process cpu % and memory usage of a PID — Edit

Affected versions of this package are vulnerable to Arbitrary Command Injection. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.

How to fix Arbitrary Command Injection?

There is no fixed version for roar-pidusage.

*