command injection vulnerability
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
Are there any links users can visit to find out more?
If you have any questions or comments about this advisory: * Open an issue in systeminformation
{
"severity": "HIGH",
"cwe_ids": [
"CWE-78"
],
"nvd_published_at": "2020-10-26T17:15:00Z",
"github_reviewed": true,
"github_reviewed_at": "2020-10-27T20:30:03Z"
}