Description
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Remediation
References
https://github.com/es128/serial-number/blob/master/index.js#L106
https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010
Related Vulnerabilities
CVE-2019-12384 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2018-1000136 Vulnerability in npm package electron
CVE-2020-7706 Vulnerability in npm package connie-lang
CVE-2021-3632 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2023-22467 Vulnerability in maven package org.webjars.bowergithub.moment:luxon