CVE-2024-44623

An issue in TuomoKu SPx-GC v.1.3.0 and before allows a remote attacker to execute arbitrary code via the child_process.js function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spx:spx_graphics_controller:*:*:*:*:*:*:*:*

History

25 Sep 2024, 14:53

Type Values Removed Values Added
CWE CWE-94
CPE cpe:2.3:a:spx:spx_graphics_controller:*:*:*:*:*:*:*:*
References () https://github.com/TuomoKu/SPX-GC - () https://github.com/TuomoKu/SPX-GC - Product
References () https://github.com/merbinr/CVE-2024-44623 - () https://github.com/merbinr/CVE-2024-44623 - Third Party Advisory
References () https://github.com/TuomoKu/SPX-GC/blob/v.1.3.0/routes/routes-api.js#L39 - () https://github.com/TuomoKu/SPX-GC/blob/v.1.3.0/routes/routes-api.js#L39 - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Spx spx Graphics Controller
Spx

16 Sep 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-16 16:15

Updated : 2024-09-25 14:53


NVD link : CVE-2024-44623

Mitre link : CVE-2024-44623


JSON object : View

Products Affected

spx

  • spx_graphics_controller
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')