2025-09-29 16:08:36 +00:00
### [CVE-2024-27980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27980)
2025-09-29 21:09:30 +02:00




















2025-09-29 16:08:36 +00:00
### Description
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2025-09-29 16:08:36 +00:00
- https://github.com/Cybervixy/Vulnerability-Management
- https://github.com/Oju-kwu/Vulnerability-Management-Lab
- https://github.com/Oluwaseun-Joseph/Credentialed-Vulnerability-Assessment-Lab
- https://github.com/Teedico/Nessus_Vulnerability_Assessment
- https://github.com/ardhi/get-global-path
2025-09-29 21:09:30 +02:00
- https://github.com/sharmapintu987654321-boop/Nessus-Scan-Reports
2025-09-29 16:08:36 +00:00
- https://github.com/tanjiti/sec_profile
- https://github.com/tianstcht/tianstcht