command injection vulnerability
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency()
If you have any questions or comments about this advisory: * Open an issue in systeminformation
{ "nvd_published_at": null, "github_reviewed_at": "2020-12-16T19:24:51Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-78" ] }