-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the unescaped interpolation of user-controlled variables into a shell command in the main function. The commit b4021d7 explicitly adds shlex.quote() to these parameters, confirming the lack of sanitization was the root cause. The function's direct use of user input in a shell command execution context (subprocess.call with shell=True) creates the injection vector. All vulnerability descriptions and patch analysis specifically reference this function as the attack surface.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dcnnt | pip | <= 0.9.0 | 0.9.1 |
KEV Misses 88% of Exploited CVEs- Get the report