CVE-2024-3566

A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:haskell:process_library:1.6.19.0:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:rust-lang:rust:1.77.2:*:*:*:*:*:*:*
cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

18 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2024/CVE-2024-3566 -

Information

Published : 2024-04-10 16:15

Updated : 2025-11-18 18:16


NVD link : CVE-2024-3566

Mitre link : CVE-2024-3566

CVE.ORG link : CVE-2024-3566


JSON object : View

Products Affected

golang

  • go

php

  • php

nodejs

  • node.js

microsoft

  • windows

yt-dlp_project

  • yt-dlp

haskell

  • process_library

rust-lang

  • rust
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')