The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. The manipulation with an unknown input leads to a privilege escalation vulnerability. This affects an unknown code of the component Template Handler. ![]() A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in pug up to 2.0.2/3.0.0 on npm ( NPM Package). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |