Seal Security raises $13M series A to secure open source code at scale
.
Read full press release.
Product
Product
Seal Apps
Seal OS
Seal Base Images
Solutions
Secure open source vulnerabilities
Secure containers and base images
Secure legacy code
Secure EOL code
Uphold compliance & SLAs
Resources
Documentation
Integrations
Resource center
Blog
FAQ
Company
About
Careers
Contact us
News
Security & trust
Partner program
Pricing
Contact us
Book a demo
View all vulnerabilities
CVE-2016-10745
Jinja2 sandbox escape vulnerability
Description
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
Patch Available
Fix available through Seal Security. No upgrade required, protect your application instantly.
Fix without upgrading
Vulnerability Details
Score
8.5
Score Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Affected Versions
jinja2 < 2.8.1
Severity
High
High
High
Ecosystem
Python
Publish Date
April 10, 2019
Modified Date
September 24, 2024