The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about OS Command Injection vulnerabilities in an interactive lesson.
Start learningUpgrade Debian:unstable
hugo
to version 0.79.1-1 or higher.
Note: Versions mentioned in the description apply only to the upstream hugo
package and not the hugo
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's os/exec
for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system %PATH%
on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (exe
or bat
) is found in the current working directory at the time of running hugo
, the malicious command will be invoked instead of the system one. Windows users who run hugo
inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.