http://www.w3.org/ns/prov#value | - This vulnerability allows remote attackers to execute arbitrary code on the system, and can result in the attacker being able to erase intrusion evidence from system and application logs.[R.23.2] Attacker Skills or Knowledge RequiredSkill or Knowledge Level: Medium Solutions and MitigationsDesign: Enforce principle of least privilegeDesign: Validate all input for content including files.
|