{"uuid": "3657f15f-8d5b-460c-a081-9a49c8a3d9ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45390", "type": "seen", "source": "https://t.me/cvedetector/4718", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45390 - Template James Bond\", \n  \"Content\": \"CVE ID : CVE-2024-45390 \nPublished : Sept. 3, 2024, 8:15 p.m. | 35\u00a0minutes ago \nDescription : @blakeembrey/template is a string template library. Prior to version 1.2.0, it is possible to inject and run code within the template if the attacker has access to write the template name. Version 1.2.0 contains a patch. As a workaround, don't pass untrusted input as the template display name, or don't use the display name feature. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T23:19:50.000000Z"}