The software does not neutralize or incorrectly neutralizes output that is written to logs.This can allow an attacker to forge log entries or inject malicious content into logs.Log forging vulnerabilities occur when: