logo

Database

Description

Some features of the application do not properly keep track of errors, exceptional events or critical actions on the system, hidering the detection of possible security events.

Impact

Lose the tracking of exceptional events and fail to detect potential security breaches.

Recommendation

Set alerts for errors, events and critical actions using the mechanisms available by the technology stack.

Threat

Unauthorized internal attacker.

Expected Remediation Time

⏱️ 30 minutes.

Score

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

Attack vector

N

Attack complexity

H

Attack requirements

N

Privileges required

H

User interaction

N

Confidentiality (VC)

L

Integrity (VI)

N

Availability (VA)

N

Confidentiality (SC)

N

Integrity (SI)

N

Availability (SA)

N

Threat 4.0

Exploit maturity

P

Vector string

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P