logo

Database

Description

It is possible to access information about some of the company employees, such as their roles and contact information.

Impact

Obtain information about the role played by some workers within the company. As well as their contact information.

Recommendation

Establish controls to prevent an attacker from accessing the organizations corporate information.

Threat

Attacker with access to the application from the Internet.

Expected Remediation Time

⏱️ 45 minutes.

Score

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

Attack vector

N

Attack complexity

L

Attack requirements

N

Privileges required

L

User interaction

N

Confidentiality (VC)

L

Integrity (VI)

N

Availability (VA)

N

Confidentiality (SC)

N

Integrity (SI)

N

Availability (SA)

N

Threat 4.0

Exploit maturity

X

Vector string

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N