logo

Database

Description

The system uses the version of a software or dependency with known vulnerabilities.

Impact

Exploit found vulnerabilities in the affected components.

Recommendation

Update the affected software to the versions recommended by the vendor.

Threat

Authenticated attacker from the Internet.

Expected Remediation Time

⏱️ 60 minutes.