logo

Database

Description

One or more dependencies used in the project contains code or components suspected of being compromised by malware or malicious behavior.

Impact

- Unauthorized access and complete control of the application infrastructure. - Disruption of critical services and loss of availability. - Possible spread of malware to other applications, servers or networks, increasing the magnitude of the attack.

Recommendation

- Review the origin and integrity of affected dependencies. - Upgrade to secure versions or alternatives without known risks. - Perform security audits and code analysis for vulnerabilities. - Perform additional testing to verify that there are no compromises in the production environment.

Threat

Authenticated attacker from the Internet.

Expected Remediation Time

⏱️ 60 minutes.

Fixes