The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
2023-11-28T21:15:07.990
2024-11-21T07:56:29.387
Modified
CVSSv3.1: 4.1 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? | 
|---|---|---|---|---|
| Application | bd | facschorus | 5.0 | Yes | 
| Application | bd | facschorus | 5.1 | Yes | 
| Hardware | hp | hp_z2_tower_g9 | - | No | 
| Application | bd | facschorus | 3.0 | Yes | 
| Application | bd | facschorus | 3.1 | Yes | 
| Hardware | hp | hp_z2_tower_g5 | - | No |