The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
bd facschorus 5.0 |
||
bd facschorus 5.1 |
||
bd facschorus 3.0 |
||
bd facschorus 3.1 |