描述
The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
AI分析AI驱动
受影响产品
bdfacschorus
5.0
bdfacschorus
5.1
hphp_z2_tower_g9
-
bdfacschorus
3.0
bdfacschorus
3.1
hphp_z2_tower_g5
-