Insecure file retrieval process that facilitates potential for file manipulation to affect product stability and confidentiality, integrity, authenticity, and attestation of stored data.
Exploitability
AV:LAC:LAT:NPR:NUI:NVulnerable System
VC:NVI:LVA:LSubsequent System
SC:NSI:NSA:N5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:NOther