Description
  The system presents unexpected behavior when the inputs of a specific functionality do not arrive in the expected order.
  Impact
  - Overwrite, delete or read arbitrary files from the system.
- Cause unexpected behavior in the application.
  Recommendation
  Ensure that the verification and use of inputs must be realized at the same time or in an atomic way.
  Threat
  Anonymous attacker in the system.
  Expected Remediation Time
  ⌚ 30 minutes.
  Score
  Default score using CVSS 3.1. It may change depending on the context of the src.
  Base
  
      - Attack vector: L
- Attack complexity: L
- Privileges required: N
- User interaction: N
- Scope: U
- Confidentiality: L
- Integrity: L
- Availability: N
Temporal
  
      - Exploit code maturity: P
- Remediation level: X
- Report confidence: R
Result
  
      - Vector string: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:X/RC:R
- Score:
- Severity:
          - Base: Medium
- Temporal: Medium
Score 4.0
  Default score using CVSS 4.0. It may change depending on the context of the src.
  Base 4.0
  
      - Attack vector: L
- Attack complexity: L
- Attack Requirements: P
- Privileges required: N
- User interaction: N
- Confidentiality (VC): L
- Integrity (VI): L
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
  
  Result 4.0
  
      - Vector string: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
- Score:
- Severity:
Requirements
  
  Fixes
  
  
  
       
              Free trial