An authenticated attacker with high privilege can use...
Low severity
Unreviewed
Published
Sep 10, 2024
to the GitHub Advisory Database
•
Updated Sep 10, 2024
Description
Published by the National Vulnerability Database
Sep 10, 2024
Published to the GitHub Advisory Database
Sep 10, 2024
Last updated
Sep 10, 2024
An authenticated attacker with high privilege can use functions of SLCM transactions to which access should be restricted. This may result in an escalation of privileges causing low impact on integrity of the application.
References