2025-09-24 09:04:22
CERTVDE
PUBLISHED
The database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it.