Exploitation would fundamentally undermine the security of affected
systems, enable actors to perform significant attacks with minimal
effort, with little to no mitigating factors to overcome.
High
Exploitation would enable attackers to have a notable direct impact
without needing to overcome any major mitigating factors.
Low
Exploitation would have little to no security impact.
Medium
Exploitation would enable attackers to perform activities, or could allow
attackers to have a direct impact, but would require additional steps.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-11-06 UTC."],[],[]]