Regarding the security classification, I'm leaning toward not calling it a vulnerability. It could be a DoS, but only by an authenticated user. There is also no privilege escalation or information leakage.
Thoughts from other VMT members?
Regarding the security classification, I'm leaning toward not calling it a vulnerability. It could be a DoS, but only by an authenticated user. There is also no privilege escalation or information leakage.
Thoughts from other VMT members?