From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability ID: CVE-2023-6117 2. Vulnerability Description: M-Files REST API allows Denial of Service (DoS) attacks. Exploiting outdated functionality, attackers can perform DoS attacks, leading to server memory consumption. 3. Affected Product: M-Files Server before 23.11.13156.0 4. Additional Information: - REST API methods used for uploading and sharing files to Drive may lead to DoS attacks if large files are asynchronously loaded. - CVSS 3.1 Base Score: 5.7 - CVSS 3.1 Temporal Score: 4.9 - CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:R - CWE: CWE-770 Allocation of Resources Without Limits or Throttling - CAPEC: CAPEC-130 Excessive Allocation - Internal IDs: 167126, 167119 - Release Date: 2023-11-22 5. Exploitability: - Public Disclosure: No - Exploit Available: No - Exploit Likelihood: Low – Internally discovered 6. Links: - Detailed information for CVE-2023-6117: https://www.cve.org/CVERecord?id=CVE-2023-6117 7. History: - Release Date: 2023-11-22 - CWE Update Date: 2024-08-28 This information provides a detailed description of the vulnerability, affected products, assessment scores, exploit likelihood, related links, and historical records.