Summary
eXtplorer is prone to an authentication-bypass vulnerability.
Remote attackers can exploit this issue to bypass the authentication mechanism and gain unauthorized access.
eXtplorer 2.1.2, 2.1.1, and 2.1.0 are vulnerable.
Solution
Updates are available
please see the references for more information.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 9.7
AV:N/AC:L/Au:N/C:C/I:C/A:P
Related Vulnerabilities
- Astium VoIP PBX SQL Injection Vulnerability
- Atutor AChecker Multiple SQL Injection and XSS Vulnerabilities
- ALCASAR Remote Code Execution Vulnerability
- 3Com OfficeConnect VPN Firewall Default Password Security Bypass Vulnerability
- Atlassian JIRA Privilege Escalation and Multiple Cross Site Scripting Vulnerabilities