Summary
eXtplorer is prone to an authentication-bypass vulnerability.
Remote attackers can exploit this issue to bypass the authentication mechanism and gain unauthorized access.
eXtplorer 2.1.2, 2.1.1, and 2.1.0 are vulnerable.
Solution
Updates are available
please see the references for more information.
References
Updated on 2015-03-25