Description


Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.

Related CPE's



o

debian

debian_linux

3

o

fedoraproject

fedora

3

Weaknesses



CWE-287


CWE-287

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 · Critical

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2022-03-03T22:15:08.253Z

4 years ago

Last modified

2024-11-21T05:39:16.730Z

1 year ago