Cherokee CVE-2014-4668 Authentication Bypass Vulnerability

Cherokee is prone to an authentication-bypass vulnerability.

An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks.

Cherokee 1.2.103 and prior are vulnerable.


 

Privacy Statement
Copyright 2010, SecurityFocus