Details
An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
Vulnerable Systems:
Cisco Prime Infrastructure
CVE Information:
Disclosure Timeline:
Published Date:6/3/2020