2022-10-27 16:53:00
ForgeRock
PUBLISHED
An attacker can use the unrestricted LDAP queries to determine configuration entries