ID CVE-2005-3280
Summary Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.
References
Vulnerable Configurations
  • cpe:2.3:a:paros:paros:3.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:paros:paros:3.2.5:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2018 - 15:35)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 15141
bugtraq 20060130 Re: [Full-disclosure] [ GLSA 200601-15 ] Paros: Default administrator password
gentoo GLSA-200601-15
misc http://www.zone-h.com/en/advisories/read/id=8286/
secunia
  • 17089
  • 18626
xf paros-password-security-bypass(22557)
Last major update 19-10-2018 - 15:35
Published 23-10-2005 - 10:02
Last modified 19-10-2018 - 15:35
Back to Top