ID CVE-2003-1160
Summary FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
References
Vulnerable Configurations
  • cpe:2.3:a:seyeon:flexwatch_network_video_server:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:seyeon:flexwatch_network_video_server:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:seyeon:flexwatch_network_video_server:model_132:*:*:*:*:*:*:*
    cpe:2.3:a:seyeon:flexwatch_network_video_server:model_132:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 11-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 8942
misc http://packetstormsecurity.nl/0310-exploits/FlexWATCH.txt
osvdb 2842
sectrack 1008049
secunia 10132
xf flexwatch-slash-admin-access(13567)
Last major update 11-07-2017 - 01:29
Published 30-10-2003 - 05:00
Last modified 11-07-2017 - 01:29
Back to Top