CVE-2003-1160

FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:seyeon:flexwatch_network_video_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:seyeon:flexwatch_network_video_server:model_132:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://packetstormsecurity.nl/0310-exploits/FlexWATCH.txt - Exploit () http://packetstormsecurity.nl/0310-exploits/FlexWATCH.txt - Exploit
References () http://secunia.com/advisories/10132 - Exploit, Vendor Advisory () http://secunia.com/advisories/10132 - Exploit, Vendor Advisory
References () http://securitytracker.com/id?1008049 - Exploit () http://securitytracker.com/id?1008049 - Exploit
References () http://www.osvdb.org/2842 - Patch, Vendor Advisory () http://www.osvdb.org/2842 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/8942 - Exploit () http://www.securityfocus.com/bid/8942 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/13567 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/13567 -

Information

Published : 2003-10-30 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1160

Mitre link : CVE-2003-1160

CVE.ORG link : CVE-2003-1160


JSON object : View

Products Affected

seyeon

  • flexwatch_network_video_server