Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.
References
Configurations
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/17089 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18626 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200601-15.xml - | |
References | () http://www.securityfocus.com/archive/1/423446/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/15141 - Patch | |
References | () http://www.zone-h.com/en/advisories/read/id=8286/ - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22557 - |
Information
Published : 2005-10-23 10:02
Updated : 2025-04-03 01:03
NVD link : CVE-2005-3280
Mitre link : CVE-2005-3280
CVE.ORG link : CVE-2005-3280
JSON object : View
Products Affected
paros
- paros
CWE