CVE-2005-3280

Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:paros:paros:3.2.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://secunia.com/advisories/17089 - Patch, Vendor Advisory () http://secunia.com/advisories/17089 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18626 - () http://secunia.com/advisories/18626 -
References () http://www.gentoo.org/security/en/glsa/glsa-200601-15.xml - () http://www.gentoo.org/security/en/glsa/glsa-200601-15.xml -
References () http://www.securityfocus.com/archive/1/423446/100/0/threaded - () http://www.securityfocus.com/archive/1/423446/100/0/threaded -
References () http://www.securityfocus.com/bid/15141 - Patch () http://www.securityfocus.com/bid/15141 - Patch
References () http://www.zone-h.com/en/advisories/read/id=8286/ - Exploit, Patch, Vendor Advisory () http://www.zone-h.com/en/advisories/read/id=8286/ - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22557 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22557 -

Information

Published : 2005-10-23 10:02

Updated : 2025-04-03 01:03


NVD link : CVE-2005-3280

Mitre link : CVE-2005-3280

CVE.ORG link : CVE-2005-3280


JSON object : View

Products Affected

paros

  • paros