Vulnerability Description
FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Seyeon | Flexwatch Network Video Server | 2.2 |
References
- http://packetstormsecurity.nl/0310-exploits/FlexWATCH.txtExploit
- http://secunia.com/advisories/10132ExploitVendor Advisory
- http://securitytracker.com/id?1008049Exploit
- http://www.osvdb.org/2842PatchVendor Advisory
- http://www.securityfocus.com/bid/8942Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13567
- http://packetstormsecurity.nl/0310-exploits/FlexWATCH.txtExploit
- http://secunia.com/advisories/10132ExploitVendor Advisory
- http://securitytracker.com/id?1008049Exploit
- http://www.osvdb.org/2842PatchVendor Advisory
- http://www.securityfocus.com/bid/8942Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13567
FAQ
What is CVE-2003-1160?
CVE-2003-1160 is a vulnerability with a CVSS score of 10.0 (HIGH). FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
How severe is CVE-2003-1160?
CVE-2003-1160 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1160?
Check the references section above for vendor advisories and patch information. Affected products include: Seyeon Flexwatch Network Video Server.