Описание
Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.
Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-3280
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22557
- http://secunia.com/advisories/17089
- http://secunia.com/advisories/18626
- http://www.gentoo.org/security/en/glsa/glsa-200601-15.xml
- http://www.securityfocus.com/archive/1/423446/100/0/threaded
- http://www.securityfocus.com/bid/15141
- http://www.zone-h.com/en/advisories/read/id=8286
EPSS
Процентиль: 83%
0.02023
Низкий
CVE ID
Связанные уязвимости
nvd
больше 20 лет назад
Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.
EPSS
Процентиль: 83%
0.02023
Низкий