Описание
FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
Ссылки
- Exploit
- ExploitVendor Advisory
- Exploit
- PatchVendor Advisory
- Exploit
- Exploit
- ExploitVendor Advisory
- Exploit
- PatchVendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:seyeon:flexwatch_network_video_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:seyeon:flexwatch_network_video_server:model_132:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.08249
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
EPSS
Процентиль: 92%
0.08249
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other