FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
Link | Tags |
---|---|
http://secunia.com/advisories/10132 | exploit third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13567 | vdb entry |
http://packetstormsecurity.nl/0310-exploits/FlexWATCH.txt | exploit |
http://www.securityfocus.com/bid/8942 | vdb entry exploit |
http://securitytracker.com/id?1008049 | vdb entry exploit |
http://www.osvdb.org/2842 | vdb entry patch vendor advisory |