Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-3280

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2005-3280
Last Modified 05 Sep 2008 04:53:57
Published 23 Oct 2005 06:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-3280

Summary

Paros 3.2.5 uses a default password for the "sa" account in the underlying HSQLDB database and does not restrict access to the local machine, which allows remote attackers to gain privileges.

Vulnerable Systems

Application

  • Paros 3.2.5


References

XF - paros-password-security-bypass(22557)

MISC - http://www.zone-h.com/en/advisories/read/id=8286/

BID - 15141

SECUNIA - 17089

BUGTRAQ - 20060130 Re: [Full-disclosure] [ GLSA 200601-15 ] Paros: Default administrator password

GENTOO - GLSA-200601-15

SECUNIA - 18626


Last Updated: 27 May 2016 10:40:52