AI Score
Confidence
Low
EPSS
Percentile
90.6%
FlexWATCH Network video server 132 allows remote attackers to bypass authentication and gain administrative privileges via an HTTP request to aindex.htm that contains double leading slashes (//).
packetstormsecurity.nl/0310-exploits/FlexWATCH.txt
secunia.com/advisories/10132
securitytracker.com/id?1008049
www.osvdb.org/2842
www.securityfocus.com/bid/8942
exchange.xforce.ibmcloud.com/vulnerabilities/13567