var-200306-0102
Vulnerability from variot

The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash). A vulnerability in various Axis Communications products may allow unauthorized remote privileged access. By making a request for a specially formatted URL, it may be possible for remote users to access the administrative configuration interface without being prompted for authentication. Axis network video can transmit and capture on-site images directly through IP network, allowing users to view and manage the camera system with a WEB browser. The management tool of the Axis network video system does not properly handle user access restrictions. After setting up the Axis network video system, a WEB-based management tool is provided for users to access to configure and manage the camera system. Users can access it by requesting the following URL: http://camera-ip/admin/admin.shtml However, the above connection needs to provide a user name and password, but due to the incorrect design of access restrictions, an attacker can access the management interface without a password by submitting the following URL: http://camera-ip//admin/admin.shtml The user can reset the RO0T password, then modify the configuration file through the telnet service program, and execute arbitrary commands on the system with root user privileges through non-interactive access

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200306-0102",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "2401 video server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2100 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2400 video server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2120 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2110 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2460 network dvr",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.00"
      },
      {
        "model": "2130 ptz network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "250s video server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.02"
      },
      {
        "model": "2420 network camera",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "axis",
        "version": null
      },
      {
        "model": "2400 video server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2460 network dvr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "3.00"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2130 ptz network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "250s video server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "3.02"
      },
      {
        "model": "2401 video server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.31"
      },
      {
        "model": "communications ptz network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.32"
      },
      {
        "model": "communications network dvr",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24603.10"
      },
      {
        "model": "communications ptz network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.31"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.30"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.34"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.34"
      },
      {
        "model": "communications ptz network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.31"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.31"
      },
      {
        "model": "communications video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.34"
      },
      {
        "model": "communications video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.34"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24002.32"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.32"
      },
      {
        "model": "communications ptz network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21302.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.30"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.32"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.32"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.34"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24012.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.30"
      },
      {
        "model": "communications 250s video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "3.03"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.32"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:250s_video_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.02",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2130_ptz_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2401_video_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.32",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2460_network_dvr:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.00",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Core Security Technologies Advisory",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0240",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-7069",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2003-0240",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#799060",
            "trust": 0.8,
            "value": "15.00"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200306-010",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7069",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash). A vulnerability in various Axis Communications products may allow unauthorized remote privileged access. By making a request for a specially formatted URL, it may be possible for remote users to access the administrative configuration interface without being prompted for authentication. Axis network video can transmit and capture on-site images directly through IP network, allowing users to view and manage the camera system with a WEB browser. The management tool of the Axis network video system does not properly handle user access restrictions. After setting up the Axis network video system, a WEB-based management tool is provided for users to access to configure and manage the camera system. Users can access it by requesting the following URL: http://camera-ip/admin/admin.shtml However, the above connection needs to provide a user name and password, but due to the incorrect design of access restrictions, an attacker can access the management interface without a password by submitting the following URL: http://camera-ip//admin/admin.shtml The user can reset the RO0T password, then modify the configuration file through the telnet service program, and execute arbitrary commands on the system with root user privileges through non-interactive access",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-7069",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "7652",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1006854",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "8876",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#799060",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240",
        "trust": 2.0
      },
      {
        "db": "OSVDB",
        "id": "4804",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20030527 CORE-2003-0403: AXIS NETWORK CAMERA HTTP AUTHENTICATION BYPASS",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "12104",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22626",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76425",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "id": "VAR-200306-0102",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      }
    ],
    "trust": 0.54047618
  },
  "last_update_date": "2023-12-18T13:40:59.036000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/7652"
      },
      {
        "trust": 2.4,
        "url": "http://www.coresecurity.com/common/showdoc.php?idx=329\u0026idxseccion=10"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/799060"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/4804"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1006854"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/8876"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12104"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=105406374731579\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2003/may/1006854.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/security_center/static/12104.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.secunia.com/advisories/8876/"
      },
      {
        "trust": 0.8,
        "url": "http://www.axis.com/us/aboutus.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.axis.com/"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/12104"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=105406374731579\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.axis.com/products/camera_servers/index.htm"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=105406374731579\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://www.coresecurity.com/common/showdoc.php?idx=329\u0026amp;idxseccion=10"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "db": "BID",
        "id": "7652"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-06-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "date": "2003-06-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "date": "2003-05-27T00:00:00",
        "db": "BID",
        "id": "7652"
      },
      {
        "date": "2003-06-09T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "date": "2003-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-06-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#799060"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7069"
      },
      {
        "date": "2009-07-11T22:06:00",
        "db": "BID",
        "id": "7652"
      },
      {
        "date": "2017-07-11T01:29:29.463000",
        "db": "NVD",
        "id": "CVE-2003-0240"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Various Axis products allow unauthorized remote privileged access",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#799060"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access verification error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-010"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.