Show filters
30 Total Results
Displaying 11-20 of 30
Sort by:
Attacker Value
Unknown

Ragentek Android software contains an over-the-air update mechanism that commun…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments":…
0
Attacker Value
Unknown

CVE-2018-10658

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar.
0
Attacker Value
Unknown

CVE-2018-10659

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction.
0
Attacker Value
Unknown

CVE-2018-10660

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.
0
Attacker Value
Unknown

CVE-2018-10661

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.
0
Attacker Value
Unknown

CVE-2018-10663

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation.
0
Attacker Value
Unknown

CVE-2018-10664

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.
0
Attacker Value
Unknown

CVE-2018-10662

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.
0
Attacker Value
Unknown

CVE-2017-2183

Disclosure Date: July 07, 2017 (last updated November 26, 2024)
HOME SPOT CUBE2 firmware V101 and earlier allows authenticated attackers to execute arbitrary OS commands via Clock Settings.
0
Attacker Value
Unknown

CVE-2017-2185

Disclosure Date: July 07, 2017 (last updated November 26, 2024)
HOME SPOT CUBE2 firmware V101 and earlier allows authenticated attackers to execute arbitrary OS commands via WebUI.
0