Show filters
24 Total Results
Displaying 11-20 of 24
Sort by:
Attacker Value
Unknown

CVE-2020-11682

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request will succeed.
Attacker Value
Unknown

CVE-2020-11681

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
Attacker Value
Unknown

CVE-2020-11680

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 is vulnerable to authorization bypass on all administrator functionality. The application fails to check that a request was submitted by an administrator. Consequently, a normal user can perform actions including, but not limited to, creating/modifying the file store, creating/modifying alerts, creating/modifying users, etc.
Attacker Value
Unknown

CVE-2020-11679

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 is vulnerable to privilege escalation through the Adminstrator/Users/Edit/:UserId functionality. Adminstrator/Users/Edit/:UserId fails to check that the request was submitted by an Administrator. This allows a normal user to escalate their privileges by adding additional roles to their account.
Attacker Value
Unknown

CVE-2020-10514

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
iCatch DVR firmware before 20200103 do not validate function parameter properly, resulting attackers executing arbitrary command.
Attacker Value
Unknown

CVE-2013-7487

Disclosure Date: March 21, 2020 (last updated February 21, 2025)
On Swann DVR04B, DVR08B, DVR-16CIF, and DVR16B devices, raysharpdvr application has a vulnerable call to “system”, which allows remote attackers to execute arbitrary code via TCP port 9000.
Attacker Value
Unknown

CVE-2013-4982

Disclosure Date: December 27, 2019 (last updated November 27, 2024)
AVTECH AVN801 DVR has a security bypass via the administration login captcha
Attacker Value
Unknown

CVE-2013-1391

Disclosure Date: October 30, 2019 (last updated November 27, 2024)
Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.
Attacker Value
Unknown

CVE-2017-14263

Disclosure Date: September 11, 2017 (last updated November 26, 2024)
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
0
Attacker Value
Unknown

CVE-2014-4880

Disclosure Date: December 08, 2014 (last updated October 05, 2023)
Buffer overflow in Hikvision DVR DS-7204 Firmware 2.2.10 build 131009, and other models and versions, allows remote attackers to execute arbitrary code via an RTSP PLAY request with a long Authorization header.
0