Show filters
24 Total Results
Displaying 11-20 of 24
Sort by:
Attacker Value
Unknown
CVE-2020-11682
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request will succeed.
0
Attacker Value
Unknown
CVE-2020-11681
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
0
Attacker Value
Unknown
CVE-2020-11680
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 is vulnerable to authorization bypass on all administrator functionality. The application fails to check that a request was submitted by an administrator. Consequently, a normal user can perform actions including, but not limited to, creating/modifying the file store, creating/modifying alerts, creating/modifying users, etc.
0
Attacker Value
Unknown
CVE-2020-11679
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
Castel NextGen DVR v1.0.0 is vulnerable to privilege escalation through the Adminstrator/Users/Edit/:UserId functionality. Adminstrator/Users/Edit/:UserId fails to check that the request was submitted by an Administrator. This allows a normal user to escalate their privileges by adding additional roles to their account.
0
Attacker Value
Unknown
CVE-2020-10514
Disclosure Date: April 15, 2020 (last updated February 21, 2025)
iCatch DVR firmware before 20200103 do not validate function parameter properly, resulting attackers executing arbitrary command.
0
Attacker Value
Unknown
CVE-2013-7487
Disclosure Date: March 21, 2020 (last updated February 21, 2025)
On Swann DVR04B, DVR08B, DVR-16CIF, and DVR16B devices, raysharpdvr application has a vulnerable call to “system”, which allows remote attackers to execute arbitrary code via TCP port 9000.
0
Attacker Value
Unknown
CVE-2013-4982
Disclosure Date: December 27, 2019 (last updated November 27, 2024)
AVTECH AVN801 DVR has a security bypass via the administration login captcha
0
Attacker Value
Unknown
CVE-2013-1391
Disclosure Date: October 30, 2019 (last updated November 27, 2024)
Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.
0
Attacker Value
Unknown
CVE-2017-14263
Disclosure Date: September 11, 2017 (last updated November 26, 2024)
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.
0
Attacker Value
Unknown
CVE-2014-4880
Disclosure Date: December 08, 2014 (last updated October 05, 2023)
Buffer overflow in Hikvision DVR DS-7204 Firmware 2.2.10 build 131009, and other models and versions, allows remote attackers to execute arbitrary code via an RTSP PLAY request with a long Authorization header.
0