Show filters
162 Total Results
Displaying 101-110 of 162
Sort by:
Attacker Value
Unknown
CVE-2018-12672
Disclosure Date: October 19, 2018 (last updated November 27, 2024)
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B) does not perform proper validation on user-supplied input and is vulnerable to cross-site scripting attacks. If proper authorization was implemented, this vulnerability could be leveraged to perform actions on behalf of another user or the administrator.
0
Attacker Value
Unknown
CVE-2018-12675
Disclosure Date: October 19, 2018 (last updated November 27, 2024)
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) does not perform origin checks on URLs that the camera's web interface redirects a user to. This can be leveraged to send a user to an unexpected endpoint.
0
Attacker Value
Unknown
CVE-2018-16225
Disclosure Date: September 18, 2018 (last updated November 27, 2024)
The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera.
0
Attacker Value
Unknown
CVE-2018-11653
Disclosure Date: August 24, 2018 (last updated November 27, 2024)
Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password.
0
Attacker Value
Unknown
CVE-2018-11654
Disclosure Date: August 24, 2018 (last updated November 27, 2024)
Information disclosure in Netwave IP camera at get_status.cgi (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information from the device.
0
Attacker Value
Unknown
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.2017…
Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.
0
Attacker Value
Unknown
CVE-2018-6479
Disclosure Date: January 31, 2018 (last updated November 26, 2024)
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
0
Attacker Value
Unknown
CVE-2017-17761
Disclosure Date: December 19, 2017 (last updated November 26, 2024)
An issue was discovered on Ichano AtHome IP Camera devices. The device runs the "noodles" binary - a service on port 1300 that allows a remote (LAN) unauthenticated user to run arbitrary commands. This binary requires the "system" XML element for specifying the command. For example, a <system>id</system> command results in a <system_ack>ok</system_ack> response.
0
Attacker Value
Unknown
CVE-2017-3185
Disclosure Date: December 16, 2017 (last updated November 26, 2024)
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources.
0
Attacker Value
Unknown
CVE-2017-3186
Disclosure Date: December 16, 2017 (last updated November 26, 2024)
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials.
0