Show filters
162 Total Results
Displaying 101-110 of 162
Sort by:
Attacker Value
Unknown

CVE-2018-12672

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B) does not perform proper validation on user-supplied input and is vulnerable to cross-site scripting attacks. If proper authorization was implemented, this vulnerability could be leveraged to perform actions on behalf of another user or the administrator.
0
Attacker Value
Unknown

CVE-2018-12675

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) does not perform origin checks on URLs that the camera's web interface redirects a user to. This can be leveraged to send a user to an unexpected endpoint.
0
Attacker Value
Unknown

CVE-2018-16225

Disclosure Date: September 18, 2018 (last updated November 27, 2024)
The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera.
0
Attacker Value
Unknown

CVE-2018-11653

Disclosure Date: August 24, 2018 (last updated November 27, 2024)
Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password.
Attacker Value
Unknown

CVE-2018-11654

Disclosure Date: August 24, 2018 (last updated November 27, 2024)
Information disclosure in Netwave IP camera at get_status.cgi (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information from the device.
Attacker Value
Unknown

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.2017…

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.
0
Attacker Value
Unknown

CVE-2018-6479

Disclosure Date: January 31, 2018 (last updated November 26, 2024)
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
Attacker Value
Unknown

CVE-2017-17761

Disclosure Date: December 19, 2017 (last updated November 26, 2024)
An issue was discovered on Ichano AtHome IP Camera devices. The device runs the "noodles" binary - a service on port 1300 that allows a remote (LAN) unauthenticated user to run arbitrary commands. This binary requires the "system" XML element for specifying the command. For example, a <system>id</system> command results in a <system_ack>ok</system_ack> response.
0
Attacker Value
Unknown

CVE-2017-3185

Disclosure Date: December 16, 2017 (last updated November 26, 2024)
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC have a web application that uses the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources.
0
Attacker Value
Unknown

CVE-2017-3186

Disclosure Date: December 16, 2017 (last updated November 26, 2024)
ACTi cameras including the D, B, I, and E series using firmware version A1D-500-V6.11.31-AC use non-random default credentials across all devices. A remote attacker can take complete control of a device using default admin credentials.
0