Show filters
162 Total Results
Displaying 131-140 of 162
Sort by:
Attacker Value
Unknown

CVE-2017-2829

Disclosure Date: June 21, 2017 (last updated November 26, 2024)
An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2831

Disclosure Date: June 21, 2017 (last updated November 26, 2024)
An exploitable buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause a buffer overflow resulting in overwriting arbitrary data. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2827

Disclosure Date: June 21, 2017 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during account creation resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2805

Disclosure Date: June 21, 2017 (last updated November 26, 2024)
An exploitable stack-based buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera. A specially crafted http request can cause a stack-based buffer overflow resulting in overwriting arbitrary data on the stack frame. An attacker can simply send an http request to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2828

Disclosure Date: June 21, 2017 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during account creation resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-5173

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
An Improper Neutralization of Special Elements (in an OS command) issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An improper neutralization of special elements vulnerability has been identified. If special elements are not properly neutralized, an attacker can call multiple parameters that can allow access to the root level operating system which could allow remote code execution.
Attacker Value
Unknown

CVE-2017-5174

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
An Authentication Bypass issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution.
0
Attacker Value
Unknown

CVE-2015-8257

Disclosure Date: May 02, 2017 (last updated November 26, 2024)
The devtools.sh script in AXIS network cameras allows remote authenticated users to execute arbitrary commands via shell metacharacters in the app parameter to (1) app_license.shtml, (2) app_license_custom.shtml, (3) app_index.shtml, or (4) app_params.shtml.
0
Attacker Value
Unknown

CVE-2017-8403

Disclosure Date: May 01, 2017 (last updated November 26, 2024)
360fly 4K cameras allow unauthenticated Wi-Fi password changes and complete access with REST by using the Bluetooth Low Energy pairing procedure, which is available at any time and does not require a password. This affects firmware 2.1.4. Exploitation can use the 360fly Android or iOS application, or the BlueZ gatttool program.
0
Attacker Value
Unknown

CVE-2017-8224

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.
0