Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2023-35867

Disclosure Date: December 18, 2023 (last updated December 23, 2023)
An improper handling of a malformed API answer packets to API clients in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation. To exploit this vulnerability an attacker has to replace an existing API server e.g. through Man-in-the-Middle attacks.
Attacker Value
Unknown

CVE-2020-19643

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
Cross Site Scripting (XSS) vulnerability in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B via all fields in the FTP settings page to the "goform/formSetFtpCfg" settings page.
Attacker Value
Unknown

CVE-2020-19640

Disclosure Date: March 30, 2021 (last updated November 28, 2024)
An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. An unauthenticated attacker can reboot the device causing a Denial of Service, via a hidden reboot command to '/media/?action=cmd'.
Attacker Value
Unknown

CVE-2020-19641

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. Authenticated attackers with the "Operator" Privilege can gain admin privileges via a crafted request to '/goform/formUserMng'.
Attacker Value
Unknown

CVE-2020-19639

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
Cross Site Request Forgery (CSRF) vulnerability in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B, via all fields to WebUI.
Attacker Value
Unknown

CVE-2020-19642

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
An issue was discovered in INSMA Wifi Mini Spy 1080P HD Security IP Camera 1.9.7 B. A local attacker can execute arbitrary code via editing the 'recdata.db' file to call a specially crafted GoAhead ASP-file on the SD card.
Attacker Value
Unknown

CVE-2016-2360

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.
Attacker Value
Unknown

CVE-2016-2359

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.
Attacker Value
Unknown

CVE-2016-2358

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.
Attacker Value
Unknown

CVE-2016-2357

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory.