Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2018-10658

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar.
0
Attacker Value
Unknown

CVE-2018-10659

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction.
0
Attacker Value
Unknown

CVE-2018-10660

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.
0
Attacker Value
Unknown

CVE-2018-10661

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.
0
Attacker Value
Unknown

CVE-2018-10663

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation.
0
Attacker Value
Unknown

CVE-2018-10664

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.
0
Attacker Value
Unknown

CVE-2018-10662

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.
0
Attacker Value
Unknown

CVE-2018-9156

Disclosure Date: April 01, 2018 (last updated November 08, 2023)
An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality
0