6 results (0.003 seconds)

CVSS: 9.3EPSS: 1%CPEs: 2EXPL: 1

Multiple cross-site request forgery (CSRF) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to perform actions as administrators, as demonstrated by (1) an SMTP server change through the conf_SMTP_MailServer1 parameter to ServerManager.srv and (2) a hostname change through the conf_Network_HostName parameter on the Network page. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en AXIS 2100 Network Camera 2.02 con firmware 2.43 y anteriores permite a atacantes remotos llevar a cabo acciones como administrador, como ha sido demostrado por (1) un cambio del servidor SMTP a través del parámetro conf_SMTP_MailServer1 a ServerManager.srv y (2) un cambio del nombre de máquina a través del parámetro conf_Network_HostName en la página Network. • http://osvdb.org/39490 http://osvdb.org/39491 http://securityreason.com/securityalert/3188 http://www.procheckup.com/Vulnerability_Axis_2100_research.pdf http://www.securityfocus.com/archive/1/480995/100/0/threaded http://www.securityfocus.com/bid/25837 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 2%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to the default URI associated with a directory, as demonstrated by (a) the root directory and (b) the view/ directory; (2) parameters associated with saved settings, as demonstrated by (c) the conf_Network_HostName parameter on the Network page and (d) the conf_Layout_OwnTitle parameter to ServerManager.srv; and (3) the query string to ServerManager.srv, which is displayed on the logs page. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en AXIS 2100 Network Camera 2.02 con firmware 2.43 y anteriores permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante (1) el PATH_INFO al URI por defecto asociado con un directorio, como ha sido demostrado por (a) el directorio raíz y (b) el directorio view/; (2) parámetros asociados con configuraciones guardadas, como ha sido demostrado por (c) el parámetro conf_Network_HostName en la página Network y (d) el parámetro conf_Layout_OwnTitle a ServerManager.srv; y (3) la cadena de petición a ServerManager.srv, la cual se muestra en la página de logs. NOTA: un atacantes podría aprovechar una vulnerabilidad CSRF para modificar las configuraciones guardadas. • http://osvdb.org/39492 http://osvdb.org/39493 http://osvdb.org/39494 http://osvdb.org/39495 http://securityreason.com/securityalert/3188 http://www.procheckup.com/Vulnerability_Axis_2100_research.pdf http://www.securityfocus.com/archive/1/480995/100/0/threaded http://www.securityfocus.com/bid/25837 https://exchange.xforce.ibmcloud.com/vulnerabilities/36840 https://exchange.xforce.ibmcloud.com/vulnerabilities/36841 https://exchange.xforce.ibmcloud.com/vulnerabilities/36842 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware before 2.43 allow remote attackers to inject arbitrary web script or HTML via (1) parameters associated with saved settings, as demonstrated by the conf_SMTP_MailServer1 parameter to ServerManager.srv; or (2) the subpage parameter to wizard/first/wizard_main_first.shtml. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en AXIS 2100 Network Camera 2.02 con firmware anterior a 2.43 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante (1) parámetros asociados configuraciones guardadas, como ha sido demostrado por el parámetro conf_SMTP_MailServer1 a ServerManager.srv; o (2) el parámetro subpage a wizard/first/wizard_main_first.shtml. NOTA: un atacante podría aprovechar una vulnerabilidad CSRF para modificar configuraciones guardadas. • http://osvdb.org/38795 http://osvdb.org/38796 http://securityreason.com/securityalert/3188 http://www.procheckup.com/Vulnerability_Axis_2100_research.pdf http://www.securityfocus.com/archive/1/480995/100/0/threaded http://www.securityfocus.com/bid/25837 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 27%CPEs: 10EXPL: 1

Stack-based buffer overflow in the SaveBMP method in the AXIS Camera Control (aka CamImage) ActiveX control before 2.40.0.0 in AxisCamControl.ocx in AXIS 2100, 2110, 2120, 2130 PTZ, 2420, 2420-IR, 2400, 2400+, 2401, 2401+, 2411, and Panorama PTZ allows remote attackers to cause a denial of service (Internet Explorer crash) or execute arbitrary code via a long argument. Desbordamiento de búfer en el método SaveBMP en el control ActiveX AXIS Camera Control (también conocido como CamImage) anterior a 2.40.0.0 en AxisCamControl.ocx en AXIS 2100, 2110, 2120, 2130 PTZ, 2420, 2420-IR, 2400, 2400+, 2401, 2401+, 2411, y Panorama PTZ permite a atacantes remotos provocar denegación de servicio (caida del Internet Explorer) o ejecutar código de su elección a través de argumentos largos. • https://www.exploit-db.com/exploits/4143 http://osvdb.org/35602 http://secunia.com/advisories/25093 http://www.axis.com/techsup/software/acc/files/acc_security_update_1_00.pdf http://www.kb.cert.org/vuls/id/355809 http://www.securityfocus.com/bid/23816 http://www.vupen.com/english/advisories/2007/1663 https://exchange.xforce.ibmcloud.com/vulnerabilities/34133 •

CVSS: 5.0EPSS: 1%CPEs: 98EXPL: 0

Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. • http://secunia.com/advisories/13145 http://securitytracker.com/id?1012157 http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf http://www.posadis.org/advisories/pos_adv_006.txt http://www.securityfocus.com/bid/11642 https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 •