4 results (0.016 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

Reflected XSS in the web administration portal on the Axis 2100 Network Camera 2.03 allows an attacker to execute arbitrary JavaScript via the conf_Layout_OwnTitle parameter to view/view.shtml. NOTE: this might overlap CVE-2007-5214. XSS reflejado en el portal de administración web en la versión 2.03 de la cámara de red Axis 2100 permite que un atacante ejecute código JavaScript arbitrario mediante el parámetro conf_Layout_OwnTitle en view/view.shtml. NOTA: esta vulnerabilidad puede solaparse con CVE-2007-5214 • https://distributedcompute.com/2017/10/24/axis-2100-network-camera-2-03-xss-vulnerability • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 27%CPEs: 10EXPL: 1

Stack-based buffer overflow in the SaveBMP method in the AXIS Camera Control (aka CamImage) ActiveX control before 2.40.0.0 in AxisCamControl.ocx in AXIS 2100, 2110, 2120, 2130 PTZ, 2420, 2420-IR, 2400, 2400+, 2401, 2401+, 2411, and Panorama PTZ allows remote attackers to cause a denial of service (Internet Explorer crash) or execute arbitrary code via a long argument. Desbordamiento de búfer en el método SaveBMP en el control ActiveX AXIS Camera Control (también conocido como CamImage) anterior a 2.40.0.0 en AxisCamControl.ocx en AXIS 2100, 2110, 2120, 2130 PTZ, 2420, 2420-IR, 2400, 2400+, 2401, 2401+, 2411, y Panorama PTZ permite a atacantes remotos provocar denegación de servicio (caida del Internet Explorer) o ejecutar código de su elección a través de argumentos largos. • https://www.exploit-db.com/exploits/4143 http://osvdb.org/35602 http://secunia.com/advisories/25093 http://www.axis.com/techsup/software/acc/files/acc_security_update_1_00.pdf http://www.kb.cert.org/vuls/id/355809 http://www.securityfocus.com/bid/23816 http://www.vupen.com/english/advisories/2007/1663 https://exchange.xforce.ibmcloud.com/vulnerabilities/34133 •

CVSS: 5.0EPSS: 1%CPEs: 98EXPL: 0

Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. • http://secunia.com/advisories/13145 http://securitytracker.com/id?1012157 http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf http://www.posadis.org/advisories/pos_adv_006.txt http://www.securityfocus.com/bid/11642 https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 •

CVSS: 10.0EPSS: 2%CPEs: 9EXPL: 1

The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash). Las capacidades de administración basadas en web de varios productos Axis Network Camera permite que atacantes remotos se salten las restricciones de acceso y modifiquen la configuración mediante una petición HTTP a admin/admin.shtml que contiene '//" (dos barras) al principio. • https://www.exploit-db.com/exploits/22626 http://marc.info/?l=bugtraq&m=105406374731579&w=2 http://secunia.com/advisories/8876 http://securitytracker.com/id?1006854 http://www.coresecurity.com/common/showdoc.php?idx=329&idxseccion=10 http://www.kb.cert.org/vuls/id/799060 http://www.osvdb.org/4804 http://www.securityfocus.com/bid/7652 https://exchange.xforce.ibmcloud.com/vulnerabilities/12104 •