Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
i5 system firmware vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2018-19081
An issue exists on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote malicious users to execute arbitrary OS commands via the IPv4Address field.
Opticam I5 Application Firmware 2.21.1.128
Opticam I5 System Firmware 1.5.2.11
Foscam C2 Application Firmware 2.72.1.32
Foscam C2 System Firmware 1.11.1.8
668
VMScore
CVE-2018-19082
An issue exists on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote malicious users to conduct stack-based buffer overflow attacks via the IPv4Address field.
Opticam I5 System Firmware 1.5.2.11
Opticam I5 Application Firmware 2.21.1.128
Foscam C2 Application Firmware 2.72.1.32
Foscam C2 System Firmware 1.11.1.8
320
VMScore
CVE-2018-19072
An issue exists on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/app has 0777 permissions, allowing local users to replace an archive file (wit...
Opticam I5 System Firmware 1.5.2.11
Opticam I5 Application Firmware 2.21.1.128
Foscam C2 Application Firmware 2.72.1.32
Foscam C2 System Firmware 1.11.1.8
445
VMScore
CVE-2018-19075
An issue exists on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The firewall feature makes it easier for remote malicious users to ascertain credential...
Opticam I5 Application Firmware 2.21.1.128
Opticam I5 System Firmware 1.5.2.11
Foscam C2 Application Firmware 2.72.1.32
Foscam C2 System Firmware 1.11.1.8
445
VMScore
CVE-2018-19076
An issue exists on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The FTP and RTSP services make it easier for malicious users to conduct brute-force aut...
Opticam I5 Application Firmware 2.21.1.128
Opticam I5 System Firmware 1.5.2.11
Foscam C2 Application Firmware 2.72.1.32
Foscam C2 System Firmware 1.11.1.8
694
VMScore
CVE-2018-19077
An issue exists on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. RtspServer allows remote malicious users to cause a denial of service (daemon hang or restart) via a negative integer in the RTSP Content-Length header.
Opticam I5 Application Firmware 2.21.1.128
Opticam I5 System Firmware 1.5.2.11
Foscam C2 System Firmware 1.11.1.8
Foscam C2 Application Firmware 2.72.1.32
187
VMScore
CVE-2020-24513
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Atom C3308 -
Intel Atom C3336 -
Intel Atom C3338 -
Intel Atom C3338r -
Intel Atom C3436l -
Intel Atom C3508 -
Intel Atom C3538 -
Intel Atom C3558 -
Intel Atom C3558r -
Intel Atom C3558rc -
Intel Atom C3708 -
Intel Atom C3750 -
Intel Atom C3758 -
Intel Atom C3758r -
Intel Atom C3808 -
Intel Atom C3830 -
Intel Atom C3850 -
Intel Atom C3858 -
Intel Atom C3950 -
Intel Atom C3955 -
Intel Atom C3958 -
Intel Atom P5942b -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3