Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
camera vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2013-5535
The analytics page on Cisco Video Surveillance 4000 IP cameras has hardcoded credentials, which allows remote malicious users to watch the video feed by leveraging knowledge of the password, aka Bug IDs CSCuj70402 and CSCuj70419.
Cisco Video Surveillance 4300e Ip Camera -
Cisco Video Surveillance 4000 Ip Camera -
Cisco Video Surveillance 4500e Ip Camera -
NA
CVE-2023-22682
Reflected Cross-Site Scripting (XSS) vulnerability in Manuel Masia | Pixedelic.Com Camera slideshow plugin <= 1.4.0.1 versions.
Pixedelic Camera Slideshow
5.1
CVSSv2
CVE-2019-7728
An issue exists in the Bosch Smart Camera App prior to 1.3.1 for Android. Due to improperly implemented TLS certificate checks, a malicious actor could potentially succeed in executing a man-in-the-middle attack for some connections. (The Bosch Smart Home App is not affected. iOS...
Bosch Smart Camera
9.3
CVSSv2
CVE-2007-4926
The AXIS 207W camera uses a base64-encoded cleartext username and password for authentication, which allows remote malicious users to obtain sensitive information by sniffing the wireless network or by leveraging unspecified other vectors.
Axis 207w Camera
NA
CVE-2021-45039
Multiple models of the Uniview IP Camera (e.g., IPC_G6103 B6103.16.10.B25.201218, IPC_G61, IPC21, IPC23, IPC32, IPC36, IPC62, and IPC_HCMN) offer an undocumented UDP service on port 7788 that allows a remote unauthenticated malicious user to overflow an internal buffer and achiev...
Uniview Camera Firmware -
2.1
CVSSv2
CVE-2019-7729
An issue exists in the Bosch Smart Camera App prior to 1.3.1 for Android. Due to setting of insecure permissions, a malicious app could potentially succeed in retrieving video clips or still images that have been cached for clip sharing. (The Bosch Smart Home App is not affected....
Bosch Smart Camera
10
CVSSv2
CVE-2012-3002
The web interface on (1) Foscam and (2) Wansview IP cameras allows remote malicious users to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL.
Foscam H.264 Hi3510\\/11\\/12 Ip Camera -
Wansview H.264 Hi3510\\/11\\/12 Ip Camera -
4.3
CVSSv2
CVE-2013-5215
Cross-site scripting (XSS) vulnerability in the web interface "WiFi scan" option in FOSCAM Wireless IP Cameras allows remote malicious users to inject arbitrary web script or HTML via the SSID.
Foscam Wireless Ip Camera -
10
CVSSv2
CVE-2017-11634
An issue exists on Wireless IP Camera 360 devices. Remote attackers can discover a weakly encoded admin password by connecting to TCP port 9527 and reading the password field of the debugging information, e.g., nTBCS19C corresponds to a password of 123456.
- Wireless Ip Camera 360 -
5.4
CVSSv2
CVE-2014-5618
The Cartoon Camera (aka com.fingersoft.cartooncamera) application 1.2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Fingersoft Cartoon Camera 1.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »