Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
camera vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2013-5535
The analytics page on Cisco Video Surveillance 4000 IP cameras has hardcoded credentials, which allows remote malicious users to watch the video feed by leveraging knowledge of the password, aka Bug IDs CSCuj70402 and CSCuj70419.
Cisco Video Surveillance 4300e Ip Camera -
Cisco Video Surveillance 4000 Ip Camera -
Cisco Video Surveillance 4500e Ip Camera -
5.1
CVSSv2
CVE-2019-7728
An issue exists in the Bosch Smart Camera App prior to 1.3.1 for Android. Due to improperly implemented TLS certificate checks, a malicious actor could potentially succeed in executing a man-in-the-middle attack for some connections. (The Bosch Smart Home App is not affected. iOS...
Bosch Smart Camera
2.1
CVSSv2
CVE-2019-7729
An issue exists in the Bosch Smart Camera App prior to 1.3.1 for Android. Due to setting of insecure permissions, a malicious app could potentially succeed in retrieving video clips or still images that have been cached for clip sharing. (The Bosch Smart Home App is not affected....
Bosch Smart Camera
9.3
CVSSv2
CVE-2007-4926
The AXIS 207W camera uses a base64-encoded cleartext username and password for authentication, which allows remote malicious users to obtain sensitive information by sniffing the wireless network or by leveraging unspecified other vectors.
Axis 207w Camera
NA
CVE-2021-45039
Multiple models of the Uniview IP Camera (e.g., IPC_G6103 B6103.16.10.B25.201218, IPC_G61, IPC21, IPC23, IPC32, IPC36, IPC62, and IPC_HCMN) offer an undocumented UDP service on port 7788 that allows a remote unauthenticated malicious user to overflow an internal buffer and achiev...
Uniview Camera Firmware -
NA
CVE-2023-22682
Reflected Cross-Site Scripting (XSS) vulnerability in Manuel Masia | Pixedelic.Com Camera slideshow plugin <= 1.4.0.1 versions.
Pixedelic Camera Slideshow
10
CVSSv2
CVE-2012-3002
The web interface on (1) Foscam and (2) Wansview IP cameras allows remote malicious users to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL.
Foscam H.264 Hi3510\\/11\\/12 Ip Camera -
Wansview H.264 Hi3510\\/11\\/12 Ip Camera -
10
CVSSv2
CVE-2017-11632
An issue exists on Wireless IP Camera 360 devices. A root account with a known SHA-512 password hash exists, which makes it easier for remote malicious users to obtain administrative access via a TELNET session.
- Wireless Ip Camera 360 -
5
CVSSv2
CVE-2017-11633
An issue exists on Wireless IP Camera 360 devices. Remote attackers can discover RTSP credentials by connecting to TCP port 9527 and reading the InsertConnect field.
- Wireless Ip Camera 360 -
10
CVSSv2
CVE-2017-11634
An issue exists on Wireless IP Camera 360 devices. Remote attackers can discover a weakly encoded admin password by connecting to TCP port 9527 and reading the password field of the debugging information, e.g., nTBCS19C corresponds to a password of 123456.
- Wireless Ip Camera 360 -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »