Lucene search

K

5 matches found

CVE
CVE
added 2017/04/24 10:59 a.m.71 views

CVE-2017-7852

D-Link DCS cameras have a weak/insecure CrossDomain.XML file that allows sites hosting malicious Flash objects to access and/or change the device's settings via a CSRF attack. This is because of the 'allow-access-from domain' child element set to *, thus accepting requests from any domain. If a vic...

8.8CVSS8.5AI score0.01001EPSS
CVE
CVE
added 2018/12/20 11:29 p.m.54 views

CVE-2018-18441

D-Link DCS series Wi-Fi cameras expose sensitive information regarding the device configuration. The affected devices include many of DCS series, such as: DCS-936L, DCS-942L, DCS-8000LH, DCS-942LB1, DCS-5222L, DCS-825L, DCS-2630L, DCS-820L, DCS-855L, DCS-2121, DCS-5222LB1, DCS-5020L, and many more....

7.5CVSS7.4AI score0.01152EPSS
CVE
CVE
added 2019/05/06 8:29 p.m.53 views

CVE-2019-10999

The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in alphapd, the camera's web server. The overflow allows a remotely authenticated attacker to execute arbitrary code by providing a long string in the WEPEncryption parameter when requesting wireless.htm. Vulnerable devic...

8.8CVSS9AI score0.36891EPSS
CVE
CVE
added 2021/09/24 8:15 p.m.49 views

CVE-2021-41504

An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. The use of the digest-authentication for the devices command interface may allow further attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device...

8CVSS7.7AI score0.00164EPSS
CVE
CVE
added 2021/09/24 8:15 p.m.41 views

CVE-2021-41503

DCS-5000L v1.05 and DCS-932L v2.17 and older are affecged by Incorrect Acess Control. The use of the basic authentication for the devices command interface allows attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulne...

8CVSS7.9AI score0.0043EPSS