Axis

2420 Network Camera

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 21.88%
  • Published 07.05.2007 19:19:00
  • Last modified 09.04.2025 00:30:58

Stack-based buffer overflow in the SaveBMP method in the AXIS Camera Control (aka CamImage) ActiveX control before 2.40.0.0 in AxisCamControl.ocx in AXIS 2100, 2110, 2120, 2130 PTZ, 2420, 2420-IR, 2400, 2400+, 2401, 2401+, 2411, and Panorama PTZ allo...

  • EPSS 1.96%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to ca...

Exploit
  • EPSS 22.52%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to execute arbitrary commands via accent (`) and possibly other shell metacharacters in the query string to virtualinput.cgi.

Exploit
  • EPSS 1.87%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Directory traversal vulnerability in Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to bypass authentication via a .. (dot dot) in an HTTP POST request to ServerManager.srv, then use these privileges...

Exploit
  • EPSS 4.58%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to obtain sensitive information via direct requests to (1) admin/getparam.cgi, (2) admin/systemlog.cgi, (3) admin/serverreport.cgi, and (4) admin/paramli...

  • EPSS 22.36%
  • Published 09.06.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash).