CVE-2016-2356
- EPSS 3.51%
- Veröffentlicht 25.10.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 02:48:17
Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password.
CVE-2016-2357
- EPSS 0.84%
- Veröffentlicht 25.10.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 02:48:17
Milesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory.
CVE-2016-2358
- EPSS 0.84%
- Veröffentlicht 25.10.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 02:48:17
Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.
CVE-2016-2359
- EPSS 0.46%
- Veröffentlicht 25.10.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 02:48:17
Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.
CVE-2016-2360
- EPSS 0.84%
- Veröffentlicht 25.10.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 02:48:17
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.