Логотип exploitDog
bind:CVE-2017-15236
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-15236

Количество 2

Количество 2

nvd логотип

CVE-2017-15236

больше 8 лет назад

Tiandy IP cameras 5.56.17.120 do not properly restrict a certain proprietary protocol, which allows remote attackers to read settings via a crafted request to TCP port 3001, as demonstrated by config* files and extendword.txt.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-5mj8-9833-w3h6

больше 3 лет назад

Tiandy IP cameras 5.56.17.120 do not properly restrict a certain proprietary protocol, which allows remote attackers to read settings via a crafted request to TCP port 3001, as demonstrated by config* files and extendword.txt.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-15236

Tiandy IP cameras 5.56.17.120 do not properly restrict a certain proprietary protocol, which allows remote attackers to read settings via a crafted request to TCP port 3001, as demonstrated by config* files and extendword.txt.

CVSS3: 7.5
4%
Низкий
больше 8 лет назад
github логотип
GHSA-5mj8-9833-w3h6

Tiandy IP cameras 5.56.17.120 do not properly restrict a certain proprietary protocol, which allows remote attackers to read settings via a crafted request to TCP port 3001, as demonstrated by config* files and extendword.txt.

CVSS3: 7.5
4%
Низкий
больше 3 лет назад

Уязвимостей на страницу