Логотип exploitDog
bind:CVE-2017-2855
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-2855

Количество 2

Количество 2

nvd логотип

CVE-2017-2855

больше 7 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-9pw4-7m4h-75rq

больше 3 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-2855

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 7 лет назад
github логотип
GHSA-9pw4-7m4h-75rq

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу