Логотип exploitDog
bind:CVE-2017-2856
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-2856

Количество 2

Количество 2

nvd логотип

CVE-2017-2856

больше 7 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-pcfp-7jjr-h74h

больше 3 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-2856

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 7 лет назад
github логотип
GHSA-pcfp-7jjr-h74h

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу