Vulnerabilities > Milesight
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-04-28 | CVE-2023-30467 | Incorrect Authorization vulnerability in Milesight products This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to improper authorization at the Milesight NVR web-based management interface. | 9.8 |
2022-09-15 | CVE-2022-3001 | Improper Input Validation vulnerability in Milesight Video Management Systems Firmware 40.7.0.79 This vulnerability exists in Milesight Video Management Systems (VMS), all firmware versions prior to 40.7.0.79-r1, due to improper input handling at camera’s web-based management interface. | 7.5 |
2019-10-25 | CVE-2016-2360 | Use of Hard-coded Credentials vulnerability in Milesight IP Security Camera Firmware 20161114 Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations. | 9.8 |
2019-10-25 | CVE-2016-2359 | Improper Authentication vulnerability in Milesight IP Security Camera Firmware 20161114 Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource. | 9.8 |
2019-10-25 | CVE-2016-2358 | Use of Hard-coded Credentials vulnerability in Milesight IP Security Camera Firmware 20161114 Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. | 9.8 |
2019-10-25 | CVE-2016-2357 | Use of Hard-coded Credentials vulnerability in Milesight IP Security Camera Firmware 20161114 Milesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory. | 9.8 |
2019-10-25 | CVE-2016-2356 | Classic Buffer Overflow vulnerability in Milesight IP Security Camera Firmware 20161114 Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password. | 9.8 |