CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Vivotek : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2019-14458 DoS 2019-09-18 2020-08-24
7.8
None Remote Low Not required None None Complete
VIVOTEK IP Camera devices with firmware before 0x20x allow a denial of service via a crafted HTTP header.
2 CVE-2019-14457 120 Overflow 2019-09-10 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
VIVOTEK IP Camera devices with firmware before 0x20x have a stack-based buffer overflow via a crafted HTTP header.
3 CVE-2019-10256 Bypass 2019-09-10 2020-08-24
7.5
None Remote Low Not required Partial Partial Partial
An authentication bypass vulnerability in VIVOTEK IPCam versions prior to 0x13a was found.
4 CVE-2018-18244 79 Exec Code XSS 2019-01-03 2019-01-14
4.3
None Remote Medium Not required None Partial None
Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header.
5 CVE-2018-18005 79 XSS 2019-01-03 2019-01-14
4.3
None Remote Medium Not required None Partial None
Cross-site scripting in event_script.js in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript via a URL query string parameter.
6 CVE-2018-18004 862 2019-01-03 2020-08-24
5.0
None Remote Low Not required None Partial None
Incorrect Access Control in mod_inetd.cgi in VIVOTEK Network Camera Series products with firmware before XXXXXX-VVTK-0X09a allows remote attackers to enable arbitrary system services via a URL parameter.
7 CVE-2018-14771 Exec Code 2018-09-05 2020-08-24
9.0
None Remote Low ??? Complete Complete Complete
VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 2 of 2) via eventscript.cgi.
8 CVE-2018-14770 Exec Code 2018-09-05 2020-08-24
9.0
None Remote Low ??? Complete Complete Complete
VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 1 of 2) via the ONVIF interface, (/onvif/device_service).
9 CVE-2018-14769 352 CSRF 2018-09-05 2018-11-13
6.8
None Remote Medium Not required Partial Partial Partial
VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow CSRF.
10 CVE-2018-14768 Exec Code 2018-08-29 2020-08-24
9.0
None Remote Low ??? Complete Complete Complete
Various VIVOTEK FD8*, FD9*, FE9*, IB8*, IB9*, IP9*, IZ9*, MS9*, SD9*, and other devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code.
11 CVE-2008-4771 119 Exec Code Overflow 2008-10-28 2017-09-29
9.3
None Remote Medium Not required Complete Complete Complete
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.
12 CVE-2007-3167 Exec Code Overflow 2007-06-11 2017-10-11
7.6
None Remote High Not required Complete Complete Complete
Stack-based buffer overflow in the Vivotek Motion Jpeg ActiveX control (aka MjpegControl) in MjpegDecoder.dll 2.0.0.13 allows remote attackers to execute arbitrary code via a long PtzUrl property value.
Total number of vulnerabilities : 12   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.