Vulnerabilities (CVE)

Filtered by vendor Geovision Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2009-5087 1 Geovision 1 Digital Surveillance System 2018-10-10 5.0 MEDIUM N/A
Directory traversal vulnerability in geohttpserver in Geovision Digital Video Surveillance System 8.2 allows remote attackers to read arbitrary files via a .. (dot dot) in a GET request.
CVE-2009-1092 1 Geovision 1 Liveaudio Activex Control 2018-10-10 9.3 HIGH N/A
Use-after-free vulnerability in the LIVEAUDIO.LiveAudioCtrl.1 ActiveX control in LIVEAU~1.OCX 7.0 for GeoVision DVR systems allows remote attackers to execute arbitrary code by calling the GetAudioPlayingTime method with certain arguments.
CVE-2009-0865 1 Geovision 1 Livex Activex Control 2017-10-19 8.8 HIGH N/A
Directory traversal vulnerability in the SnapShotToFile method in the GeoVision LiveX (aka LiveX_v8200) ActiveX control 8.1.2 and 8.2.0 in LIVEX_~1.OCX allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the argument, possibly involving the PlayX and SnapShotX methods.
CVE-2005-1553 1 Geovision 1 Digital Surveillance System 2017-07-11 7.5 HIGH N/A
GeoVision Digital Video Surveillance System 6.04, 6.1 and 7.0 uses a weak encryption scheme to encrypt passwords, which allows remote attackers to obtain the password via sniffing.
CVE-2005-1552 1 Geovision 1 Digital Surveillance System 2017-07-11 5.0 MEDIUM N/A
GeoVision Digital Video Surveillance System 6.04, 6.1 and 7.0, when set to create JPEG images, does not properly protect an image even when a password and username is assigned, which may allow remote attackers to gain sensitive information via a direct request to the image.
CVE-2004-2101 1 Geovision 1 Geohttpserver 2017-07-11 5.0 MEDIUM N/A
The sysinfo script in GeoHttpServer allows remote attackers to cause a denial of service (crash) via a long pwd parameter, possibly triggering a buffer overflow.
CVE-2004-2100 1 Geovision 1 Geohttpserver 2016-10-18 5.0 MEDIUM N/A
GeoHttpServer, when configured to authenticate users, allows remote attackers to bypass authentication and access unauthorized files via a URL that contains %0a%0a (encoded newlines).