Description
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-15857 | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
References
History
Fri, 08 Nov 2024 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
| Weaknesses | CWE-155 |
Subscriptions
No data.
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2024-11-08T08:51:53.794Z
Reserved: 2023-11-21T07:10:24.938Z
Link: CVE-2024-0054
Updated: 2024-08-01T17:41:15.908Z
Status : Awaiting Analysis
Published: 2024-03-19T07:15:07.033
Modified: 2024-11-21T08:45:48.897
Link: CVE-2024-0054
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD