Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2005-0478
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple buffer overflows in TrackerCam 5.12 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP request with a long User-Agent header or (2) a long argument to an arbitrary PHP script.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
TrackerCam 多个缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TrackerCam是一款基于Web的摄像头查看管理软件。 TrackerCam实现上存在多个安全漏洞,远程攻击者可以利用这些漏洞在服务器上执行任意指令、获取敏感信息或导致拒绝服务。 具体的漏洞如下: 1. HTTP请求中超长(大于216字节)的User-Agent字段值会导致服务器缓冲区溢出。 2. HTTP请求中超长(大于256字节)的PHP请求参数会导致服务器缓冲区溢出。 3. 软件的ComGetLogFile.php3脚本对fn参数值做充分的检查过滤,远程攻击者可以在输入中插入"../"串遍历服务
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2005-0478
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2005-0478
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2005-0478

No comments yet


Leave a comment