Axis Os 2016
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Axis Os 2016.
By the Year
In 2026 there have been 0 vulnerabilities in Axis Os 2016. Axis Os 2016 did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 8.10 |
| 2022 | 0 | 0.00 |
| 2021 | 3 | 7.70 |
It may take a day or so for new Axis Os 2016 vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Axis Os 2016 Security Vulnerabilities
AXIS OS VAPIX overlay_del.cgi Path Traversal File Deletion
CVE-2023-21415
8.1 - High
- October 16, 2023
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Directory traversal
User controlled parameters related to SMTP notifications are not correctly validated
CVE-2021-31986
6.8 - Medium
- October 05, 2021
User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.
Memory Corruption
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.
CVE-2021-31988
8.8 - High
- October 05, 2021
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.
Injection
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.
CVE-2021-31987
7.5 - High
- October 05, 2021
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Axis Os 2016 or by Axis? Click the Watch button to subscribe.