{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T02:18:15.280","vulnerabilities":[{"cve":{"id":"CVE-2024-47261","sourceIdentifier":"product-security@axis.com","published":"2025-04-08T06:15:43.053","lastModified":"2026-01-14T14:46:03.113","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device."},{"lang":"es","value":"51l3nc3, miembro del programa de recompensas por errores de AXIS OS, descubrió que la API de VAPIX uploadoverlayimage.cgi no tenía suficiente validación de entrada para permitir que un atacante cargara archivos para bloquear el acceso para crear superposiciones de imágenes en la interfaz web del dispositivo Axis."}],"metrics":{"cvssMetricV31":[{"source":"product-security@axis.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"product-security@axis.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*","versionStartIncluding":"10.12.0","versionEndExcluding":"12.3.56","matchCriteriaId":"C2765144-494D-46B2-A6F2-721135F5EE7F"},{"vulnerable":true,"criteria":"cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*","versionEndExcluding":"10.12.276","matchCriteriaId":"2E526168-18C5-4812-B171-786FA1AE0776"},{"vulnerable":true,"criteria":"cpe:2.3:o:axis:axis_os_2024:*:*:*:*:lts:*:*:*","versionEndExcluding":"11.11.141","matchCriteriaId":"0ECE61EC-B83D-4222-A57A-9D8E7F42FDAA"}]}]}],"references":[{"url":"https://www.axis.com/dam/public/18/c5/b2/cve-2024-47261pdf-en-US-474505.pdf","source":"product-security@axis.com","tags":["Vendor Advisory"]}]}}]}