CVE-2016-6548

CRITICAL Year: 2016
CVSS v3 Score
9.8
Critical
CVSS v2 Score
5.0
Medium

Vulnerability Description

The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account.

CVSS:9.8(Critical)

Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.

CVSS:9.8(Critical)

libapache-authenhook-perl 2.00-04 stores usernames and passwords in plaintext in the vhost error log.

CVSS:9.8(Critical)

Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file.

CVSS:9.8(Critical)

eDeploy makes it easier for remote attackers to execute arbitrary code by leveraging use of HTTP to download files.

CVSS:9.8(Critical)

D-Link DIR-815 devices with firmware before 2.07.B01 allow remote attackers to obtain sensitive information by leveraging cleartext storage of the administrative password.

CVSS:9.8(Critical)

Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows...