Latest CVE Feed
-
8.8
HIGHCVE-2016-6557
In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the s... Read more
Affected Products : rp-ac52_firmware ea-n66_firmware rp-n12_firmware rp-n14_firmware rp-n53_firmware rp-ac56_firmware wmp-n12_firmware rp-ac52 ea-n66 rp-n12 +4 more products- EPSS Score: %0.10
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2016-6556
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when ... Read more
Affected Products : opennms- EPSS Score: %0.30
- Published: Sep. 24, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2016-6555
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the ... Read more
Affected Products : opennms- EPSS Score: %0.30
- Published: Sep. 24, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2016-6554
Synology NAS servers DS107, firmware version 3.1-1639 and prior, and DS116, DS213, firmware versions prior to 5.2-5644-1, use non-random default credentials of: guest:(blank) and admin:(blank) . A remote network attacker can gain privileged access to a vu... Read more
- EPSS Score: %1.83
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2016-6553
Nuuo NT-4040 Titan, firmware NT-4040_01.07.0000.0015_1120, uses non-random default credentials of: admin:admin and localdisplay:111111. A remote network attacker can gain privileged access to a vulnerable device.... Read more
- EPSS Score: %0.65
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2016-6552
Green Packet DX-350 uses non-random default credentials of: root:wimax. A remote network attacker can gain privileged access to a vulnerable device.... Read more
- EPSS Score: %0.65
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2016-6551
Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device.... Read more
Affected Products : v60_firmware v60ka_firmware v65_firmware v80g_firmware t80w_firmware t80q_firmware t100w_firmware t100q_firmware t110w_firmware t110q_firmware +16 more products- EPSS Score: %0.65
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2016-6549
The Zizai Tech Nut device allows unauthenticated Bluetooth pairing, which enables unauthenticated connected applications to write data to the device name attribute.... Read more
Affected Products : nut_mobile- EPSS Score: %0.26
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-6548
The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account.... Read more
Affected Products : nut_mobile- EPSS Score: %2.42
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-6547
The Zizai Tech Nut mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file.... Read more
Affected Products : nut_mobile- EPSS Score: %0.08
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-6546
The iTrack Easy mobile application stores the account password used to authenticate to the cloud API in base64-encoding in the cache.db file. The base64 encoding format is considered equivalent to cleartext.... Read more
Affected Products : itrackeasy- EPSS Score: %0.08
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-6545
Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the... Read more
- EPSS Score: %1.18
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2016-6544
getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device.... Read more
- EPSS Score: %1.21
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2016-6543
A captured MAC/device ID of an iTrack Easy can be registered under multiple user accounts allowing access to getgps GPS data, which can allow unauthenticated parties to track the device.... Read more
- EPSS Score: %0.96
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2016-6542
The iTrack device tracking ID number, also called "LosserID" in the web API, can be obtained by being in the range of an iTrack device. The tracker ID is the device's BLE MAC address.... Read more
- EPSS Score: %0.36
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-6541
TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vuln... Read more
- EPSS Score: %0.95
- Published: Jul. 06, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2016-6540
Unauthenticated access to the cloud-based service maintained by TrackR Bravo is allowed for querying or sending GPS data for any Trackr device by using the tracker ID number which can be discovered as described in CVE-2016-6539. Updated apps, version 5.1.... Read more
- EPSS Score: %0.46
- Published: Jul. 06, 2018
- Modified: Nov. 21, 2024
-
3.5
LOWCVE-2016-6539
The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can... Read more
- EPSS Score: %0.16
- Published: Jul. 06, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-6538
The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in ... Read more
- EPSS Score: %0.34
- Published: Jul. 06, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2016-6353
Cloudera Search in CDH before 5.7.0 allows unauthorized document access because Solr Queries by document id can bypass Sentry document-level security via the RealTimeGetHandler.... Read more
Affected Products : cdh- EPSS Score: %0.18
- Published: Nov. 26, 2019
- Modified: Nov. 21, 2024