| chiyutw -- bf-660c |
Chiyu BF-660C fingerprint access-control devices allow remote attackers to bypass authentication and (1) read or (2) modify communication configuration settings via a request to net.htm, a different vulnerability than CVE-2015-5618. |
2015年07月31日 |
7.5 |
CVE-2015-2871 CERT-VN |
| chiyutw -- bf-630 |
Chiyu BF-630 and BF-630W fingerprint access-control devices allow remote attackers to bypass authentication and (1) read or (2) modify (a) Voice Time Set configuration settings via a request to voice.htm or (b) UniFinger configuration settings via a request to bf.htm, a different vulnerability than CVE-2015-2871. |
2015年07月31日 |
7.5 |
CVE-2015-5618 CERT-VN |
| cisco -- ios_xe |
Cisco IOS XE 2.x before 2.4.3 and 2.5.x before 2.5.1 on ASR 1000 devices allows remote attackers to cause a denial of service (Embedded Services Processor crash) via a crafted series of fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCtd72617. |
2015年07月31日 |
7.8 |
CVE-2015-4291 CISCO |
| dell -- bios |
The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692. |
2015年07月31日 |
7.2 |
CVE-2015-2890 CONFIRM CERT-VN |
| garrettcom -- magnum_10k_firmware |
The firmware in MNS before 4.5.6 on Belden GarrettCom Magnum 6K and Magnum 10K switches has a hardcoded serial-console password for a privileged account, which might allow physically proximate attackers to obtain access by establishing a console session to a nonstandard installation on which this account is enabled, and leveraging knowledge of this password. |
2015年08月03日 |
7.2 |
CVE-2015-3959 MISC CONFIRM |
| gehealthcare -- entegra_p&r_firmware |
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2001-1594 MISC MISC CONFIRM |
| gehealthcare -- millennium_mg |
GE Healthcare Millennium MG, NC, and MyoSIGHT has a default password of (1) root.genie for the root user, (2) "service." for the service user, (3) admin.genie for the admin user, (4) reboot for the reboot user, and (5) shutdown for the shutdwon user, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2002-2445 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- millennium_mg_firmware |
GE Healthcare Millennium MG, NC, and MyoSIGHT has a password of insite.genieacq for the insite account that cannot be changed without disabling product functionality for remote InSite support, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2002-2446 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- discovery_vh |
GE Healthcare Discovery VH has a default password of (1) interfile for the ftpclient user of the Interfile server or (2) "2" for the LOCAL user of the FTP server for the Codonics printer, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2003-1603 MISC MISC CONFIRM |
| gehealthcare -- centricity_image_vault_firmware |
GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002 account of the GEMNet license server, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2004-2777 MISC MISC CONFIRM |
| gehealthcare -- infinia_ii_firmware |
GE Healthcare Infinia II has a default password of (1) infinia for the infinia user, (2) #bigguy1 for the acqservice user, (3) dont4get2 for the Administrator user, (4) #bigguy1 for the emergency user, and (5) 2Bfamous for the InfiniaAdmin user, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2006-7253 MISC MISC CONFIRM |
| gehealthcare -- centricity_dms_firmware |
GE Healthcare Centricity DMS 4.2, 4.1, and 4.0 has a password of Muse!Admin for the Museadmin user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2007-6757 MISC MISC CONFIRM CONFIRM CONFIRM |
| gehealthcare -- discovery_530c_firmware |
GE Healthcare Discovery 530C has a password of #bigguy1 for the (1) acqservice user and (2) wsservice user of the Xeleris System, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2009-5143 MISC MISC CONFIRM |
| gehealthcare -- optima_ct520_firmware |
GE Healthcare Optima CT680, CT540, CT640, and CT520 has a default password of #bigguy for the root user, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2010-5306 MISC MISC CONFIRM CONFIRM CONFIRM |
| gehealthcare -- optima_mr360_firmware |
The HIPAA configuration interface in GE Healthcare Optima MR360 has a password of (1) operator for the root account, (2) adw2.0 for the admin account, and (3) adw2.0 for the sdc account, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2010-5307 MISC MISC CONFIRM |
| gehealthcare -- optima_mr360_firmware |
GE Healthcare Optima MR360 does not require authentication for the HIPAA emergency login procedure, which allows physically proximate users to gain access via an arbitrary username in the Emergency Login screen. NOTE: this might not qualify for inclusion in CVE if unauthenticated emergency access is part of the intended security policy of the product, can be controlled by the system administrator, and is not enabled by default. |
2015年08月04日 |
10.0 |
CVE-2010-5308 MISC MISC CONFIRM |
| gehealthcare -- cadstream_server_firmware |
GE Healthcare CADStream Server has a default password of confirma for the admin user, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2010-5309 MISC MISC CONFIRM |
| gehealthcare -- revolution_xq/i |
The Acquisition Workstation for the GE Healthcare Revolution XQ/i has a password of adw3.1 for the sdc user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2010-5310 MISC MISC CONFIRM |
| gehealthcare -- centricity_analytics_server |
GE Healthcare Centricity Analytics Server 1.1 has a default password of (1) V0yag3r for the SQL Server sa user, (2) G3car3s for the analyst user, (3) G3car3s for the ccg user, (4) V0yag3r for the viewer user, and (5) geservice for the geservice user in the Webmin interface, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2011-5322 MISC MISC CONFIRM |
| gehealthcare -- centricity_pacs-iw |
GE Healthcare Centricity PACS-IW 3.7.3.7, 3.7.3.8, and possibly other versions has a password of A11enda1e for the sa SQL server user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2011-5323 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- centricity_pacs-iw |
The TeraRecon server, as used in GE Healthcare Centricity PACS-IW 3.7.3.7, 3.7.3.8, and possibly other versions, has a password of (1) shared for the shared user and (2) scan for the scan user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2011-5324 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- precision_mpi |
GE Healthcare Precision MPi has a password of (1) orion for the serviceapp user, (2) orion for the clinical operator user, and (3) PlatinumOne for the administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2012-6660 MISC MISC CONFIRM |
| gehealthcare -- centricity_pacs_server |
GE Healthcare Centricity PACS 4.0 Server has a default password of (1) nasro for the nasro (ReadOnly) user and (2) nasrw for the nasrw (Read/Write) user, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2012-6693 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- centricity_pacs_server |
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1, and Server 4.0, has a password of 2charGE for the geservice account, which has unspecified impact and attack vectors related to TimbuktuPro. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires it. |
2015年08月04日 |
10.0 |
CVE-2012-6694 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- centricity_pacs_workstation |
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1 has a password of ddpadmin for the ddpadmin user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2012-6695 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- discovery_nm_750b |
GE Healthcare Discovery NM 750b has a password of 2getin for the insite account for (1) Telnet and (2) FTP, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2013-7404 MISC MISC CONFIRM |
| gehealthcare -- centricity_dms |
The Ad Hoc Reporting feature in GE Healthcare Centricity DMS 4.2 has a password of Never!Mind for the Administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2013-7405 MISC MISC CONFIRM |
| gehealthcare -- centricity_pacs_workstation |
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1 has a password of (1) CANal1 for the Administrator user and (2) iis for the IIS user, which has unspecified impact and attack vectors related to TimbuktuPro. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires it. |
2015年08月04日 |
10.0 |
CVE-2013-7442 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- discovery_xr656 |
GE Healthcare Discovery XR656 and XR656 G2 has a password of (1) 2getin for the insite user, (2) 4$xray for the xruser user, and (3) #superxr for the root user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value. |
2015年08月04日 |
10.0 |
CVE-2014-7232 MISC MISC CONFIRM CONFIRM |
| gehealthcare -- precision_thunis-800+ |
GE Healthcare Precision THUNIS-800+ has a default password of (1) 1973 for the factory default System Utilities menu, (2) TH8740 for installation using TH8740_122_Setup.exe, (3) hrml for "Setup and Activation" using DSASetup, and (4) an empty string for Shutter Configuration, which has unspecified impact and attack vectors. NOTE: since these passwords appear to be used to access functionality during installation, this issue might not cross privilege boundaries and might not be a vulnerability. |
2015年08月04日 |
10.0 |
CVE-2014-7233 MISC MISC CONFIRM |
| gehealthcare -- centricity_clinical_archive_audit_trail_repository |
GE Healthcare Centricity Clinical Archive Audit Trail Repository has a default password of initinit for the (1) SSL key manager and (2) server keystore; (3) keystore_password for the server truststore; and atna for the (4) primary storage database and (5) archive storage database, which has unspecified impact and attack vectors. |
2015年08月04日 |
10.0 |
CVE-2014-9736 MISC MISC CONFIRM |
| ibm -- websphere_mq_light |
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (CPU consumption) via a crafted byte sequence in authentication data. |
2015年08月03日 |
7.8 |
CVE-2015-1955 CONFIRM |
| ibm -- websphere_mq_light |
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1958 and CVE-2015-1987. |
2015年08月03日 |
7.8 |
CVE-2015-1956 CONFIRM |
| ibm -- websphere_mq_light |
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1956 and CVE-2015-1987. |
2015年08月03日 |
7.8 |
CVE-2015-1958 CONFIRM |
| ibm -- websphere_mq_light |
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1956 and CVE-2015-1958. |
2015年08月03日 |
7.8 |
CVE-2015-1987 CONFIRM |
| ibm -- tivoli_storage_manager_fastback |
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4932, CVE-2015-4933, CVE-2015-4934, and CVE-2015-4935. |
2015年08月03日 |
10.0 |
CVE-2015-4931 CONFIRM |
| ibm -- tivoli_storage_manager_fastback |
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4933, CVE-2015-4934, and CVE-2015-4935. |
2015年08月03日 |
10.0 |
CVE-2015-4932 CONFIRM |
| ibm -- tivoli_storage_manager_fastback |
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4932, CVE-2015-4934, and CVE-2015-4935. |
2015年08月03日 |
10.0 |
CVE-2015-4933 CONFIRM |
| ibm -- tivoli_storage_manager_fastback |
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4932, CVE-2015-4933, and CVE-2015-4935. |
2015年08月03日 |
10.0 |
CVE-2015-4934 CONFIRM |
| ibm -- tivoli_storage_manager_fastback |
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4932, CVE-2015-4933, and CVE-2015-4934. |
2015年08月03日 |
10.0 |
CVE-2015-4935 CONFIRM |
| openbsd -- openssh |
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list. |
2015年08月02日 |
8.5 |
CVE-2015-5600 FULLDISC MLIST CONFIRM CONFIRM |
| symantec -- endpoint_protection_manager |
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote attackers to bypass authentication via a crafted password-reset action that triggers a new administrative session. |
2015年07月31日 |
7.5 |
CVE-2015-1486 CONFIRM BID |
| symantec -- endpoint_protection_manager |
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to gain privileges via unspecified vectors. |
2015年07月31日 |
8.5 |
CVE-2015-1489 CONFIRM BID |
| symantec -- endpoint_protection_manager |
Untrusted search path vulnerability in the client in Symantec Endpoint Protection 12.1 before 12.1-RU6-MP1 allows local users to gain privileges via a Trojan horse DLL in a client install package. |
2015年07月31日 |
8.5 |
CVE-2015-1492 CONFIRM BID |
| timedoctor -- timedoctor |
The autoupdate implementation in TimeDoctor Pro 1.4.72.3 on Windows relies on unsigned installer files that are retrieved without use of SSL, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file. |
2015年08月06日 |
9.3 |
CVE-2015-4674 FULLDISC |