Total
725 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-4008 | 1 Sap | 1 Web Services Tool | 2024-11-21 | 5.0 MEDIUM | N/A |
SAP Web Services Tool (CA-WUI-WST) has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-4007 | 1 Sap | 1 Upgrade Tools | 2024-11-21 | 5.0 MEDIUM | N/A |
The SAP Upgrade tools for ABAP has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-4006 | 1 Sap | 1 Oil Industry Solution Traders And Schedulers Workbench | 2024-11-21 | 5.0 MEDIUM | N/A |
The SAP Trader's and Scheduler's Workbench (TSW) for SAP Oil & Gas has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-4005 | 1 Sap | 1 Brazil | 2024-11-21 | 5.0 MEDIUM | N/A |
SAP Brazil add-on has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-4004 | 1 Sap | 1 Project System | 2024-11-21 | 5.0 MEDIUM | N/A |
The (1) Structures and (2) Project-Oriented Procurement components in SAP Project System has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-3925 | 2 Canonical, Redhat | 3 Ubuntu Linux, Enterprise Linux, Sos | 2024-11-21 | 5.0 MEDIUM | N/A |
sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream. | |||||
CVE-2014-3692 | 1 Redhat | 1 Cloudforms 3.1 Management Engine | 2024-11-21 | 10.0 HIGH | N/A |
The customization template in Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 uses a default password for the root account when a password is not specified for a new image, which allows remote attackers to gain privileges. | |||||
CVE-2014-3528 | 5 Apache, Apple, Canonical and 2 more | 9 Subversion, Xcode, Ubuntu Linux and 6 more | 2024-11-21 | 4.0 MEDIUM | N/A |
Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm. | |||||
CVE-2014-3489 | 1 Redhat | 1 Cloudforms 3.0 Management Engine | 2024-11-21 | 4.3 MEDIUM | N/A |
lib/util/miq-password.rb in Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 uses a hard-coded salt, which makes it easier for remote attackers to guess passwords via a brute force attack. | |||||
CVE-2014-3419 | 1 Infoblox | 1 Netmri | 2024-11-21 | 7.2 HIGH | N/A |
Infoblox NetMRI before 6.8.5 has a default password of admin for the "root" MySQL database account, which makes it easier for local users to obtain access via unspecified vectors. | |||||
CVE-2014-3298 | 1 Cisco | 1 Cloud Portal | 2024-11-21 | 4.0 MEDIUM | N/A |
Form Data Viewer in Cisco Intelligent Automation for Cloud in Cisco Cloud Portal places passwords in form data, which allows remote authenticated users to obtain sensitive information by reading HTML source code, aka Bug ID CSCui36976. | |||||
CVE-2014-3220 | 1 F5 | 1 Big-iq | 2024-11-21 | 9.0 HIGH | N/A |
F5 BIG-IQ Cloud and Security 4.0.0 through 4.1.0 allows remote authenticated users to change the password of arbitrary users via the name parameter in a request to the user's page in mgmt/shared/authz/users/. | |||||
CVE-2014-3068 | 1 Ibm | 1 Java | 2024-11-21 | 6.4 MEDIUM | N/A |
IBM Java Runtime Environment (JRE) 7 R1 before SR1 FP1 (7.1.1.1), 7 before SR7 FP1 (7.0.7.1), 6 R1 before SR8 FP1 (6.1.8.1), 6 before SR16 FP1 (6.0.16.1), and before 5.0 SR16 FP7 (5.0.16.7) allows attackers to obtain the private key from a Certificate Management System (CMS) keystore via a brute force attack. | |||||
CVE-2014-2969 | 1 Netgear | 2 Gs108pe, Gs108pe Firmware | 2024-11-21 | 8.3 HIGH | N/A |
NETGEAR GS108PE Prosafe Plus switches with firmware 1.2.0.5 have a hardcoded password of debugpassword for the ntgruser account, which allows remote attackers to upload firmware or read or modify memory contents, and consequently execute arbitrary code, via a request to (1) produce_burn.cgi, (2) register_debug.cgi, or (3) bootcode_update.cgi. | |||||
CVE-2014-2942 | 1 Cobham | 2 Aviator 700d, Aviator 700e | 2024-11-21 | 7.2 HIGH | N/A |
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code. | |||||
CVE-2014-2870 | 1 Paperthin | 1 Commonspot Content Server | 2024-11-21 | 5.0 MEDIUM | N/A |
The default configuration of PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 uses cleartext for storage of credentials in a database, which makes it easier for context-dependent attackers to obtain sensitive information via unspecified vectors. | |||||
CVE-2014-2752 | 1 Sap | 1 Business Object Processing Framework For Abap | 2024-11-21 | 7.5 HIGH | N/A |
SAP Business Object Processing Framework (BOPF) for ABAP has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-2751 | 1 Sap | 1 Print And Output Management | 2024-11-21 | 7.5 HIGH | N/A |
SAP Print and Output Management has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2014-2354 | 1 Cogentdatahub | 1 Cogent Datahub | 2024-11-21 | 5.0 MEDIUM | N/A |
Cogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. | |||||
CVE-2014-2350 | 1 Emerson | 1 Deltav | 2024-11-21 | 7.5 HIGH | N/A |
Emerson DeltaV 10.3.1, 11.3, 11.3.1, and 12.3 uses hardcoded credentials for diagnostic services, which allows remote attackers to bypass intended access restrictions via a TCP session, as demonstrated by a session that uses the telnet program. |