Total
725 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-1690 | 1 Bestpractical | 1 Rt | 2024-11-21 | 4.3 MEDIUM | N/A |
Best Practical Solutions RT 3.6.0 through 3.6.10 and 3.8.0 through 3.8.8 allows remote attackers to trick users into sending credentials to an arbitrary server via unspecified vectors. | |||||
CVE-2011-1623 | 1 Cisco | 2 Media Experience Engine 5600, Media Processing Software | 2024-11-21 | 10.0 HIGH | N/A |
Cisco Media Processing Software before 1.2 on Media Experience Engine (MXE) 5600 devices has a default root password, which makes it easier for context-dependent attackers to obtain access via (1) the local console, (2) an SSH session, or (3) a TELNET session, aka Bug ID CSCto77737. | |||||
CVE-2011-1560 | 1 Ibm | 1 Soliddb | 2024-11-21 | 9.3 HIGH | N/A |
solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value. | |||||
CVE-2011-1035 | 1 Pivotx | 1 Pivotx | 2024-11-21 | 7.5 HIGH | N/A |
The password reset in PivotX before 2.2.4 allows remote attackers to modify the passwords of arbitrary users via unspecified vectors. | |||||
CVE-2011-1007 | 1 Bestpractical | 1 Rt | 2024-11-21 | 2.1 LOW | N/A |
Best Practical Solutions RT before 3.8.9 does not perform certain redirect actions upon a login, which allows physically proximate attackers to obtain credentials by resubmitting the login form via the back button of a web browser on an unattended workstation after an RT logout. | |||||
CVE-2011-0951 | 1 Cisco | 1 Secure Access Control System | 2024-11-21 | 5.0 MEDIUM | N/A |
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440. | |||||
CVE-2011-0885 | 1 Smc Networks | 2 Smcd3g-ccr, Smcd3g-ccr Firmware | 2024-11-21 | 10.0 HIGH | N/A |
A certain Comcast Business Gateway configuration of the SMC SMCD3G-CCR with firmware before 1.4.0.49.2 has a default password of D0nt4g3tme for the mso account, which makes it easier for remote attackers to obtain administrative access via the (1) web interface or (2) TELNET interface. | |||||
CVE-2011-0756 | 1 Trustwave | 1 Webdefend | 2024-11-21 | 5.0 MEDIUM | N/A |
The application server in Trustwave WebDefend Enterprise before 5.0 uses hardcoded console credentials, which makes it easier for remote attackers to read security-event data by using the remote console GUI to connect to the management port. | |||||
CVE-2011-0423 | 1 Polyvision | 2 Roomwizard, Roomwizard Firmware | 2024-11-21 | 7.5 HIGH | N/A |
The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214. | |||||
CVE-2011-0412 | 1 Sun | 1 Sunos | 2024-11-21 | 2.1 LOW | N/A |
Oracle Solaris 8, 9, and 10 stores back-out patch files (undo.Z) unencrypted with world-readable permissions under /var/sadm/pkg/, which allows local users to obtain password hashes and conduct brute force password guessing attacks. | |||||
CVE-2011-0354 | 1 Cisco | 3 Tandberg Endpoint, Tandberg Personal Video Unit, Tandberg Personal Video Unit Software | 2024-11-21 | 10.0 HIGH | N/A |
The default configuration of Cisco Tandberg C Series Endpoints, and Tandberg E and EX Personal Video units, with software before TC4.0.0 has a blank password for the root account, which makes it easier for remote attackers to obtain access via an unspecified login method. | |||||
CVE-2010-5318 | 1 Basic-cms | 1 Sweetrice | 2024-11-21 | 4.3 MEDIUM | N/A |
The password-reset feature in as/index.php in SweetRice CMS before 0.6.7.1 allows remote attackers to modify the administrator's password by specifying the administrator's e-mail address in the email parameter. | |||||
CVE-2010-5310 | 1 Gehealthcare | 1 Revolution Xq\/i | 2024-11-21 | 10.0 HIGH | N/A |
The Acquisition Workstation for the GE Healthcare Revolution XQ/i has a password of adw3.1 for the sdc user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. | |||||
CVE-2010-5309 | 1 Gehealthcare | 1 Cadstream Server Firmware | 2024-11-21 | 10.0 HIGH | N/A |
GE Healthcare CADStream Server has a default password of confirma for the admin user, which has unspecified impact and attack vectors. | |||||
CVE-2010-5308 | 1 Gehealthcare | 1 Optima Mr360 Firmware | 2024-11-21 | 10.0 HIGH | N/A |
GE Healthcare Optima MR360 does not require authentication for the HIPAA emergency login procedure, which allows physically proximate users to gain access via an arbitrary username in the Emergency Login screen. NOTE: this might not qualify for inclusion in CVE if unauthenticated emergency access is part of the intended security policy of the product, can be controlled by the system administrator, and is not enabled by default. | |||||
CVE-2010-5307 | 1 Gehealthcare | 1 Optima Mr360 Firmware | 2024-11-21 | 10.0 HIGH | N/A |
The HIPAA configuration interface in GE Healthcare Optima MR360 has a password of (1) operator for the root account, (2) adw2.0 for the admin account, and (3) adw2.0 for the sdc account, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value. | |||||
CVE-2010-5306 | 1 Gehealthcare | 3 Optima Ct520 Firmware, Optima Ct540 Firmware, Optima Ct680 Firmware | 2024-11-21 | 10.0 HIGH | N/A |
GE Healthcare Optima CT680, CT540, CT640, and CT520 has a default password of #bigguy for the root user, which has unspecified impact and attack vectors. | |||||
CVE-2010-5290 | 1 Adobe | 1 Coldfusion | 2024-11-21 | 10.0 HIGH | N/A |
The authentication process in Adobe ColdFusion before 10 does not require knowledge of the cleartext password if the password hash is known, which makes it easier for context-dependent attackers to obtain administrative privileges by leveraging read access to the configuration file, a different vulnerability than CVE-2010-2861. | |||||
CVE-2010-5092 | 1 Silverstripe | 1 Silverstripe | 2024-11-21 | 1.9 LOW | N/A |
The Add Member dialog in the Security admin page in SilverStripe 2.4.0 saves user passwords in plaintext, which allows local users to obtain sensitive information by reading a database. | |||||
CVE-2010-5080 | 1 Silverstripe | 1 Silverstripe | 2024-11-21 | 6.8 MEDIUM | N/A |
The Security/changepassword URL action in SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4 passes a token as a GET parameter while changing a password through email, which allows remote attackers to obtain sensitive data and hijack the session via the HTTP referer logs on a server, aka "HTTP referer leakage." |