Total
725 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-1950 | 1 Ibm | 1 Powervc | 2024-11-21 | 4.6 MEDIUM | N/A |
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code. | |||||
CVE-2015-1842 | 1 Redhat | 1 Openstack | 2024-11-21 | 10.0 HIGH | N/A |
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors. | |||||
CVE-2015-1455 | 1 Fortinet | 1 Fortiauthenticator | 2024-11-21 | 7.5 HIGH | N/A |
Fortinet FortiAuthenticator 3.0.0 has a password of (1) slony for the slony PostgreSQL user and (2) www-data for the www-data PostgreSQL user, which makes it easier for remote attackers to obtain access via unspecified vectors. | |||||
CVE-2015-1320 | 1 Canonical | 1 Metal As A Service | 2024-11-21 | 5.0 MEDIUM | 5.5 MEDIUM |
The SeaMicro provisioning of Ubuntu MAAS logs credentials, including username and password, for the management interface. This issue affects Ubuntu MAAS versions prior to 1.9.2. | |||||
CVE-2015-0995 | 1 Inductiveautomation | 1 Ignition | 2024-11-21 | 5.0 MEDIUM | N/A |
Inductive Automation Ignition 7.7.2 uses MD5 password hashes, which makes it easier for context-dependent attackers to obtain access via a brute-force attack. | |||||
CVE-2015-0972 | 1 Pearson | 1 Proctorcache | 2024-11-21 | 5.0 MEDIUM | N/A |
Pearson ProctorCache before 2015.1.17 uses the same hardcoded password across different customers' installations, which allows remote attackers to modify test metadata or cause a denial of service (test disruption) by leveraging knowledge of this password. | |||||
CVE-2015-0930 | 1 Servision | 2 Hvg400, Hvg Video Gateway Firmware | 2024-11-21 | 10.0 HIGH | N/A |
The web interface on SerVision HVG Video Gateway devices with firmware before 2.2.26a100 has a hardcoded administrative password, which makes it easier for remote attackers to obtain access via an HTTP session. | |||||
CVE-2015-0924 | 1 Ceragon | 3 Fiberair Ip-10c, Fiberair Ip-10e, Fiberair Ip-10g | 2024-11-21 | 7.8 HIGH | N/A |
Ceragon FibeAir IP-10 bridges have a default password for the root account, which makes it easier for remote attackers to obtain access via a (1) HTTP, (2) SSH, (3) TELNET, or (4) CLI session. | |||||
CVE-2015-0529 | 1 Emc | 1 Powerpath Virtual Appliance | 2024-11-21 | 5.0 MEDIUM | N/A |
EMC PowerPath Virtual Appliance (aka vApp) before 2.0 has default passwords for the (1) emcupdate and (2) svcuser accounts, which makes it easier for remote attackers to obtain potentially sensitive information via a login session. | |||||
CVE-2014-9736 | 1 Gehealthcare | 1 Centricity Clinical Archive Audit Trail Repository | 2024-11-21 | 10.0 HIGH | N/A |
GE Healthcare Centricity Clinical Archive Audit Trail Repository has a default password of initinit for the (1) SSL key manager and (2) server keystore; (3) keystore_password for the server truststore; and atna for the (4) primary storage database and (5) archive storage database, which has unspecified impact and attack vectors. | |||||
CVE-2014-9687 | 1 Ecryptfs | 1 Ecryptfs-utils | 2024-11-21 | 5.0 MEDIUM | N/A |
eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack. | |||||
CVE-2014-9406 | 1 Arris | 2 Touchstone Tg862g\/ct, Touchstone Tg862g\/ct Firmware | 2024-11-21 | 10.0 HIGH | N/A |
ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier has a default password of password for the admin account, which makes it easier for remote attackers to obtain access via a request to home_loggedout.php. | |||||
CVE-2014-9251 | 1 Zenoss | 1 Zenoss Core | 2024-11-21 | 5.0 MEDIUM | N/A |
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413. | |||||
CVE-2014-9248 | 1 Zenoss | 1 Zenoss Core | 2024-11-21 | 5.0 MEDIUM | N/A |
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406. | |||||
CVE-2014-9198 | 1 Schneider-electric | 5 Etg3000 Factorycast Hmi Gateway Firmware, Tsxetg3000, Tsxetg3010 and 2 more | 2024-11-21 | 10.0 HIGH | N/A |
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session. | |||||
CVE-2014-9195 | 1 Phoenixcontact-software | 2 Multiprog, Proconos Eclr | 2024-11-21 | 7.5 HIGH | N/A |
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic. | |||||
CVE-2014-9183 | 1 Zte | 1 Zxdsl | 2024-11-21 | 10.0 HIGH | N/A |
ZTE ZXDSL 831CII has a default password of admin for the admin account, which allows remote attackers to gain administrator privileges. | |||||
CVE-2014-9152 | 1 Services Project | 1 Services | 2024-11-21 | 7.5 HIGH | N/A |
The _user_resource_create function in the Services module 7.x-3.x before 7.x-3.10 for Drupal uses a password of 1 when creating new user accounts, which makes it easier for remote attackers to guess the password via a brute force attack. | |||||
CVE-2014-9006 | 1 Monstra | 1 Monstra | 2024-11-21 | 5.0 MEDIUM | N/A |
Monstra 3.0.1 and earlier uses a cookie to track how many login attempts have been attempted, which allows remote attackers to conduct brute force login attacks by deleting the login_attempts cookie or setting it to certain values. | |||||
CVE-2014-8656 | 1 Compal Broadband Networks | 3 Cg6640e Wireless Gateway, Ch664oe Wireless Gateway, Firmware | 2024-11-21 | 10.0 HIGH | N/A |
The Compal Broadband Networks (CBN) CH6640E and CG6640E Wireless Gateway 1.0 with firmware CH6640-3.5.11.7-NOSH have a default password of (1) admin for the admin account and (2) compalbn for the root account, which makes it easier for remote attackers to obtain access to certain sensitive information via unspecified vectors. |