Vulnerabilities (CVE)

Filtered by CWE-255
Total 729 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-6660 1 Gehealthcare 1 Precision Mpi 2025-04-12 10.0 HIGH N/A
GE Healthcare Precision MPi has a password of (1) orion for the serviceapp user, (2) orion for the clinical operator user, and (3) PlatinumOne for the administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value.
CVE-2014-4012 1 Sap 1 Open Hub Service 2025-04-12 5.0 MEDIUM N/A
SAP Open Hub Service has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
CVE-2016-2203 1 Symantec 1 Messaging Gateway 2025-04-12 2.1 LOW 7.8 HIGH
The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to discover an encrypted AD password by leveraging certain read privileges.
CVE-2014-4011 1 Sap 1 Capacity Leveling 2025-04-12 5.0 MEDIUM N/A
SAP Capacity Leveling has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
CVE-2014-6607 1 Mmonit 1 M\/monit 2025-04-12 7.5 HIGH N/A
M/Monit 3.3.2 and earlier does not verify the original password before changing passwords, which allows remote attackers to change the password of other users and gain privileges via the fullname and password parameters, a different vulnerability than CVE-2014-6409.
CVE-2015-3001 1 Sysaid 1 Sysaid 2025-04-12 5.0 MEDIUM N/A
SysAid Help Desk before 15.2 uses a hardcoded password of Password1 for the sa SQL Server Express user account, which allows remote authenticated users to bypass intended access restrictions by leveraging knowledge of this password.
CVE-2014-9251 1 Zenoss 1 Zenoss Core 2025-04-12 5.0 MEDIUM N/A
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.
CVE-2015-7277 1 Ampedwireless 2 R10000, R10000 Firmware 2025-04-12 9.3 HIGH 9.8 CRITICAL
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
CVE-2014-4788 1 Ibm 1 Initiate Master Data Service 2025-04-12 5.0 MEDIUM N/A
IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
CVE-2014-2014 1 Imapsync Project 1 Imapsync 2025-04-12 4.3 MEDIUM N/A
imapsync before 1.584, when running with the --tls option, attempts a cleartext login when a certificate verification failure occurs, which allows remote attackers to obtain credentials by sniffing the network.
CVE-2014-7232 1 Gehealthcare 2 Discovery Xr656, Discovery Xr656 G2 2025-04-12 10.0 HIGH N/A
GE Healthcare Discovery XR656 and XR656 G2 has a password of (1) 2getin for the insite user, (2) 4$xray for the xruser user, and (3) #superxr for the root user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value.
CVE-2012-6693 1 Gehealthcare 1 Centricity Pacs Server 2025-04-12 10.0 HIGH N/A
GE Healthcare Centricity PACS 4.0 Server has a default password of (1) nasro for the nasro (ReadOnly) user and (2) nasrw for the nasrw (Read/Write) user, which has unspecified impact and attack vectors.
CVE-2015-1842 1 Redhat 1 Openstack 2025-04-12 10.0 HIGH N/A
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors.
CVE-2014-4811 1 Ibm 5 San Volume Controller Software, Storwize V3500, Storwize V3700 and 2 more 2025-04-12 7.5 HIGH N/A
IBM Storwize 3500, 3700, 5000, and 7000 devices and SAN Volume Controller 6.x and 7.x before 7.2.0.8 allow remote attackers to reset the administrator superuser password to its default value via a direct request to the administrative IP address.
CVE-2016-9479 1 B2evolution 1 B2evolution 2025-04-12 5.0 MEDIUM 7.5 HIGH
The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbitrary user passwords via a crafted request.
CVE-2015-2874 2 Lacie, Seagate 7 Lac9000436u, Lac9000436u Firmware, Lac9000464u and 4 more 2025-04-12 10.0 HIGH 9.8 CRITICAL
Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 have a default password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session.
CVE-2014-4875 1 Toshiba 1 Chec 2025-04-12 5.0 MEDIUM N/A
CreateBossCredentials.jar in Toshiba CHEC before 6.6 build 4014 and 6.7 before build 4329 contains a hardcoded AES key, which allows attackers to discover Back Office System Server (BOSS) DB2 database credentials by leveraging knowledge of this key in conjunction with bossinfo.pro read access.
CVE-2015-5988 1 Zyxel 1 Gs1900-10hp Firmware 2025-04-12 9.3 HIGH 9.8 CRITICAL
The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
CVE-2010-5310 1 Gehealthcare 1 Revolution Xq\/i 2025-04-12 10.0 HIGH N/A
The Acquisition Workstation for the GE Healthcare Revolution XQ/i has a password of adw3.1 for the sdc user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
CVE-2014-1644 1 Symantec 1 Liveupdate Administrator 2025-04-12 7.5 HIGH N/A
The forgotten-password feature in forcepasswd.do in the management GUI in Symantec LiveUpdate Administrator (LUA) 2.x before 2.3.2.110 allows remote attackers to reset arbitrary passwords by providing the e-mail address associated with a user account.