Show filters
123 Total Results
Displaying 111-120 of 123
Sort by:
Attacker Value
Unknown

CVE-2006-7253

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
GE Healthcare Infinia II has a default password of (1) infinia for the infinia user, (2) #bigguy1 for the acqservice user, (3) dont4get2 for the Administrator user, (4) #bigguy1 for the emergency user, and (5) 2Bfamous for the InfiniaAdmin user, which has unspecified impact and attack vectors.
0
Attacker Value
Unknown

CVE-2012-6694

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1, and Server 4.0, has a password of 2charGE for the geservice account, which has unspecified impact and attack vectors related to TimbuktuPro. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires it.
0
Attacker Value
Unknown

CVE-2011-5324

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
The TeraRecon server, as used in GE Healthcare Centricity PACS-IW 3.7.3.7, 3.7.3.8, and possibly other versions, has a password of (1) shared for the shared user and (2) scan for the scan user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
0
Attacker Value
Unknown

CVE-2014-7232

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
GE Healthcare Discovery XR656 and XR656 G2 has a password of (1) 2getin for the insite user, (2) 4$xray for the xruser user, and (3) #superxr for the root user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value.
0
Attacker Value
Unknown

CVE-2003-1603

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
GE Healthcare Discovery VH has a default password of (1) interfile for the ftpclient user of the Interfile server or (2) "2" for the LOCAL user of the FTP server for the Codonics printer, which has unspecified impact and attack vectors.
0
Attacker Value
Unknown

CVE-2012-6695

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1 has a password of ddpadmin for the ddpadmin user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
0
Attacker Value
Unknown

CVE-2010-5307

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
The HIPAA configuration interface in GE Healthcare Optima MR360 has a password of (1) operator for the root account, (2) adw2.0 for the admin account, and (3) adw2.0 for the sdc account, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value.
0
Attacker Value
Unknown

CVE-2002-2446

Disclosure Date: August 04, 2015 (last updated October 05, 2023)
GE Healthcare Millennium MG, NC, and MyoSIGHT has a password of insite.genieacq for the insite account that cannot be changed without disabling product functionality for remote InSite support, which has unspecified impact and attack vectors.
0
Attacker Value
Unknown

CVE-2014-7562

Disclosure Date: October 20, 2014 (last updated October 05, 2023)
The Health Advocate SmartHelp (aka com.healthadvocate.ui) application 3.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown

CVE-2014-7360

Disclosure Date: October 19, 2014 (last updated October 05, 2023)
The How To Boil Eggs (aka com.appmakr.app842173) application 251333 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0