mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
108 lines
4.0 KiB
JSON
108 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2004-2777",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-08-04T14:59:05.237",
|
|
"lastModified": "2024-11-20T23:54:11.903",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002 account of the GEMNet license server, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad en GE Healthcare Centricity Image Vault 3.x, tiene una contrase\u00f1a de (1) gemnet para la cuenta del administrador, (2) webadmin para la cuenta del administrador webadmin de la librer\u00eda ASACA DVD, (3) un valor vac\u00edo para la cuenta gemsservice de Ultrasound Database y posiblemente (4) gemnet2002 para la cuenta gemnet2002 del servidor de licencia GEMNet, lo cual tiene un impacto y vectores de ataque no especificados. NOTA: no est\u00e1 claro si esta contrase\u00f1a es por defecto, embebida o dependiente de otro sistema o producto que requiera un valor fijo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 10.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-255"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:gehealthcare:centricity_image_vault_firmware:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6D41FBEE-6D2C-49E3-AEF9-EDAFE0C9E603"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/2010564-002E.pdf?REQ=RAA&DIRECTION=2010564-002&FILENAME=2010564-002E.pdf&FILEREV=E&DOCREV_ORG=E",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://twitter.com/digitalbond/status/619250429751222277",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/2010564-002E.pdf?REQ=RAA&DIRECTION=2010564-002&FILENAME=2010564-002E.pdf&FILEREV=E&DOCREV_ORG=E",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://twitter.com/digitalbond/status/619250429751222277",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |