Логотип exploitDog
bind:CVE-2018-18929
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-18929

Количество 2

Количество 2

nvd логотип

CVE-2018-18929

больше 6 лет назад

The Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xmc6-5pwj-wqwj

больше 3 лет назад

The Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-18929

The Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.

CVSS3: 8.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-xmc6-5pwj-wqwj

The Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу