Vulnerabilities > Esesix
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2004-12-31 | CVE-2004-2052 | Remote Security vulnerability in Thintune eSeSIX Thintune thin clients running firmware 2.4.38 and earlier accept any password that begins with the actual password, which makes it easier for users to conduct brute force password guessing. | 7.5 |
2004-12-31 | CVE-2004-2050 | Multiple vulnerability in eSeSIX Thintune Thin Client Devices eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell. | 4.6 |
2004-12-31 | CVE-2004-2049 | Multiple vulnerability in eSeSIX Thintune Thin Client Devices eSeSIX Thintune thin clients running firmware 2.4.38 and earlier store sensitive usernames and passwords in cleartext in configuration files for the keeper library, which allows attackers to gain access. | 4.6 |
2004-12-31 | CVE-2004-2048 | Multiple vulnerability in eSeSIX Thintune Thin Client Devices radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access. | 10.0 |
2004-07-24 | CVE-2004-2051 | Multiple vulnerability in eSeSIX Thintune Thin Client Devices The Phoenix browser in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allows local users to read arbitrary files via a file:/// URL. | 5.0 |