Thintune L
by Esesix
CVEs (4)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2004-2050 | 0.00 | — | 0.00 | Dec 31, 2004 | eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell. | ||
| CVE-2004-2048 | 0.00 | — | 0.03 | Dec 31, 2004 | radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access. | ||
| CVE-2004-2049 | 0.00 | — | 0.00 | Dec 31, 2004 | eSeSIX Thintune thin clients running firmware 2.4.38 and earlier store sensitive usernames and passwords in cleartext in configuration files for the keeper library, which allows attackers to gain access. | ||
| CVE-2004-2051 | 0.00 | — | 0.01 | Jul 24, 2004 | The Phoenix browser in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allows local users to read arbitrary files via a file:/// URL. |
- CVE-2004-2050Dec 31, 2004risk 0.00cvss —epss 0.00
eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell.
- CVE-2004-2048Dec 31, 2004risk 0.00cvss —epss 0.03
radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access.
- CVE-2004-2049Dec 31, 2004risk 0.00cvss —epss 0.00
eSeSIX Thintune thin clients running firmware 2.4.38 and earlier store sensitive usernames and passwords in cleartext in configuration files for the keeper library, which allows attackers to gain access.
- CVE-2004-2051Jul 24, 2004risk 0.00cvss —epss 0.01
The Phoenix browser in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allows local users to read arbitrary files via a file:/// URL.