Pyxis Supplystation
by Carefusion
CVEs (4)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2014-5423 | 0.00 | — | 0.00 | Oct 19, 2014 | CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 allows local users to obtain potentially sensitive information by reading a temporary (1) debugging file or (2) developer file. | ||
| CVE-2014-5422 | 0.00 | — | 0.00 | Oct 19, 2014 | CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 has a hardcoded service password, which makes it easier for remote attackers to obtain access via unspecified vectors. | ||
| CVE-2014-5421 | 0.00 | — | 0.00 | Oct 19, 2014 | CareFusion Pyxis SupplyStation 8.1 with hardware test tool 1.0.16 and earlier has a hardcoded database password, which makes it easier for local users to gain privileges by leveraging cabinet access. | ||
| CVE-2014-5420 | 0.00 | — | 0.00 | Oct 19, 2014 | CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 has a hardcoded application password, which makes it easier for remote authenticated users to obtain application-file access via unspecified vectors. |
- CVE-2014-5423Oct 19, 2014risk 0.00cvss —epss 0.00
CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 allows local users to obtain potentially sensitive information by reading a temporary (1) debugging file or (2) developer file.
- CVE-2014-5422Oct 19, 2014risk 0.00cvss —epss 0.00
CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 has a hardcoded service password, which makes it easier for remote attackers to obtain access via unspecified vectors.
- CVE-2014-5421Oct 19, 2014risk 0.00cvss —epss 0.00
CareFusion Pyxis SupplyStation 8.1 with hardware test tool 1.0.16 and earlier has a hardcoded database password, which makes it easier for local users to gain privileges by leveraging cabinet access.
- CVE-2014-5420Oct 19, 2014risk 0.00cvss —epss 0.00
CareFusion Pyxis SupplyStation 8.1 with hardware test tool before 1.0.16 has a hardcoded application password, which makes it easier for remote authenticated users to obtain application-file access via unspecified vectors.