ID CVE-1999-0502
Summary A Unix account has a default, null, blank, or missing password.
References
Vulnerable Configurations
  • HP HP-UX 10.20
    cpe:2.3:o:hp:hp-ux:10.20
  • HP-UX 11 family
    cpe:2.3:o:hp:hp-ux:11
  • Red Hat Linux 6.0
    cpe:2.3:o:redhat:linux:6.0
  • Sun Solaris 2.6
    cpe:2.3:o:sun:solaris:2.6
  • Sun Microsystems Solaris 2.5.1
    cpe:2.3:o:sun:sunos:5.5.1
  • Sun Microsystems Solaris 7
    cpe:2.3:o:sun:sunos:5.7
  • Sun SunOS (Solaris 8) 5.8
    cpe:2.3:o:sun:sunos:5.8
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
id EDB-ID:41694
last seen 2018-11-30
modified 1999-01-01
published 1999-01-01
reporter Exploit-DB
source https://www.exploit-db.com/download/41694
title SSH - User Code Execution (Metasploit)
metasploit via4
nessus via4
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_PUBLIC_PUBLIC.NASL
    description The account 'public' on the remote host has the password 'public'. An attacker may use this to gain further privileges on this system.
    last seen 2018-11-16
    modified 2018-11-15
    plugin id 17290
    published 2005-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17290
    title Default Password (public) for 'public' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_DOTTIE.NASL
    description The account 'root' has the password 'dottie'. An attacker may use this to gain further privileges on this system
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 31800
    published 2008-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31800
    title Default Password (dottie) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_USER_DEBUG.NASL
    description The account 'user' on the remote host has the password 'debug'. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17293
    published 2005-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17293
    title Default Password (debug) for 'user' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_MPI.NASL
    description The account 'mpi' on the remote host does not have a password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 18527
    published 2005-06-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18527
    title Unpassworded 'mpi' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_USER_FORGOT.NASL
    description The account 'user' on the remote host has the password 'forgot'. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17294
    published 2005-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17294
    title Default Password (forgot) for 'user' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_HPSUPPORT_BADG3R5.NASL
    description The account 'HPSupport' on the remote host has the password 'badg3r5'. An attacker may leverage this issue to gain administrative access to the affected system. Note that HP StoreOnce D2D Backup systems running software version 2.2.17 / 1.2.17 or older are known to have an account that uses these credentials.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 67005
    published 2013-06-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67005
    title Default Password (badg3r5) for 'HPSupport' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_GUEST_GUEST.NASL
    description The account 'guest' has the password 'guest' set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11256
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11256
    title Default Password (guest) for 'guest' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DBADMIN_SQUS3R.NASL
    description The account 'dbadmin' on the remote host has the password 'sq!us3r'. An attacker may leverage this issue to gain access to the affected system. Note that RioRey RIOS appliances, used for dynamic denial of service mitigation, are reported to use these credentials to support connections from rVIEW, the vendor's central management and configuration tool, and that an attacker reportedly may be able to escalate privileges through several vulnerabilities to gain full control over the device.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 42147
    published 2009-10-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42147
    title Default Password (sq!us3r) for 'dbadmin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_DASDEC1.NASL
    description The account 'root' on the remote host has the password 'dasdec1'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 68959
    published 2013-07-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68959
    title Default password (dasdec1) for 'root' account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_M.NASL
    description The account 'root' on the remote host has the password 'm'. An attacker may leverage this issue to gain access to the affected system. Note that some Camtron IP cameras are reported to use these credentials by default.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 50601
    published 2010-11-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50601
    title Default Password (m) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SUPER_FORGOT.NASL
    description The account 'super' on the remote host has the password 'forgot'. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17292
    published 2005-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17292
    title Default Password (forgot) for 'super' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SUPER_DEBUG.NASL
    description The account 'super' on the remote host has the password 'debug'. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17291
    published 2005-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17291
    title Default Password (debug) for 'super' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_EMCUPDATE_PASSWORD.NASL
    description The account 'emcupdate' on the remote EMC PowerPath virtual appliance has the default password 'password'. An attacker can leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 83783
    published 2015-05-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83783
    title Default Password (password) for 'emcupdate' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DB2INST1_IBMDB2.NASL
    description The account 'db2inst1' has the password 'ibmdb2'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11859
    published 2003-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11859
    title Default Password (ibmdb2) for 'db2inst1' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DB2AS_DB2AS.NASL
    description The account 'db2as' has the password 'db2as'. An attacker may use it to gain further privileges on the system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11864
    published 2003-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11864
    title Default Password (db2as) for 'db2as' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DB2FENC1_IBMDB2.NASL
    description The account 'db2fenc1' has the password 'ibmdb2'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11861
    published 2003-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11861
    title Default Password (ibmdb2) for 'db2fenc1' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_PASSWORD.NASL
    description The account 'root' has the password 'password'. An attacker may use it to gain further privileges on this system. Note that Korenix Jetport installs are known to use these credentials although other hosts are likely to as well as 'password' is reportedly a common password.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 24745
    published 2007-03-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24745
    title Default Password (password) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_XC3511.NASL
    description The account 'root' on the remote host has the default password 'xc3511'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 94400
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94400
    title Default Password 'xc3511' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DB2AS_IBMDB2.NASL
    description The account 'db2as' has the password 'ibmdb2'. An attacker may use it to gain further privileges on the system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11863
    published 2003-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11863
    title Default Password (ibmdb2) for 'db2as' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DB2INST1_DB2INST1.NASL
    description The account 'db2inst1' has the password 'db2inst1'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 11862
    published 2003-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11862
    title Default Password (db2inst) for 'db2inst1' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ANKO.NASL
    description The account 'root' on the remote host has the default password 'anko'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94387
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94387
    title Default Password 'anko' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_GUEST.NASL
    description The account 'guest' has no password set. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11240
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11240
    title Unpassworded 'guest' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_CHANGEMENOW.NASL
    description The account 'root' on the remote host has the password 'changemenow'. An attacker can leverage this issue to gain administrative access to the affected system. Note that Splunk virtual appliances are known to use these credentials to provide administrative access to the host.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 81168
    published 2015-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81168
    title Default Password (changemenow) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_54321.NASL
    description The account 'admin' on the remote host has the default password '54321'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94366
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94366
    title Default Password '54321' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_USER_USER.NASL
    description The account 'user' on the remote host has the password 'user'. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 62203
    published 2012-09-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62203
    title Default Password (user) for 'user' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SERVICE_SERVICE.NASL
    description The account 'service' on the remote host has the default password 'service'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94403
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94403
    title Default Password 'service' for 'service' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_ADMIN.NASL
    description The account 'admin' on the remote host has the password 'admin'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 34081
    published 2008-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34081
    title Default Password (admin) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_CLIUSER_CLIUSER.NASL
    description The account 'cliuser' on the remote host has the password 'cliuser'. An attacker may leverage this issue to gain administrative access to the affected system. Note that Cisco Unified Computing System Platform Emulator is known to use these credentials to provide administrative access to the CLI.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 69920
    published 2013-09-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69920
    title Default Password (cliuser) for 'cliuser' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_DREAMBOX.NASL
    description The account 'root' on the remote host has the default password 'anko'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94388
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94388
    title Default Password 'dreambox' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_FRIDAY.NASL
    description The account 'friday' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11254
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11254
    title Unpassworded 'friday' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_12345.NASL
    description The account 'admin' on the remote host has the default password '12345'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94363
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94363
    title Default Password '12345' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_1234.NASL
    description The account 'admin' on the remote host has the default password '1234'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94362
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94362
    title Default Password '1234' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ROOTKIT1.NASL
    description The account 'root' has the password 'D13HH['. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11261
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11261
    title Default Password (D13HH[) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_NASADMIN_NASADMIN.NASL
    description The account 'nasadmin' on the remote host has the password 'nasadmin'. An attacker may leverage this to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 57917
    published 2012-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57917
    title Default Password (nasadmin) for 'nasadmin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_STOOGR.NASL
    description The account 'StoogR' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11259
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11259
    title Unpassworded 'StoogR' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_ABC123.NASL
    description The account 'admin' on the remote host has the default password 'abc123'. An attacker can leverage this issue to gain full access to the affected system. Note that Junos Space is known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 80190
    published 2014-12-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80190
    title Default Password (abc123) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_BACKDOOR.NASL
    description The account 'backdoor' has no password set. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11250
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11250
    title Unpassworded 'backdoor' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_EZSETUP.NASL
    description The account 'EZsetup' has no password set. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11241
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11241
    title Unpassworded 'EZsetup' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_USER.NASL
    description The account 'root' on the remote host has the default password 'user'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94398
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94398
    title Default Password 'user' for 'root' Account
  • NASL family CGI abuses
    NASL id DDI_NETSCAPE_ENTERPRISE_DEFAULT_ADMINISTRATIVE_PASSWORD.NASL
    description This host is running Netscape Enterprise Server. The administrative interface for this web server is using the default username and password of 'admin'. An attacker can use this to reconfigure the web server, cause a denial of service condition, or gain access to this host.
    last seen 2019-02-21
    modified 2018-06-13
    plugin id 11208
    published 2003-01-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11208
    title Netscape Enterprise Default Administrative Password
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ALIEN.NASL
    description The account 'root' on the remote host has the password 'alien'. An attacker may leverage this issue to gain access, likely as an administrator, to the affected system. Note that DD-WRT, an open source Linux-based firmware popular on small routers and embedded systems, is known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 46240
    published 2010-05-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=46240
    title Default Password (alien) for 'root' Account
  • NASL family Misc.
    NASL id PIRELLI_ROUTER_DEFAULT_PASSWORD.NASL
    description The remote host is a Pirelli AGE mB (microBusiness) router with its default password set (admin/microbusiness). An attacker could telnet to it and reconfigure it to lock the owner out and to prevent him from using his Internet connection, and do bad things.
    last seen 2019-02-21
    modified 2015-10-09
    plugin id 12641
    published 2004-07-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=12641
    title Pirelli AGE mB Router Default Password (microbusiness) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMINISTRATOR_MEINSM.NASL
    description The account 'Administrator' on the remote host has the default password 'meinsm'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94373
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94373
    title Default Password 'meinsm' for 'Administrator' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DEMOS.NASL
    description The account 'demos' has no password set. An attacker may use this account to gain further privileges on the system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11242
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11242
    title Unpassworded 'demos' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_1111.NASL
    description The account 'root' on the remote host has the default password '1111'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94377
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94377
    title Default Password '1111' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_GUEST_12345.NASL
    description The account 'guest' on the remote host has the default password '12345'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94374
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94374
    title Default Password '12345' for 'guest' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_IKWB.NASL
    description The account 'root' on the remote host has the default password 'ikwb'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94390
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94390
    title Default Password 'ikwb' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_PASS.NASL
    description The account 'admin' on the remote host has the default password 'pass'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94370
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94370
    title Default Password 'pass' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_123456.NASL
    description The account 'root' on the remote host has the default password '123456'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94380
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94380
    title Default Password '123456' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_OPERATOR_PROFENSE.NASL
    description The account 'operator' on the remote host has the password 'profense'. An attacker may leverage this to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 35559
    published 2009-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35559
    title Default Password (profense) for 'operator' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_GLFTPD.NASL
    description The account 'glftpd' has the password 'glftpd'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11258
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11258
    title Default Password (glftpd) for 'glftpd' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_JILL.NASL
    description The account 'jill' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11266
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11266
    title Unpassworded 'jill' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_4DGIFTS.NASL
    description The account '4Dgifts' has no password set. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11243
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11243
    title Unpassworded '4Dgifts' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SUPERVISOR_SUPERVISOR.NASL
    description The account 'supervisor' on the remote host has the default password 'supervisor'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94404
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94404
    title Default Password 'supervisor' for 'supervisor' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ARCSIGHT.NASL
    description The account 'root' on the remote host has the password 'arcsight'. An attacker may leverage this issue to gain total control of the affected system. Note that some network devices are known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 69443
    published 2013-08-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69443
    title Default Password (arcsight) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT.NASL
    description The account 'root' has no password set.
    last seen 2018-09-02
    modified 2018-07-25
    plugin id 11245
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11245
    title Unpassworded 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_888888.NASL
    description The account 'root' on the remote host has the default password '888888'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94385
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94385
    title Default Password '888888' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_TRANS_TRANS.NASL
    description The account 'trans' on the remote host has the password 'trans'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 34084
    published 2008-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34084
    title Default Password (trans) for 'trans' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SYNC.NASL
    description The account 'sync' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11247
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11247
    title Unpassworded 'sync' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_RASPI.NASL
    description The account 'root' on the remote host has the password 'raspi'. An attacker may leverage this issue to gain full access to the affected system. Note that a version of Linux optimized for Raspberry Pi ARM computers is known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 64262
    published 2013-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64262
    title Default Password (raspi) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_TOOR.NASL
    description The account 'toor' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11252
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11252
    title Unpassworded 'toor' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ALPINE.NASL
    description The account 'root' on the remote host has the password 'alpine'. An attacker may leverage this issue to gain full access to the affected system. Note that iPhones are known to use these credentials by default and allow access via SSH when jailbroken.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 42367
    published 2009-11-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42367
    title Default Password (alpine) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_00000000.NASL
    description The account 'root' on the remote host has the default password '00000000'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94376
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94376
    title Default Password '00000000' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_NAGIOSXI_ROOT.NASL
    description It is possible to SSH into the remote Nagios XI virtual machine appliance by providing default credentials. A remote attacker could exploit this to gain complete control of the remote host.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 49773
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49773
    title Default Password (nagiosxi) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_NASADMIN.NASL
    description The account 'root' on the remote host has the password 'nasadmin'. An attacker may leverage this issue to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 57916
    published 2012-02-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57916
    title Default Password (nasadmin) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_RAIN.NASL
    description The account 'root' on the remote host has the password 'rain'. An attacker may leverage this to gain access, likely as an administrator, to the affected system. Note that EMC Cloud Tiering Appliance is known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 73371
    published 2014-04-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73371
    title Default Password (rain) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_REWT_SATORI.NASL
    description The account 'rewt' has the password 'satori'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11265
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11265
    title Default Password (satori) for 'rewt' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_JUANTECH.NASL
    description The account 'root' on the remote host has the default password 'juantech'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94391
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94391
    title Default Password 'juantech' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_PASSWORD.NASL
    description The account 'admin' on the remote host has the password 'password'. An attacker may leverage this issue to gain access, likely as an administrator, to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 35660
    published 2009-02-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35660
    title Default Password (password) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_MG3500_MERLIN.NASL
    description The account 'mg3500' on the remote host has the password 'merlin'. An attacker may leverage this issue to gain access to the affected system. Note that some Camtron IP cameras are reported to use these credentials by default.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 50602
    published 2010-11-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50602
    title Default Password (merlin) for 'mg3500' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DB2FENC1_DB2FENC1.NASL
    description The account 'db2fenc1' has the password 'db2fenc1'. An attacker may use this to gain further privileges on the system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11860
    published 2003-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11860
    title Default Password (db2fenc1) for 'db2fenc1' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_1111.NASL
    description The account 'admin' on the remote host has the default password '1111'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94360
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94360
    title Default Password '1111' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_SMCADMIN.NASL
    description The account 'admin' on the remote host has the default password 'smcadmin'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94371
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94371
    title Default Password 'smcadmin' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_SYSTEM.NASL
    description The account 'root' on the remote host has the default password 'system'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94397
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94397
    title Default Password 'system' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_HELP.NASL
    description The account 'help' on the remote host does not have a password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 17575
    published 2005-03-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17575
    title Unpassworded 'help' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_TESTPASS123.NASL
    description The account 'root' on the remote host has the password 'testpass123'. An attacker may leverage this to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 34418
    published 2008-10-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34418
    title Default Password (testpass123) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_OPENVPNAS.NASL
    description The account 'root' on the remote host has the password 'openvpnas'. An attacker may leverage this issue to gain administrative access to the affected system. Note that OpenVPN Access Server virtual appliances are known to use these credentials to provide complete, administrative access to the appliance.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 66693
    published 2013-05-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66693
    title Default Password (openvpnas) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_CHRONOS_FACEPUNCH.NASL
    description The account 'chronos' on the remote host has the password 'facepunch'. An attacker may leverage this issue to gain access to the affected system. Note that some builds of Chromium OS are known to use these credentials and allow one to gain root access with 'sudo'.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 65790
    published 2013-04-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65790
    title Default Password (facepunch) for 'chronos' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_MEINSM.NASL
    description The account 'admin' on the remote host has the default password 'meinsm'. A remote attacker can exploit this issue to gain administrative access to the affected system..
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94369
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94369
    title Default Password 'meinsm' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ADMIN.NASL
    description The account 'root' on the remote host has the password 'admin'. An attacker may leverage this issue to gain access, likely as an administrator, to the affected system. Note that DD-WRT, an open source Linux-based firmware popular on small routers and embedded systems, is known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 40355
    published 2009-07-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40355
    title Default Password (admin) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_PATROL_PATROL.NASL
    description The account 'patrol' on the remote host has the password 'patrol'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 50426
    published 2010-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50426
    title Default Password (patrol) for 'patrol' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_ADMIN1234.NASL
    description The account 'admin' on the remote host has the default password 'admin1234'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94368
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94368
    title Default Password 'admin1234' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_CENTREON.NASL
    description The account 'root' on the remote host has the default password 'centreon'. An attacker can leverage this issue to gain administrative access to the affected system. Note that Centreon Enterprise Server is known to use these credentials to provide complete, administrative access to the virtual appliance.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 80222
    published 2014-12-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80222
    title Default Password (centreon) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_JACK.NASL
    description The account 'jack' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11249
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11249
    title Unpassworded 'jack' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_0P3NM35H.NASL
    description The account 'root' on the remote host has the password '0p3nm35h'. An attacker may leverage this issue to gain total control of the affected system. Note that some network devices are known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 48274
    published 2010-08-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=48274
    title Default Password (0p3nm35h) for 'root' Account
  • NASL family Backdoors
    NASL id ACCOUNT_BASH.NASL
    description The account 'bash' has no password set. An attacker may use it to gain further privileges on this system. This account was likely created by a backdoor installed by a fake Linux RedHat patch.
    last seen 2019-02-21
    modified 2018-06-14
    plugin id 15583
    published 2004-10-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15583
    title Unpassworded 'bash' Backdoor Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_ADMINIWSS85.NASL
    description The account 'admin' on the remote host has the default password 'adminIWSS85'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 99246
    published 2017-04-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99246
    title Default Password 'adminIWSS85' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_TANDBERG.NASL
    description The account 'root' on the remote host has the password 'TANDBERG'. An attacker may leverage this issue to gain administrative access to the affected system. Note that Cisco TelePresence Conductor virtual appliances are known to use these credentials to provide complete, administrative access to the appliance.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 79583
    published 2014-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79583
    title Default Password (TANDBERG) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ADMINIWSS85.NASL
    description The account 'root' on the remote host has the default password 'adminIWSS85'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 99247
    published 2017-04-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99247
    title Default Password 'adminIWSS85' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_666666_666666.NASL
    description The account '666666' on the remote host has the default password '666666'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94356
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94356
    title Default Password '666666' for '666666' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ZLXX.NASL
    description The account 'root' on the remote host has the default password 'zlxx.'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94402
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94402
    title Default Password 'zlxx.' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_VIZXV.NASL
    description The account 'root' on the remote host has the default password 'vizxv'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94399
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94399
    title Default Password 'vizxv' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ROOTME.NASL
    description The account 'root' on the remote host has the password 'rootme'. An attacker may leverage this issue to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 34323
    published 2008-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34323
    title Default Password (rootme) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_MOTHER_FUCKER.NASL
    description The account 'mother' on the remote host has the default password 'f****r'. A remote attacker can exploit this issue to gain administrative access to the affected system. Note that this username / password combination was found in the leaked source from the Mirai botnet. The password has been masked in this description.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94375
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94375
    title Default Password 'f****r' for 'mother' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DEBUG_SYNNET.NASL
    description The account 'debug' on the remote host uses the password 'synnet'. An attacker may use it to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17289
    published 2005-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17289
    title Default Password (synnet) for 'debug' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_KLV1234.NASL
    description The account 'root' on the remote host has the default password 'klv1234'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94394
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94394
    title Default Password 'klv1234' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_7UJMKO0ADMIN.NASL
    description The account 'admin' on the remote host has the default password '7ujMko0admin'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94367
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94367
    title Default Password '7ujMko0admin' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_DEFAULT.NASL
    description The account 'root' on the remote host has the password 'default'. An attacker may leverage this issue to gain administrative access to the affected system. Note that F5 Networks is known to use these credentials to provide complete administrative access to its appliances.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 76941
    published 2014-07-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76941
    title Default Password (default) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ABC123.NASL
    description The account 'root' on the remote host has the password 'abc123'. An attacker may leverage this issue to gain full access to the affected system. Note that Junos Space is known to use these credentials by default.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 65820
    published 2013-04-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65820
    title Default Password (abc123) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ORACLE_ORACLE.NASL
    description The password for the account 'oracle' on the remote host is 'oracle'. An attacker may leverage this to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 24276
    published 2007-02-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24276
    title Default Password (oracle) for 'oracle' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_CMC_LEM.NASL
    description The account 'cmc' on the remote host has the default password 'password'. An attacker can leverage this issue to gain administrative access to the affected system. Note that SolarWinds Log and Event Manager is known to use these credentials to provide complete, administrative access to the virtual appliance.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 78914
    published 2014-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=78914
    title Default Password (password) for 'cmc' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_1111111.NASL
    description The account 'admin' on the remote host has the default password '1111111'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94361
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94361
    title Default Password '1111111' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMINISTRATOR_1234.NASL
    description The account 'administrator' on the remote host has the default password '1234'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94372
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94372
    title Default Password '1234' for 'administrator' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_OPENELEC.NASL
    description The account 'root' on the remote host has the password 'openelec'. An attacker can exploit this issue to gain full access to the affected system. Note that a version of Linux optimized for Raspberry Pi ARM computers is known to use these credentials by default.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 64261
    published 2013-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64261
    title Default Password (openelec) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_QWESTM0DEM.NASL
    description The account 'admin' on the remote host has the default password 'QwestM0dem'. A remote attacker can exploit this issue to gain administrative access to the affected system. Note that this username / password combination was found in the leaked source from the Mirai botnet.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 104974
    published 2017-12-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104974
    title Default Password 'QwestM0dem' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN1_PASSWORD.NASL
    description The account 'admin1' on the remote host has the default password 'password'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94359
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94359
    title Default Password 'password' for 'admin1' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_IRONPORT.NASL
    description The account 'admin' on the remote host has the password 'ironport'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 73298
    published 2014-04-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73298
    title Default Password (ironport) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_VMWARE.NASL
    description The account 'root' on the remote host has the password 'vmware'. An attacker may leverage this to gain administrator access to the affected system. Note that VMware vCenter Support Assistant Appliance and VMware vCenter Server Appliance are known to use these credentials.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 76993
    published 2014-08-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76993
    title Default Password (vmware) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ARKEIA.NASL
    description The account 'root' on the remote host has the password 'arkeia'. An attacker may leverage this issue to gain administrative access to the affected system. Note that Western Digital Arkeia is known to use these credentials to provide complete, administrative access to the virtual appliance.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 74217
    published 2014-05-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74217
    title Default Password (arkeia) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ROOTKIT2.NASL
    description The account 'root' has the password 'wh00t!'. An attacker may use this to gain further privileges on this system. This account suggests that the Wh00t Rootkit may be present on the system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11264
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11264
    title Default Password (wh00t!) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_TOOR.NASL
    description The account 'root' on the remote host has the password 'toor'. An attacker may leverage this issue to gain total control of the affected system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 35777
    published 2009-03-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35777
    title Default Password (toor) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_TUTOR.NASL
    description The account 'tutor' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11251
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11251
    title Unpassworded 'tutor' Account
  • NASL family FTP
    NASL id DDI_MPEIX_FTP_ACCOUNTS.NASL
    description The remote FTP server has one or more accounts with a blank password.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11000
    published 2002-06-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11000
    title MPEi/X Default FTP Accounts
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ENABLEDIAG.NASL
    description The account 'enablediag' on the remote host has the password 'ironport'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 73299
    published 2014-04-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73299
    title Default Password (ironport) for 'enablediag' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SUPPORT_SUPPORT.NASL
    description The account 'support' on the remote host has the default password 'support'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94405
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94405
    title Default Password 'support' for 'support' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_666666.NASL
    description The account 'root' on the remote host has the default password '666666'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94382
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94382
    title Default Password '666666' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_123456.NASL
    description The account 'admin' on the remote host has the default password '123456'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94364
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94364
    title Default Password '123456' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SUPERUSER_PASSW0RD.NASL
    description The account 'superuser' on the remote host has the password 'passw0rd'. An attacker can leverage this issue to gain administrative access to the affected system. Note that IBM Storwize devices are known to use these credentials to provide administrative access to the device.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 80964
    published 2015-01-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80964
    title Default Password (passw0rd) for 'superuser' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_HI3518.NASL
    description The account 'root' on the remote host has the default password 'hi3518'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94389
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94389
    title Default Password 'hi3518' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_JVBZD.NASL
    description The account 'root' on the remote host has the default password 'jvbzd'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94392
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94392
    title Default Password 'jvbzd' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_INFOBLOX.NASL
    description The account 'admin' on the remote host has the password 'infoblox'. An attacker may leverage this issue to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 42211
    published 2009-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42211
    title Default Password (infoblox) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN.NASL
    description The account 'admin' has no password set. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94358
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94358
    title Unprotected 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_7UJMKO0ADMIN.NASL
    description The account 'root' on the remote host has the default password '7ujMko0admin'. A remote attacker can exploit this issue to gain administrative access to the affected system..
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94383
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94383
    title Default Password '7ujMko0admin' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_7UJMKO0VIZXV.NASL
    description The account 'root' on the remote host has the default password '7ujMko0vizxv'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94384
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94384
    title Default Password '7ujMko0vizxv' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_INFORMIX_INFORMIX.NASL
    description The password for the account 'informix' on the remote host is 'informix'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 24275
    published 2007-02-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=24275
    title Default Password (informix) for 'informix' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_12345.NASL
    description The account 'root' on the remote host has the default password '12345'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94379
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94379
    title Default Password '12345' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_NAS4FREE.NASL
    description The account 'root' on the remote host has the password 'nas4free'. An attacker may leverage this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 73684
    published 2014-04-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=73684
    title Default Password (nas4free) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ZTE521.NASL
    description The account 'root' on the remote host has the default password 'Zte521'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94386
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94386
    title Default Password 'Zte521' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_54321.NASL
    description The account 'root' on the remote host has the default password '54321'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94381
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94381
    title Default Password '54321' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_XMHDIPC.NASL
    description The account 'root' on the remote host has the default password 'xmhdipc'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94401
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94401
    title Default Password 'xmhdipc' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_PASSW0RD.NASL
    description The account 'admin' on the remote host has the default password 'P@ssw0rd'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94670
    published 2016-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94670
    title Default Password 'P@ssw0rd' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_NETOPTICS.NASL
    description The account 'admin' on the remote host has the password 'netoptics'. An attacker may leverage this issue to gain administrative access to the affected system. Note that Net Optics taps are known to use these credentials as factory defaults.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 70565
    published 2013-10-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70565
    title Default Password (netoptics) for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SWIFT_SWIFT.NASL
    description The account 'swift' has the password 'swift'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 12116
    published 2004-03-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=12116
    title Default Password (swift) for 'swift' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_MOBILE_ALPINE.NASL
    description The account 'mobile' on the remote host has the password 'alpine'. An attacker may leverage this issue to gain access to the affected system. Note that iPhones are known to use these credentials by default and allow access via SSH when jailbroken.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 42368
    published 2009-11-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42368
    title Default Password (alpine) for 'mobile' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_888888_888888.NASL
    description The account '888888' on the remote host has the default password '888888'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94357
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94357
    title Default Password '888888' for '888888' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ARTICA.NASL
    description The account 'root' on the remote host has the password 'artica'. An attacker may leverage this issue to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 50322
    published 2010-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50322
    title Default Password (artica) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_OUTOFBOX.NASL
    description The account 'OutOfBox' has no password set. An attacker may use the account to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11244
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11244
    title Unpassworded 'OutOfBox' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_BANK_BANK.NASL
    description The account 'bank' on the remote host has the default password 'bank'. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 34082
    published 2008-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34082
    title Default Password (bank) for 'bank' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_CHECK.NASL
    description In order to avoid false positives, this plugin determines if the remote system accepts any kind of login. Some SSH implementations claim that a login has been accepted when it has not.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 55900
    published 2011-08-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55900
    title Remote Authentication Message Check
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_R00T.NASL
    description The account 'r00t' on the remote host has no password. An attacker may leverage this issue to gain access to the affected system and launch further attacks against it.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 34083
    published 2008-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34083
    title Unpassworded 'r00t' account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_REALTEK.NASL
    description The account 'root' on the remote host has the default password 'realtek'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94396
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94396
    title Default Password 'realtek' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_NSROOT_NSROOT.NASL
    description The account 'nsroot' on the remote host has the password 'nsroot'. An attacker may leverage this issue to gain administrative access to the affected system. Note that Citrix NetScaler appliances are known to use these credentials to provide complete, administrative access to the Citrix NetScaler appliance.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 66393
    published 2013-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66393
    title Default Password (nsroot) for 'nsroot' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_LP.NASL
    description The account 'lp' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11246
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11246
    title Unpassworded 'lp' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ADMIN_4321.NASL
    description The account 'admin' on the remote host has the default password '4321'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94365
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94365
    title Default Password '4321' for 'admin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_F00BAR.NASL
    description The account 'root' on the remote host has the password 'f00b@r'. An attacker may leverage this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-21
    plugin id 76191
    published 2014-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76191
    title Default Password (f00b@r) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_PASS.NASL
    description The account 'root' on the remote host has the default password 'pass'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94395
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94395
    title Default Password 'pass' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_HAX0R.NASL
    description The account 'hax0r' has no password set. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11253
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11253
    title Unpassworded 'hax0r' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_GFORGE.NASL
    description The account 'root' on the remote host has the password 'gforge'. An attacker may leverage this issue to gain total control of the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 34417
    published 2008-10-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34417
    title Default Password (gforge) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_1234.NASL
    description The account 'root' on the remote host has the default password '1234'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94378
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94378
    title Default Password '1234' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id MACOSX_SERVER_DEFAULT_PASSWORD.NASL
    description Nessus was able to login to the remote host using the following credentials : Username : root Password : 12345678 On older Macintosh computers, Mac OS X server is configured with this default account (on newer computers, the serial number of the system is used instead).
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 12513
    published 2004-07-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=12513
    title Default Password (12345678) for 'root' Account on MacOS X Server
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_DATE.NASL
    description The account 'date' has no password set. An attacker can leverage this to gain access to the system.
    last seen 2019-02-21
    modified 2018-07-25
    plugin id 11248
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11248
    title Unpassworded 'date' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_PI_RASPBERRY.NASL
    description The account 'pi' on the remote host has the password 'raspberry'. An attacker may leverage this issue to gain full access to the affected system. Note that a version of Linux optimized for Raspberry Pi ARM computers is known to use these credentials by default.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 64260
    published 2013-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64260
    title Default Password (raspberry) for 'pi' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ROOTKIT1BIS.NASL
    description The account 'root' has the password 'D13hh['. An attacker may use it to gain further privileges on this system. The presence of this account suggests the system may have the D13HH rootkit (typically found on Solaris systems).
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11262
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11262
    title Default Password (D13hh[) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SPLUNKADMIN_CHANGEME.NASL
    description The account 'splunkadmin' on the remote host has the password 'changeme'. An attacker can leverage this issue to gain administrative access to the affected system. Note that Splunk virtual appliances are known to use these credentials to provide administrative access to the host.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 81169
    published 2015-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81169
    title Default Password (changeme) for 'splunkadmin' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_SYSTEM_MANAGER.NASL
    description The account 'system' has the password 'manager'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11257
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11257
    title Default Password (manager) for 'system' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_TECH_TECH.NASL
    description The account 'tech' on the remote host has the default password 'tech'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94406
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94406
    title Default Password 'tech' for 'tech' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_GAMEZ_LRKR0X.NASL
    description The account 'gamez' has the password 'lrkr0x'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11263
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11263
    title Default Password (lrkr0x) for 'gamez' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_ROOT.NASL
    description The account 'root' on the remote host has the password 'root'. An attacker may leverage this issue to gain total control of the affected system. Note that, while SKIDATA Freemotion.Gate controllers are known to use these credentials, this plugin reports any time it finds a host using these credentials, regardless of its type.
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 11255
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11255
    title Default Password (root) for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_UBNT_UBNT.NASL
    description The account 'ubnt' on the remote host has the default password 'ubnt'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94407
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94407
    title Default Password 'ubnt' for 'ubnt' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_NEXTHINK_123456.NASL
    description The account 'nexthink' on the remote host has the password '123456'. An attacker can leverage this issue to gain administrative access to the affected system. Note that Nexthink is known to use these credentials to provide administrative access to the host.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 82505
    published 2015-04-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82505
    title Default Password (123456) for 'nexthink' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_ROOT_KLV123.NASL
    description The account 'root' on the remote host has the default password 'klv123'. A remote attacker can exploit this issue to gain administrative access to the affected system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 94393
    published 2016-10-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94393
    title Default Password 'klv123' for 'root' Account
  • NASL family Default Unix Accounts
    NASL id ACCOUNT_WANK_WANK.NASL
    description The account 'wank' has the password 'wank'. An attacker may use this to gain further privileges on this system.
    last seen 2019-02-21
    modified 2017-11-20
    plugin id 11260
    published 2003-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=11260
    title Default Password (wank) for 'wank' Account
packetstorm via4
saint via4
description SSH password weakness
id pass_guessed
title ssh_login
type remote
Last major update 09-09-2008 - 08:34
Published 01-03-1998 - 00:00
Last modified 30-10-2018 - 12:26
Back to Top