漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
MEDHOST Connex contains hard-coded credentials that are used for customer database access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the database may be able to obtain or modify sensitive patient and financial information. Connex utilizes an IBM i DB2 user account for database access. The account name is HMSCXPDN. Its password is hard-coded in multiple places in the application. Customers do not have the option to change this password. The account has elevated DB2 roles, and can access all objects or database tables on the customer DB2 database. This account can access data through ODBC, FTP, and TELNET. Customers without Connex installed are still vulnerable because the MEDHOST setup program creates this account.
漏洞信息
N/A
漏洞
N/A
漏洞
MEDHOST Connex 安全漏洞
漏洞信息
MEDHOST Connex是美国MEDHOST公司的一款医疗设备。 MEDHOST Connex中存在安全漏洞,该漏洞源于程序含有硬编码证书。攻击者可利用该漏洞获取或修改敏感的患者和财务信息。
漏洞信息
N/A
漏洞
N/A