Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> Enhydra Multiserver Default Password


Vulnerability Assessment Details

Enhydra Multiserver Default Password

Vulnerability Assessment Summary
Enhydra Multiserver Default Admin Password

Detailed Explanation for this Vulnerability Assessment


This system appears to be running the Enhydra application
server configured with the default administrator password
of 'enhydra'. A potential intruder could reconfigure this
service and use it to obtain full access to the system.

Solution: Please set a strong password of the 'admin' account.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Digital Defense Inc.

Cables, Connectors

NIB Intel PENTIUM III 1.2GHz 256KB L2 Cache Processor 370 Pin
$85.0
NIB Intel PENTIUM III 1.2GHz 256KB L2 Cache Processor 370 Pin pictureAMD A8-4500M Quad-Core 1.9GHz AM4500DEC44HJ OEM CPU C00018 - tested - US Seller
$9.9
AMD A8-4500M Quad-Core 1.9GHz AM4500DEC44HJ OEM CPU C00018 - tested - US Seller pictureAMD K6 2 processor 3D now vintage lapel pin badge
$9.99
AMD K6 2 processor 3D now  vintage lapel pin badge pictureIBM p520 8203-E4A 4U Server with 1x 4.7GHz Power6 CPU, 4Gb RAM - No Hard Drives
$199.99
IBM p520 8203-E4A 4U Server with 1x 4.7GHz Power6 CPU, 4Gb RAM - No Hard Drives picture


Discussions

No Discussions have been posted on this vulnerability.