Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> Netscape Enterprise Default Administrative Password


Vulnerability Assessment Details

Netscape Enterprise Default Administrative Password

Vulnerability Assessment Summary
Netscape Enterprise Default Administrative Password

Detailed Explanation for this Vulnerability Assessment

This host is running the Netscape Enterprise Server. The Administrative
interface for this web server, which operates on port 8888/TCP, is using
the default username and password of 'admin'. A possible hacker can use this to
reconfigure the web server, cause a denial of service condition, or
gain access to this host.

Solution: Please assign the web administration console a difficult to guess
password.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Digital Defense Inc.

Cables, Connectors

1pcs 4GB DDR2 5300F 667Mhz 1.8V ECC 240-Pin CL5 Aluminum Memory Ram For Desktop
$7.69
1pcs 4GB DDR2 5300F 667Mhz 1.8V ECC 240-Pin CL5 Aluminum Memory Ram For Desktop picture16Gb ( 4 X 4Gb ) Ram Memory For Apple Mac Pro 2006 1St Gen 1,1 ( 16 Gb Ddr2 667M
$58.33
16Gb ( 4 X 4Gb ) Ram Memory For Apple Mac Pro 2006 1St Gen 1,1 ( 16 Gb Ddr2 667M pictureHP 669238-071 ECC Unbuffered 4GB x1 PC3-12800E 1.5v HMT351U7BFR8C-PB Memory Ram
$12.63
HP 669238-071 ECC Unbuffered 4GB x1 PC3-12800E 1.5v HMT351U7BFR8C-PB Memory Ram picture32GB 16GB Silicon Guitar USB 3.0/2.0 Flash Drive Memory Stick Pen Storage U Disk
$3.89
32GB 16GB Silicon Guitar USB 3.0/2.0 Flash Drive Memory Stick Pen Storage U Disk picture


Discussions

No Discussions have been posted on this vulnerability.