Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> Netscape Enterprise Default Administrative Password


Vulnerability Assessment Details

Netscape Enterprise Default Administrative Password

Vulnerability Assessment Summary
Netscape Enterprise Default Administrative Password

Detailed Explanation for this Vulnerability Assessment

This host is running the Netscape Enterprise Server. The Administrative
interface for this web server, which operates on port 8888/TCP, is using
the default username and password of 'admin'. A possible hacker can use this to
reconfigure the web server, cause a denial of service condition, or
gain access to this host.

Solution: Please assign the web administration console a difficult to guess
password.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Digital Defense Inc.

Cables, Connectors

Dell PERC H310 6Gb/s SAS/SATA/SSD RAID Adapter Card DP/N 0HV52W -QTY#
$27.0
Dell PERC H310 6Gb/s SAS/SATA/SSD RAID Adapter Card DP/N 0HV52W  -QTY# pictureDell H200 Perc PCIExpress SAS RAID Controller Card 47MCV High Profile
$32.0
Dell H200 Perc PCIExpress SAS RAID Controller Card 47MCV High Profile pictureHP ProLiant DL380 G7 Server 2×Six-Core Xeon 2.93GHz + 96GB RAM + 6×2TB SAS RAID
$486.86
HP ProLiant DL380 G7 Server 2×Six-Core Xeon 2.93GHz + 96GB RAM + 6×2TB SAS RAID pictureDELL PERC H330+ 12GB/S SAS EIGHT PORT PCI-E RAID CONTROLLER ADAPTER 75D1H-HIGH P
$115.0
DELL PERC H330+ 12GB/S SAS EIGHT PORT PCI-E RAID CONTROLLER ADAPTER 75D1H-HIGH P picture


Discussions

No Discussions have been posted on this vulnerability.