Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> Netscape Enterprise Default Administrative Password


Vulnerability Assessment Details

Netscape Enterprise Default Administrative Password

Vulnerability Assessment Summary
Netscape Enterprise Default Administrative Password

Detailed Explanation for this Vulnerability Assessment

This host is running the Netscape Enterprise Server. The Administrative
interface for this web server, which operates on port 8888/TCP, is using
the default username and password of 'admin'. A possible hacker can use this to
reconfigure the web server, cause a denial of service condition, or
gain access to this host.

Solution: Please assign the web administration console a difficult to guess
password.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Digital Defense Inc.

Cables, Connectors

Cisco Linksys EA3500
$1.0
Cisco Linksys EA3500 pictureCisco 74-2905-03 7920 series cradle
$9.99
Cisco 74-2905-03 7920 series cradle pictureCisco Catalyst WS-C3750X-48P-S No Power Supply - AM
$79.99
Cisco Catalyst WS-C3750X-48P-S No Power Supply - AM pictureGenuine CISCO X2-10GB-ZR TRANSCEIVER 10-2358-01 IPUIA08RAA
$750.0
Genuine CISCO X2-10GB-ZR TRANSCEIVER 10-2358-01 IPUIA08RAA picture


Discussions

No Discussions have been posted on this vulnerability.