Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> POP Password Changer Unauthorized Password Change Vulnerability


Vulnerability Assessment Details

POP Password Changer Unauthorized Password Change Vulnerability

Vulnerability Assessment Summary
Acertains if POP Password Changer is vulnerable to access control bypass.

Detailed Explanation for this Vulnerability Assessment

The remote host is running POP Password Changer, a server to change
POP user's passwords.

According to the version number, the remote software is vulnerable
to an unauthorized access. A possible hacker, exploiting this flaw, will
be able to change user's password.

Solution : Ensure that you are running a patched or more recent version of this software.
Network Security Threat Level: High

Networks Security ID: 12240

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Super Micro CSE-825 SERVER W X9DRL-iF, Dual LGA 2011 Motherboard Heatsinks,1psu
$240.0
Super Micro CSE-825 SERVER W X9DRL-iF, Dual LGA 2011 Motherboard Heatsinks,1psu pictureNew Tray Carrier Bracket dust prevention dustproof for HP Microserver Gen8
$9.98
New Tray Carrier Bracket dust prevention dustproof for HP Microserver Gen8 picture100pcs 4Pin FDD Floppy to 2-Port 15Pin SATA Female Cable for HP Microserver Gen8
$155.0
100pcs 4Pin FDD Floppy to 2-Port 15Pin SATA Female Cable for HP Microserver Gen8 picture5x 4Pin FDD Floppy Female to 15Pin SATA Female HDD Cable for HP Microserver Gen8
$9.68
5x 4Pin FDD Floppy Female to 15Pin SATA Female HDD Cable for HP Microserver Gen8 picture


Discussions

No Discussions have been posted on this vulnerability.