Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sybase EAServer Default Administrator password


Vulnerability Assessment Details

Sybase EAServer Default Administrator password

Vulnerability Assessment Summary
Checks for default administrator password in Sybase EAServer

Detailed Explanation for this Vulnerability Assessment

This host appears to be the running the Sybase EAServer Management
with the default administrator accounts still configured (jagadmin/'').
A potential intruder could reconfigure this service in a way that grants
system access.

Solution : Change default administrator password.
Network Security Threat Level: High

Networks Security ID: 14287

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

eDevice WireT Network Converter, Analog (RJ11) to Ether/LAN (RJ45) IE Telehealth
$9.99
eDevice WireT Network Converter, Analog (RJ11) to Ether/LAN (RJ45) IE Telehealth pictureNORTEL MM-4T1E1 300-70088-02 4 Port SR2104006E5 Module AND Secure Router 3120
$215.0
NORTEL MM-4T1E1 300-70088-02 4 Port SR2104006E5 Module AND  Secure Router 3120 pictureDell PowerConnect 6248 48-Port Stacking D.O.A. 0GP931
$19.95
Dell PowerConnect 6248 48-Port Stacking D.O.A. 0GP931 picture*2* HP ProCurve 20-Port 10/100/1000 PoE+ and 4-Port Mini-GBIC zl Module J9308A
$179.95
*2* HP ProCurve 20-Port 10/100/1000 PoE+ and 4-Port Mini-GBIC zl Module J9308A picture


Discussions

No Discussions have been posted on this vulnerability.