Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sybase EAServer Default Administrator password


Vulnerability Assessment Details

Sybase EAServer Default Administrator password

Vulnerability Assessment Summary
Checks for default administrator password in Sybase EAServer

Detailed Explanation for this Vulnerability Assessment

This host appears to be the running the Sybase EAServer Management
with the default administrator accounts still configured (jagadmin/'').
A potential intruder could reconfigure this service in a way that grants
system access.

Solution : Change default administrator password.
Network Security Threat Level: High

Networks Security ID: 14287

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

PAIR -= SFP-BX-U20 1310/1550 SMF 20km LC =-, native Cisco firmware
$15.0
PAIR -= SFP-BX-U20 1310/1550 SMF 20km LC =-, native Cisco firmware picture790317-001 HP 562FLR SFP+ 2 PORT 10GB FC NIC 727054-B21
$260.0
790317-001 HP 562FLR SFP+ 2 PORT 10GB FC NIC 727054-B21 picture790317-001 HP 562FLR SFP+ 2 PORT 10GB FC NIC 727054-B21
$260.0
790317-001 HP 562FLR SFP+ 2 PORT 10GB FC NIC 727054-B21 pictureLot of 5 :: Comnet SFP-6 1000fx 1310nm 15km LC 2 Fiber MSA Compliant SFP
$120.0
Lot of 5 :: Comnet SFP-6 1000fx 1310nm 15km LC 2 Fiber MSA Compliant SFP picture


Discussions

No Discussions have been posted on this vulnerability.