Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sybase EAServer Default Administrator password


Vulnerability Assessment Details

Sybase EAServer Default Administrator password

Vulnerability Assessment Summary
Checks for default administrator password in Sybase EAServer

Detailed Explanation for this Vulnerability Assessment

This host appears to be the running the Sybase EAServer Management
with the default administrator accounts still configured (jagadmin/'').
A potential intruder could reconfigure this service in a way that grants
system access.

Solution : Change default administrator password.
Network Security Threat Level: High

Networks Security ID: 14287

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

USED SR3GH Intel Xeon Silver 4110 11M Cache, 2.10 GHz Processor
$350.0
USED SR3GH Intel Xeon Silver 4110 11M Cache, 2.10 GHz Processor pictureIntel® Xeon® Processor E5-2650 v4 (30M Cache, 2.20 GHz) SR2N3
$845.0
Intel® Xeon® Processor E5-2650 v4 (30M Cache, 2.20 GHz) SR2N3 picture(2) Intel Xeon SR1AM | E5-2630V2 | 2.60GHz 15MB 7.2GT/s LGA2011 6 Core Processor
$40.0
(2) Intel Xeon SR1AM | E5-2630V2 | 2.60GHz 15MB 7.2GT/s LGA2011 6 Core Processor pictureHPE SL2500 G8 12LFF 4x SL210t 8x 6C E5-2630V2 2.6GHz 192GB P420 534FLR RAIL
$1680.0
HPE SL2500 G8 12LFF 4x SL210t 8x 6C E5-2630V2 2.6GHz 192GB P420 534FLR RAIL picture


Discussions

No Discussions have been posted on this vulnerability.