27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a ZyXEL Prestige server with the default login<br />

and password set (''/'1234').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

apc Smartups 3000 Default Password<br />

<strong>PVS</strong> ID: 4913 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an apc Smartups 3000 server with the default<br />

login and password set ('apc'/'apc').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

iPSTAR iPSTAR Satellite Router/Radio v2 Default Password<br />

<strong>PVS</strong> ID: 4914 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a iPSTAR iPSTAR Satellite Router/Radio v2<br />

server with the default login and password set ('admin'/'operator').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

iPSTAR iPSTAR <strong>Network</strong> Box v.2+ Default Password<br />

<strong>PVS</strong> ID: 4915 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a iPSTAR iPSTAR <strong>Network</strong> Box v.2+ server<br />

with the default login and password set ('admin'/'operator').\nThe affected web application<br />

is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

ihoi oihoh lknlkn Default Password<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4916 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1296

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!