Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.10862
Category:Brute force attacks
Title:Microsoft SQL (MSSQL) Server Brute Force Logins With Default Credentials (TCP/IP Listener)
Summary:The remote Microsoft SQL (MSSQL) Server has a common / publicly; known password for one or more accounts.
Description:Summary:
The remote Microsoft SQL (MSSQL) Server has a common / publicly
known password for one or more accounts.

Vulnerability Impact:
An attacker can use these accounts to read and/or modify data on
the Microsoft SQL Server. In addition, the attacker may be able to launch programs on the target
operating system.

Affected Software/OS:
The following products are known to be affected:

- PerkinElmer Inc BioAssay Enterprise

- Milestone XProtect Essential

- Arcserve UDP

- Lansweeper

- Microsoft Lync 2010

- Saleslogix

- Act!

- PerkinElmer Inc. BioAssay Enterprise

- PC America Restaurant Pro Express

- HP MFP Digital Sending Software

- My Movies

- Codepal

- Ecava IntegraXor

- DHL EasyShip

- CVE-2021-33583: REINER timeCard 6.x

- CVE-2024-6912: PerkinElmer ProcessPlus

Solution:
Please set a difficult to guess password for the reported
account(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-33583
https://www.compass-security.com/fileadmin/Research/Advisories/2021-12_CSNC-2021-012_timeCard_Hardcoded_Credentials.txt
Common Vulnerability Exposure (CVE) ID: CVE-2024-6912
CopyrightCopyright (C) 2005 HD Moore

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.