The remote MS SQL server has the default 'sa' account enabled without any password. An attacker may use this flaw to execute commands against the remote host, as well as read your database content.
disable this account, or set a password to it. In addition to this, it is suggested you filter incoming tcp traffic to this port. For MSDE (OEM versions without MSQL console) : C:\MSSQL7\BINN\osql -U sa At the Password: prompt press <Enter>. Type the following replacing .password. with the password you wish to assign, in single quotes: EXEC sp_password NULL, .password., .sa. go exit
- Computer Associates WebScan ActiveX Control Multiple Remote Code Execution Vulnerabilities
- Sophos Anti Virus Check
- Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
- Adobe Flash Player 184.108.40.206 and earlier vulnerability (Win)
- Microsoft ASP.NET Insecure Site Configuration Vulnerability (2905247)