(Description Provided by CVE) : ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running."
BIND, PowerDNS and NSD contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered due to a specific DNS query. It is possible for a remote attacker to disclose the version number and use this information to determine what flaws exists, which may allow further attacks.
This system is running an HTTP web server. The server's HTTP headers, or other inidictors (such as errors, file names, etc.), reveal the software name and/or version. This could aid an attacker in performing attacks against this host. Versions and types should be omitted where possible.
By default, Renegade BBS installs with a default password. The SYSOP account has a password of "SYSOP" which is publicly known and documented. This allows attackers to trivially access the program or system.
The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO
warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright
holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.