Vulnerabilities > CVE-2001-1195 - Unspecified vulnerability in Novell Groupwise 5.5/6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Novell Groupwise 5.5/6.0 Servlet Gateway Default Authentication Vulnerability. CVE-2001-1195. Remote exploit for novell platform |
id | EDB-ID:21182 |
last seen | 2016-02-02 |
modified | 2001-12-15 |
published | 2001-12-15 |
reporter | Adam Gray |
source | https://www.exploit-db.com/download/21182/ |
title | Novell Groupwise 5.5/6.0 Servlet Gateway Default Authentication Vulnerability |
Nessus
NASL family | Netware |
NASL id | NOVELL_GROUPWISE_SERVLETMANAGER_DEFAULT_PASSWORD.NASL |
description | The Novell Groupwise servlet server is configured with a default password. As a result, users could be denied access to mail and other servlet based resources. To test this finding: https://<host>/servlet/ServletManager/ enter |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12122 |
published | 2004-03-31 |
reporter | This script is Copyright (C) 2004-2018 David Kyger |
source | https://www.tenable.com/plugins/nessus/12122 |
title | Novell Groupwise Servlet Manager Default Password |
References
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10067329.htm
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10067329.htm
- http://www.iss.net/security_center/static/7701.php
- http://www.iss.net/security_center/static/7701.php
- http://www.securityfocus.com/archive/1/245871
- http://www.securityfocus.com/archive/1/245871
- http://www.securityfocus.com/bid/3697
- http://www.securityfocus.com/bid/3697