Vulnerabilities > CVE-2001-1195 - Authentication vulnerability in Novell Groupwise Servlet Gateway Default
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Novell Groupwise 5.5 and 6.0 Servlet Gateway is installed with a default username and password for the servlet manager, which allows remote attackers to gain privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Novell Groupwise 5.5/6.0 Servlet Gateway Default Authentication Vulnerability. CVE-2001-1195. Remote exploit for novell platform |
id | EDB-ID:21182 |
last seen | 2016-02-02 |
modified | 2001-12-15 |
published | 2001-12-15 |
reporter | Adam Gray |
source | https://www.exploit-db.com/download/21182/ |
title | Novell Groupwise 5.5/6.0 Servlet Gateway Default Authentication Vulnerability |
Nessus
NASL family | Netware |
NASL id | NOVELL_GROUPWISE_SERVLETMANAGER_DEFAULT_PASSWORD.NASL |
description | The Novell Groupwise servlet server is configured with a default password. As a result, users could be denied access to mail and other servlet based resources. To test this finding: https://<host>/servlet/ServletManager/ enter |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12122 |
published | 2004-03-31 |
reporter | This script is Copyright (C) 2004-2018 David Kyger |
source | https://www.tenable.com/plugins/nessus/12122 |
title | Novell Groupwise Servlet Manager Default Password |