RSS   Vulnerabilities for 'Whatsup'   RSS

2006-05-22
 
CVE-2006-2531

CWE-Other
 

 
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".

 
2006-05-15
 
CVE-2006-2356

CWE-200
 

 
NmConsole/utility/RenderMap.asp in Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain sensitive information about network nodes via a modified nDeviceGroupID parameter.

 
2006-02-28
 
CVE-2006-0911

CWE-399
 

 
NmService.exe in Ipswitch WhatsUp Professional 2006 allows remote attackers to cause a denial of service (CPU consumption) via crafted requests to Login.asp, possibly involving the (1) "In]" and (2) "b;tnLogIn" parameters, or (3) malformed btnLogIn parameters, possibly involving missing "[" (open bracket) or "[" (closing bracket) characters, as demonstrated by "&btnLogIn=[Log&In]=&" or "&b;tnLogIn=[Log&In]=&" in the URL. NOTE: due to the lack of diagnosis by the original researcher, the precise nature of the vulnerability is unclear.

 
2005-06-22
 
CVE-2005-1250

 

 
SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).

 

 >>> Vendor: Ipswitch 26 Products
Ws ftp server
Imail
Ws ftp pro
Wincom lpd
Tftp server
Whatsup gold
Imail express
Ipswitch collaboration suite
Whatsup
Imail server
Whatsup small business
Whatsup professional
Ipswitch secure server
Imail plus
Imail secure server
Imail premium
Ws ftp
Imserver
Imail client
Instant messaging
Ws ftp home
Moveit dmz
Moveit mobile
Moveit transfer 2017
Moveit
Moveit transfer


Copyright 2024, cxsecurity.com

 

Back to Top