Vulnerabilities > CVE-2006-2357 - Unspecified vulnerability in Ipswitch Whatsup Professional 2006/2006Premium
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN ipswitch
nessus
Summary
Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain source code for scripts via a trailing dot in a request to NmConsole/Login.asp.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | CGI abuses |
NASL id | IPSWITCH_WHATSUP_INFO_DISCLOSURE.NASL |
description | The remote host appears to be running Ipswitch WhatsUp Professional, which is used to monitor states of applications, services and hosts. The version of WhatsUp Professional installed on the remote host is prone to multiple issues, including source code disclosure and cross-site scripting vulnerabilities. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21562 |
published | 2006-05-15 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21562 |
title | Ipswitch WhatsUp Professional Multiple Vulnerabilities (XSS, Enum, ID) |
code |
|
References
- http://secunia.com/advisories/20075
- http://secunia.com/advisories/20075
- http://securityreason.com/securityalert/897
- http://securityreason.com/securityalert/897
- http://www.securityfocus.com/archive/1/433808
- http://www.securityfocus.com/archive/1/433808
- http://www.vupen.com/english/advisories/2006/1787
- http://www.vupen.com/english/advisories/2006/1787
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26506
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26506