Vulnerabilities > Ipswitch > Whatsup

DATE CVE VULNERABILITY TITLE RISK
2006-05-22 CVE-2006-2531 Authentication Bypass vulnerability in Ipswitch Whatsup Professional2006
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".
network
low complexity
ipswitch
7.5
2006-02-28 CVE-2006-0911 Resource Management Errors vulnerability in Ipswitch Whatsup Professional2006
NmService.exe in Ipswitch WhatsUp Professional 2006 allows remote attackers to cause a denial of service (CPU consumption) via crafted requests to Login.asp, possibly involving the (1) "In]" and (2) "b;tnLogIn" parameters, or (3) malformed btnLogIn parameters, possibly involving missing "[" (open bracket) or "[" (closing bracket) characters, as demonstrated by "&btnLogIn=[Log&In]=&" or "&b;tnLogIn=[Log&In]=&" in the URL.
network
low complexity
ipswitch CWE-399
5.0
2005-06-22 CVE-2005-1250 Unspecified vulnerability in Ipswitch Whatsup Professional2005Sp1
SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).
network
low complexity
ipswitch
7.5