Vulnerabilities > Ipswitch > Whatsup > professional.2006

DATE CVE VULNERABILITY TITLE RISK
2006-05-22 CVE-2006-2531 Authentication Bypass vulnerability in Ipswitch Whatsup Professional2006
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".
network
low complexity
ipswitch
7.5
2006-02-28 CVE-2006-0911 Resource Management Errors vulnerability in Ipswitch Whatsup Professional2006
NmService.exe in Ipswitch WhatsUp Professional 2006 allows remote attackers to cause a denial of service (CPU consumption) via crafted requests to Login.asp, possibly involving the (1) "In]" and (2) "b;tnLogIn" parameters, or (3) malformed btnLogIn parameters, possibly involving missing "[" (open bracket) or "[" (closing bracket) characters, as demonstrated by "&btnLogIn=[Log&In]=&" or "&b;tnLogIn=[Log&In]=&" in the URL.
network
low complexity
ipswitch CWE-399
5.0