Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-2531
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote malicious users to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header...
Ipswitch Whatsup Professional 2006
1 EDB exploit
2.1
CVSSv2
CVE-2000-0019
IMail POP3 daemon uses weak encryption, which allows local users to read files.
Ipswitch Imail 2006
6.5
CVSSv2
CVE-2015-6004
Multiple SQL injection vulnerabilities in IPSwitch WhatsUp Gold prior to 16.4 allow remote malicious users to execute arbitrary SQL commands via (1) the UniqueID (aka sUniqueID) parameter to WrFreeFormText.asp in the Reports component or (2) the Find Device parameter.
Ipswitch Whatsup Gold
7.5
CVSSv2
CVE-2018-5777
An issue exists in Ipswitch WhatsUp Gold prior to 2017 Plus SP1 (17.1.1). Remote clients can take advantage of a misconfiguration in the TFTP server that could allow malicious users to execute arbitrary commands on the TFTP server via unspecified vectors.
Ipswitch Whatsup Gold
7.5
CVSSv2
CVE-2018-5778
An issue exists in Ipswitch WhatsUp Gold prior to 2017 Plus SP1 (17.1.1). Multiple SQL injection vulnerabilities are present in the legacy .ASP pages, which could allow malicious users to execute arbitrary SQL commands via unspecified vectors.
Ipswitch Whatsup Gold
4.3
CVSSv2
CVE-2007-4555
Cross-site scripting (XSS) vulnerability in Ipswitch WS_FTP allows remote malicious users to inject arbitrary web script or HTML via arguments to a valid command, which is not properly handled when it is displayed by the view log option in the administration interface. NOTE: this...
Ipswitch Ws Ftp
3.5
CVSSv2
CVE-2015-7676
Ipswitch MOVEit File Transfer (formerly DMZ) 8.1 and previous versions, when configured to support file view on download, allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading HTML files.
Ipswitch Moveit Dmz
4
CVSSv2
CVE-2015-7677
The MOVEitISAPI service in Ipswitch MOVEit DMZ prior to 8.2 provides different error messages depending on whether a FileID exists, which allows remote authenticated users to enumerate FileIDs via the X-siLock-FileID parameter in a download action to MOVEitISAPI/MOVEitISAPI.dll.
Ipswitch Moveit Dmz
6.8
CVSSv2
CVE-2015-7678
Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and previous versions allow remote malicious users to hijack the authentication of unspecified victims via unknown vectors.
Ipswitch Moveit Mobile
4.3
CVSSv2
CVE-2015-7679
Cross-site scripting (XSS) vulnerability in Ipswitch MOVEit Mobile prior to 1.2.2 allows remote malicious users to inject arbitrary web script or HTML via the query string to mobile/.
Ipswitch Moveit Mobile
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »