Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
312
VMScore
CVE-2015-7676
Ipswitch MOVEit File Transfer (formerly DMZ) 8.1 and previous versions, when configured to support file view on download, allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading HTML files.
Ipswitch Moveit Dmz
356
VMScore
CVE-2015-7677
The MOVEitISAPI service in Ipswitch MOVEit DMZ prior to 8.2 provides different error messages depending on whether a FileID exists, which allows remote authenticated users to enumerate FileIDs via the X-siLock-FileID parameter in a download action to MOVEitISAPI/MOVEitISAPI.dll.
Ipswitch Moveit Dmz
605
VMScore
CVE-2015-7678
Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and previous versions allow remote malicious users to hijack the authentication of unspecified victims via unknown vectors.
Ipswitch Moveit Mobile
383
VMScore
CVE-2015-7679
Cross-site scripting (XSS) vulnerability in Ipswitch MOVEit Mobile prior to 1.2.2 allows remote malicious users to inject arbitrary web script or HTML via the query string to mobile/.
Ipswitch Moveit Mobile
445
VMScore
CVE-2015-7680
Ipswitch MOVEit DMZ prior to 8.2 provides different error messages for authentication attempts depending on whether the user account exists, which allows remote malicious users to enumerate usernames via a series of SOAP requests to machine.aspx.
Ipswitch Moveit Dmz
383
VMScore
CVE-2007-4555
Cross-site scripting (XSS) vulnerability in Ipswitch WS_FTP allows remote malicious users to inject arbitrary web script or HTML via arguments to a valid command, which is not properly handled when it is displayed by the view log option in the administration interface. NOTE: this...
Ipswitch Ws Ftp
755
VMScore
CVE-2006-2531
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote malicious users to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header...
Ipswitch Whatsup Professional 2006
1 EDB exploit
668
VMScore
CVE-2018-5777
An issue exists in Ipswitch WhatsUp Gold prior to 2017 Plus SP1 (17.1.1). Remote clients can take advantage of a misconfiguration in the TFTP server that could allow malicious users to execute arbitrary commands on the TFTP server via unspecified vectors.
Ipswitch Whatsup Gold
668
VMScore
CVE-2018-5778
An issue exists in Ipswitch WhatsUp Gold prior to 2017 Plus SP1 (17.1.1). Multiple SQL injection vulnerabilities are present in the legacy .ASP pages, which could allow malicious users to execute arbitrary SQL commands via unspecified vectors.
Ipswitch Whatsup Gold
187
VMScore
CVE-2000-0019
IMail POP3 daemon uses weak encryption, which allows local users to read files.
Ipswitch Imail 2006
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »