Lucene search

K
exploitdbKenneth F. BelvaEDB-ID:27891
HistoryMay 17, 2006 - 12:00 a.m.

Ipswitch WhatsUp Professional 2006 - Authentication Bypass

2006-05-1700:00:00
Kenneth F. Belva
www.exploit-db.com
17

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/18019/info

Ipswitch WhatsUp Professional 2006 is susceptible to a remote authentication-bypass vulnerability.

This issue allows remote attackers to gain administrative access to the web-based administrative interface of the application. This will aid them in further network attacks.

The HTTP requests containing the following header information are sufficient to demonstrate this issue:

User-Agent: Ipswitch/1.0
User-Application: NmConsole

AI Score

7.4

Confidence

Low