6.4 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.019 Low
EPSS
Percentile
88.5%
Deprecated since it didn
# SPDX-FileCopyrightText: 2008 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.80068");
script_version("2023-11-03T16:10:08+0000");
script_tag(name:"last_modification", value:"2023-11-03 16:10:08 +0000 (Fri, 03 Nov 2023)");
script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_cve_id("CVE-2006-2351", "CVE-2006-2352", "CVE-2006-2353", "CVE-2006-2354", "CVE-2006-2355",
"CVE-2006-2356", "CVE-2006-2357");
script_xref(name:"OSVDB", value:"25469");
script_xref(name:"OSVDB", value:"25470");
script_xref(name:"OSVDB", value:"25471");
script_xref(name:"OSVDB", value:"25472");
script_name("Ipswitch WhatsUp Professional Multiple Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 David Maciejak");
script_family("Web application abuses");
script_tag(name:"solution", value:"No known solution was made available for at least one year since the
disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to
upgrade to a newer release, disable respective features, remove the product or replace the product by
another one.");
script_tag(name:"summary", value:"Deprecated since it didn't check for any version or doing any
active vulnerability evaluation.
The remote web server is affected by multiple flaws.
Description :
The remote host appears to be running Ipswitch WhatsUp Professional, which is used to monitor states of
applications, services and hosts.
The version of WhatsUp Professional installed on the remote host is prone to multiple issues, including source
code disclosure and cross-site scripting vulnerabilities.");
script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/433808/30/0/threaded");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/17964");
script_xref(name:"URL", value:"http://www.ipswitch.com/products/whatsup/professional/");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"WillNotFix");
script_tag(name:"deprecated", value: TRUE);
exit(0);
}
exit(66);