Lucene search

K
ProgressWhatsup Gold

6 matches found

CVE
CVE
added 2022/05/11 6:15 p.m.557 views

CVE-2022-29846

In Progress Ipswitch WhatsUp Gold 16.1 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to obtain the WhatsUp Gold installation serial number.

5.3CVSS5.9AI score0.46414EPSS
CVE
CVE
added 2025/04/14 4:15 p.m.65 views

CVE-2025-2572

In WhatsUp Gold versions released before 2024.0.3, a database manipulation vulnerability allows an unauthenticated attacker to modify the contents of WhatsUp.dbo.WrlsMacAddressGroup.

5.6CVSS5.5AI score0.00003EPSS
CVE
CVE
added 2004/10/20 4:0 a.m.45 views

CVE-2004-0799

The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm".

5CVSS6.6AI score0.05EPSS
CVE
CVE
added 2023/12/14 4:15 p.m.38 views

CVE-2023-6368

In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate information related to a registered device being monitored by WhatsUp Gold.

5.9CVSS5.7AI score0.00022EPSS
CVE
CVE
added 2024/05/14 9:15 p.m.33 views

CVE-2024-4561

In WhatsUp Gold versions released before 2023.1.2 , a blind SSRF vulnerability exists in Whatsup Gold's FaviconController that allows an attacker to send arbitrary HTTP requests on behalf of the vulnerable server.

5.3CVSS4.6AI score0.00485EPSS
CVE
CVE
added 2024/05/14 9:15 p.m.22 views

CVE-2024-4562

In WhatsUp Gold versions released before 2023.1.2 , an SSRF vulnerability exists in Whatsup Gold's Issue exists in the HTTP Monitoring functionality. Due to the lack of proper authorization, any authenticated user can access the HTTP monitoring functionality, what leads to the Server Side Request F...

5.4CVSS5.4AI score0.00108EPSS