Lucene search

K
ProgressWhatsup Gold

5 matches found

CVE
CVE
added 2022/05/11 6:15 p.m.557 views

CVE-2022-29846

In Progress Ipswitch WhatsUp Gold 16.1 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to obtain the WhatsUp Gold installation serial number.

5.3CVSS5.9AI score0.46414EPSS
CVE
CVE
added 2022/05/11 6:15 p.m.555 views

CVE-2022-29845

In Progress Ipswitch WhatsUp Gold 21.1.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read the contents of a local file.

6.5CVSS6.3AI score0.58245EPSS
CVE
CVE
added 2022/05/11 6:15 p.m.545 views

CVE-2022-29848

In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.

6.5CVSS6.8AI score0.61107EPSS
CVE
CVE
added 2022/05/11 6:15 p.m.543 views

CVE-2022-29847

In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.

7.5CVSS7.6AI score0.8791EPSS
CVE
CVE
added 2022/10/12 1:15 a.m.47 views

CVE-2022-42711

In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.

9.6CVSS9.4AI score0.00192EPSS