Lucene search

K
ProgressWhatsup Gold

5 matches found

CVE
CVE
added 2022/05/11 6:15 p.m.558 views

CVE-2022-29846

In Progress Ipswitch WhatsUp Gold 16.1 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to obtain the WhatsUp Gold installation serial number.

5.3CVSS5.9AI score0.365EPSS
CVE
CVE
added 2022/05/11 6:15 p.m.556 views

CVE-2022-29845

In Progress Ipswitch WhatsUp Gold 21.1.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read the contents of a local file.

6.5CVSS6.3AI score0.42249EPSS
CVE
CVE
added 2022/05/11 6:15 p.m.547 views

CVE-2022-29848

In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.

6.5CVSS6.8AI score0.52345EPSS
CVE
CVE
added 2022/05/11 6:15 p.m.544 views

CVE-2022-29847

In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.

7.5CVSS7.6AI score0.84042EPSS
CVE
CVE
added 2022/10/12 1:15 a.m.48 views

CVE-2022-42711

In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.

9.6CVSS9.4AI score0.00215EPSS