CVE-2012-4344 – ipswitch whatsup gold 15.02 - Persistent Cross-Site Scripting / Blind SQL Injection / Remote Code Execution
https://notcve.org/view.php?id=CVE-2012-4344
Cross-site scripting (XSS) vulnerability in Ipswitch WhatsUp Gold 15.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the SNMP system name of the attacking host. Vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en Ipswitch WhatsUp Gold v15.02 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados relacionados con el nombre del sistema SNMP de la máquina atacante. • https://www.exploit-db.com/exploits/20035 http://www.exploit-db.com/exploits/20035 http://www.kb.cert.org/vuls/id/777007 https://exchange.xforce.ibmcloud.com/vulnerabilities/77150 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-2601 – ipswitch whatsup gold 15.02 - Persistent Cross-Site Scripting / Blind SQL Injection / Remote Code Execution
https://notcve.org/view.php?id=CVE-2012-2601
SQL injection vulnerability in WrVMwareHostList.asp in Ipswitch WhatsUp Gold 15.02 allows remote attackers to execute arbitrary SQL commands via the sGroupList parameter. Vulnerabilidad de inyección de comandos SQL en WrVMwareHostList.asp in Ipswitch WhatsUp Gold v15.02 permite a atacantes remotos ejecutar comandos SQL a través del parámetro sGroupList. Ipswitch WhatsUp Gold version 15.02 suffers from code execution, cross site scripting, and remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/20035 http://www.exploit-db.com/exploits/20035 http://www.kb.cert.org/vuls/id/777007 http://www.securityfocus.com/bid/54626 http://www.securitytracker.com/id?1027325 http://www.whatsupgold.com/blog/2012/07/23/keeping-whatsup-gold-secure https://exchange.xforce.ibmcloud.com/vulnerabilities/77152 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2007-2602
https://notcve.org/view.php?id=CVE-2007-2602
Buffer overflow in MIBEXTRA.EXE in Ipswitch WhatsUp Gold 11 allows attackers to cause a denial of service (application crash) or execute arbitrary code via a long MIB filename argument. NOTE: If there is not a common scenario under which MIBEXTRA.EXE is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE. Desbordamiento de búfer en el MIBEXTRA.EXE del Ipswitch WhatsUp Gold 11 permite a los atacantes provocar una denegación de servicio (caída de la aplicación) o ejecutar código de su elección a través de un argumento de nombre de fichero MIB largo. NOTA: Si no hay un escenario común bajo el que el MIBEXTRA.EXE es llamado con un ataque controlado por argumentos de línea de comandos, tal vez esta vulnerabilidad no debería de incluirse en el CVE. • http://osvdb.org/36217 http://securityreason.com/securityalert/2708 http://www.securityfocus.com/archive/1/468070/100/0/threaded •
CVE-2004-0799
https://notcve.org/view.php?id=CVE-2004-0799
The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm". El demonio HTTP de Ipswitch WhatsUp Gold 8,03 y 8.03 Hotfix 1 permite a atacantes remotos causar una denegación de servicio (caída del servidor) mediante una petición GET conteniendo un nombre de dispositivo MS-DOS, como se ha demostrado usando "prn.htm". • http://www.idefense.com/application/poi/display?id=142&type=vulnerabilities http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17418 •
CVE-2004-0798 – IPSwitch WhatsUp Gold 8.03 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-0798
Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter. Desbordamiento de búfer en el script _maincfgret.cgi de Ipswithc WhatsUp Gold anteriores a 8.03 Hotfix 1 permite a atacantes remotos ejecutar código de su elección mediante un parámetro instancename largo. • https://www.exploit-db.com/exploits/566 https://www.exploit-db.com/exploits/16787 http://www.idefense.com/application/poi/display?type=vulnerabilities http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html http://www.securityfocus.com/bid/11043 https://exchange.xforce.ibmcloud.com/vulnerabilities/17111 - •