exploit-db-mirror/exploits/hardware/remote/27891.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

10 lines
No EOL
486 B
Text

source: https://www.securityfocus.com/bid/18019/info
Ipswitch WhatsUp Professional 2006 is susceptible to a remote authentication-bypass vulnerability.
This issue allows remote attackers to gain administrative access to the web-based administrative interface of the application. This will aid them in further network attacks.
The HTTP requests containing the following header information are sufficient to demonstrate this issue:
User-Agent: Ipswitch/1.0
User-Application: NmConsole