In Progress Ipswitch WhatsUp Gold 16.1 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to obtain the WhatsUp Gold installation serial number.
References
Link | Resource |
---|---|
https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022 | Vendor Advisory |
https://www.progress.com/network-monitoring | Product |
Configurations
Configuration 1 (hide)
|
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
20 May 2022, 14:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:* cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:* |
|
References | (MISC) https://www.progress.com/network-monitoring - Product | |
References | (MISC) https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022 - Vendor Advisory | |
First Time |
Ipswitch
Ipswitch whatsup Gold |
|
CWE | CWE-200 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
11 May 2022, 18:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-11 18:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-29846
Mitre link : CVE-2022-29846
CVE.ORG link : CVE-2022-29846
JSON object : View
Products Affected
ipswitch
- whatsup_gold
CWE