Oi! Email Marketing System 3.0 (aka Oi! 3) stores the server's FTP password in cleartext on a Configuration web page, which allows local users with superadministrator privileges, or attackers who have obtained access to the web page, to view the password.
References
Configurations
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/483 - | |
References | () http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/425924/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16794 - |
Information
Published : 2006-02-28 11:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0920
Mitre link : CVE-2006-0920
CVE.ORG link : CVE-2006-0920
JSON object : View
Products Affected
oi
- email_marketing_system
CWE