CVE-2013-6223

LiveZilla before 5.1.1.0 stores the admin Base64 encoded username and password in a 1click file, which allows local users to obtain access by reading the file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:3.1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:3.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:4.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:58

Type Values Removed Values Added
References () http://blog.curesec.com/article/blog/27.html - Exploit () http://blog.curesec.com/article/blog/27.html - Exploit
References () http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/ - Vendor Advisory () http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/ - Vendor Advisory
References () http://osvdb.org/100400 - () http://osvdb.org/100400 -
References () http://seclists.org/fulldisclosure/2013/Nov/210 - () http://seclists.org/fulldisclosure/2013/Nov/210 -

Information

Published : 2014-06-09 19:55

Updated : 2024-11-21 01:58


NVD link : CVE-2013-6223

Mitre link : CVE-2013-6223

CVE.ORG link : CVE-2013-6223


JSON object : View

Products Affected

livezilla

  • livezilla
CWE
CWE-255

Credentials Management Errors