Oi! Email Marketing System 3.0 (aka Oi! 3) stores the server's FTP password in cleartext on a Configuration web page, which allows local users with superadministrator privileges, or attackers who have obtained access to the web page, to view the password.
References
Configurations
History
No history.
Information
Published : 2006-02-28 11:02
Updated : 2018-10-18 16:29
NVD link : CVE-2006-0920
Mitre link : CVE-2006-0920
CVE.ORG link : CVE-2006-0920
JSON object : View
Products Affected
oi
- email_marketing_system
CWE