Oi! Email Marketing System 3.0 (aka Oi! 3) stores the...
Low severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Description
Published by the National Vulnerability Database
Feb 28, 2006
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Jan 31, 2023
Oi! Email Marketing System 3.0 (aka Oi! 3) stores the server's FTP password in cleartext on a Configuration web page, which allows local users with superadministrator privileges, or attackers who have obtained access to the web page, to view the password.
References