UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges.
References
| Link | Resource |
|---|---|
| http://marc.info/?l=bugtraq&m=99861651923668&w=2 | |
| http://www.eve-software.com/security/ueditpw.html | Exploit Vendor Advisory |
| http://marc.info/?l=bugtraq&m=99861651923668&w=2 | |
| http://www.eve-software.com/security/ueditpw.html | Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 23:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://marc.info/?l=bugtraq&m=99861651923668&w=2 - | |
| References | () http://www.eve-software.com/security/ueditpw.html - Exploit, Vendor Advisory |
Information
Published : 2001-08-31 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-0983
Mitre link : CVE-2001-0983
CVE.ORG link : CVE-2001-0983
JSON object : View
Products Affected
ultraedit
- ultraedit-32
CWE
