CVE-2005-4777

Tashcom ASPEdit 2.9 stores the administration password (aka the FTP password) in cleartext in the registry, which might allow local users to view the password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tashcom:aspedit:2.9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous_group=94 - Exploit, Vendor Advisory () http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous_group=94 - Exploit, Vendor Advisory
References () http://securityreason.com/securityalert/37 - () http://securityreason.com/securityalert/37 -
References () http://securitytracker.com/id?1014989 - () http://securitytracker.com/id?1014989 -
References () http://www.osvdb.org/19744 - () http://www.osvdb.org/19744 -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-21 00:05


NVD link : CVE-2005-4777

Mitre link : CVE-2005-4777

CVE.ORG link : CVE-2005-4777


JSON object : View

Products Affected

tashcom

  • aspedit