AuditWizard 6.3.2, when using "Remote Audit," logs the administrator password in plaintext to LaytonCmdSvc.log, which allows local users to obtain sensitive information by reading the file.
References
Configurations
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21773 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1525 - | |
References | () http://securitytracker.com/id?1016795 - Exploit | |
References | () http://www.securityfocus.com/archive/1/445220/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19860 - | |
References | () http://www.vupen.com/english/advisories/2006/3498 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28743 - |
Information
Published : 2006-09-08 21:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-4642
Mitre link : CVE-2006-4642
CVE.ORG link : CVE-2006-4642
JSON object : View
Products Affected
auditwizard
- auditwizard
CWE