Vulnerability Description
Ozeki HTTP-SMS Gateway 1.0, and possibly earlier, stores usernames and passwords in plaintext in the HKLM\Software\Ozeki\SMSServer\CurrentVersion\Plugins\httpsmsgate registry key, which allows local users to obtain sensitive information.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ozeki | Http-Sms Gateway | <= 1.0 |
Related Weaknesses (CWE)
References
- http://bb.domaindlx.com/bingung/shellcore/advisories.asp?bug_report=display&infa
- http://secunia.com/advisories/23339Vendor Advisory
- http://www.securityfocus.com/bid/21679
- http://www.vupen.com/english/advisories/2006/5093Vendor Advisory
- http://bb.domaindlx.com/bingung/shellcore/advisories.asp?bug_report=display&infa
- http://secunia.com/advisories/23339Vendor Advisory
- http://www.securityfocus.com/bid/21679
- http://www.vupen.com/english/advisories/2006/5093Vendor Advisory
FAQ
What is CVE-2006-6674?
CVE-2006-6674 is a vulnerability with a CVSS score of 2.1 (LOW). Ozeki HTTP-SMS Gateway 1.0, and possibly earlier, stores usernames and passwords in plaintext in the HKLM\Software\Ozeki\SMSServer\CurrentVersion\Plugins\httpsmsgate registry key, which allows local u...
How severe is CVE-2006-6674?
CVE-2006-6674 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6674?
Check the references section above for vendor advisories and patch information. Affected products include: Ozeki Http-Sms Gateway.