Описание
The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed.
The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2738
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26761
- http://secunia.com/advisories/20323
- http://securityreason.com/securityalert/1012
- http://www.golem.de/0605/45407.html
- http://www.open-xchange.org/bugzilla/show_bug.cgi?id=2815
- http://www.securityfocus.com/archive/1/435198/100/0/threaded
- http://www.securityfocus.com/bid/18115
- http://www.vupen.com/english/advisories/2006/2037
EPSS
CVE ID
Связанные уязвимости
The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed.
EPSS