CVE-2011-0436
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
07/03/2011
Last modified:
11/04/2025
Description
The register_user function in client/new_account_form.php in Domain Technologie Control (DTC) before 0.32.9 includes a cleartext password in an e-mail message, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gplhost:domain_technologie_control:*:*:*:*:*:*:*:* | 0.32.8 (including) | |
| cpe:2.3:a:gplhost:domain_technologie_control:0.24.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.25.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.25.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.25.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.26.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.26.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.26.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.27.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.28.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.28.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.28.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.28.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.28.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gplhost:domain_technologie_control:0.28.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302
- http://git.gplhost.com/gitweb/?p=dtc.git%3Ba%3Dcommit%3Bh%3Dadffff7efb3687ff465ee0552a944dd3109f3cb0
- http://git.gplhost.com/gitweb/?p=dtc.git%3Ba%3Dcommit%3Bh%3Df8e3b2d7cc2da313addc05394568ab9599499285
- http://openwall.com/lists/oss-security/2011/02/22/1
- http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog
- http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog
- http://secunia.com/advisories/43523
- http://www.debian.org/security/2011/dsa-2179
- http://www.gplhost.sg/lists/dtcannounce/msg00025.html
- http://www.vupen.com/english/advisories/2011/0556
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65898
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302
- http://git.gplhost.com/gitweb/?p=dtc.git%3Ba%3Dcommit%3Bh%3Dadffff7efb3687ff465ee0552a944dd3109f3cb0
- http://git.gplhost.com/gitweb/?p=dtc.git%3Ba%3Dcommit%3Bh%3Df8e3b2d7cc2da313addc05394568ab9599499285
- http://openwall.com/lists/oss-security/2011/02/22/1
- http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog
- http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog
- http://secunia.com/advisories/43523
- http://www.debian.org/security/2011/dsa-2179
- http://www.gplhost.sg/lists/dtcannounce/msg00025.html
- http://www.vupen.com/english/advisories/2011/0556
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65898



