CVE-1999-1497

Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.
References
Link Resource
http://www.securityfocus.com/archive/1/39329 Exploit Vendor Advisory
http://www.securityfocus.com/bid/880 Exploit Vendor Advisory
http://www.securityfocus.com/archive/1/39329 Exploit Vendor Advisory
http://www.securityfocus.com/bid/880 Exploit Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:31

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/39329 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/39329 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/880 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/880 - Exploit, Vendor Advisory

Information

Published : 1999-12-21 05:00

Updated : 2024-11-20 23:31


NVD link : CVE-1999-1497

Mitre link : CVE-1999-1497

CVE.ORG link : CVE-1999-1497


JSON object : View

Products Affected

ipswitch

  • imail