CVE-1999-1497

Severity

72%

Complexity

39%

Confidentiality

165%

Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.

Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

Type

Ipswitch IMail

First reported 25 years ago

1999-12-21 05:00:00

Last updated 16 years ago

2008-09-05 20:19:00

Affected Software

Ipswitch IMail 5.0

5.0

Ipswitch IMail 5.0.5

5.0.5

Ipswitch IMail 5.0.6

5.0.6

Ipswitch IMail 5.0.7

5.0.7

Ipswitch IMail 5.0.8

5.0.8

Ipswitch IMail 6.0

6.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.