CVE-2001-0990
Published Sep 4, 2001
Last updated 7 years ago
Overview
- Description
- Inter7 vpopmail 4.10.35 and earlier, when using the MySQL module, compiles authentication information in cleartext into the libvpopmail.a library, which allows local users to obtain the MySQL username and password by inspecting the vpopmail programs that use the library.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85F4E493-79E9-49EF-9C8B-237F2FC771D9" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA8F2818-965F-45CB-842E-0BE3A9DC3606" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FACEBAD4-B602-401B-A798-8BD440D62368" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12D27D37-97E4-413F-A3B5-33E5CC7DD811" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB9D8F71-E669-41B9-9686-3C348669710B" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8F07EA2-D0D6-4CF2-A1E5-87C7FBE77E3B" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48D21401-54EB-49FE-ACA6-CED2E7300D52" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F2078CF-E0F3-4CF2-AC4B-8F1B66C5D36B" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8ABFEF3-019C-46E7-841E-87EF8C6C9DFD" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55281945-8C12-49C5-8B3A-C1247A2F2955" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "242098D4-C84A-4741-B651-2C8ABCF631DC" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:3.4.11e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D907D537-B206-40B4-A27B-DEC45CEF0DF3" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB4FCDD9-2491-4B90-B70D-2BADFC2CE4F8" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FD37D2A-AA5C-4FA7-AB3E-27CA5FC2BB77" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D547D97-E996-4EE4-872F-1A3A0B28B2FB" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B56A0D4-31E8-4C3B-97CC-EDFA2EE0A271" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9BDA23C-8B7F-4BFF-AA66-5072AA79CF4B" }, { "criteria": "cpe:2.3:a:inter7:vpopmail:4.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7F96550-7AFB-4978-84A2-FE903FB7A922" } ], "operator": "OR" } ] } ]