Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
research triangle software cryptobuddy 1.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1389
RTS CryptoBuddy 1.2 and previous versions truncates long passphrases without warning the user, which may make it easier to conduct certain brute force guessing attacks.
Research Triangle Software Cryptobuddy 1.2
Research Triangle Software Cryptobuddy 1.0
NA
CVE-2003-1390
RTS CryptoBuddy 1.2 and previous versions stores bytes 53 through 55 of a 55-byte passphrase in plaintext, which makes it easier for local users to guess the passphrase.
Research Triangle Software Cryptobuddy 1.0
Research Triangle Software Cryptobuddy 1.2
NA
CVE-2003-1391
RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for malicious users to guess the passphrase.
Research Triangle Software Cryptobuddy 1.0
Research Triangle Software Cryptobuddy 1.2
NA
CVE-2003-1392
CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data.
Research Triangle Software Cryptobuddy 1.2
Research Triangle Software Cryptobuddy 1.0
Microsoft All Windows
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started