Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
research triangle software cryptobuddy 1.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1389
RTS CryptoBuddy 1.2 and previous versions truncates long passphrases without warning the user, which may make it easier to conduct certain brute force guessing attacks.
Research Triangle Software Cryptobuddy 1.2
Research Triangle Software Cryptobuddy 1.0
NA
CVE-2003-1390
RTS CryptoBuddy 1.2 and previous versions stores bytes 53 through 55 of a 55-byte passphrase in plaintext, which makes it easier for local users to guess the passphrase.
Research Triangle Software Cryptobuddy 1.0
Research Triangle Software Cryptobuddy 1.2
NA
CVE-2003-1391
RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for malicious users to guess the passphrase.
Research Triangle Software Cryptobuddy 1.0
Research Triangle Software Cryptobuddy 1.2
NA
CVE-2003-1392
CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data.
Research Triangle Software Cryptobuddy 1.2
Research Triangle Software Cryptobuddy 1.0
Microsoft All Windows
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started