Microsys CyberPatrol uses weak encryption (trivial encoding) for credit card numbers and uses no encryption for the remainder of the information during registration, which could allow attackers to sniff network traffic and obtain this sensitive information.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-11/0323.html | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/1977 | Exploit Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2000-11/0323.html | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/1977 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2000-11/0323.html - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/1977 - Exploit, Vendor Advisory |
Information
Published : 2001-01-09 05:00
Updated : 2024-11-20 23:34
NVD link : CVE-2000-1173
Mitre link : CVE-2000-1173
CVE.ORG link : CVE-2000-1173
JSON object : View
Products Affected
microsys
- cyberpatrol
CWE