CVE-2003-1391

RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for attackers to guess the passphrase.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:research_triangle_software:cryptobuddy:1.0:*:*:*:*:*:*:*
cpe:2.3:a:research_triangle_software:cryptobuddy:1.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/311176 - () http://www.securityfocus.com/archive/1/311176 -
References () http://www.securityfocus.com/bid/6810 - () http://www.securityfocus.com/bid/6810 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11298 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/11298 -

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2003-1391

Mitre link : CVE-2003-1391

CVE.ORG link : CVE-2003-1391


JSON object : View

Products Affected

research_triangle_software

  • cryptobuddy
CWE
CWE-310

Cryptographic Issues