Research Triangle Software

Cryptobuddy

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

RTS CryptoBuddy 1.2 and earlier truncates long passphrases without warning the user, which may make it easier to conduct certain brute force guessing attacks.

  • EPSS 0.26%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

RTS CryptoBuddy 1.2 and earlier stores bytes 53 through 55 of a 55-byte passphrase in plaintext, which makes it easier for local users to guess the passphrase.

  • EPSS 0.18%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for attackers to guess the passphrase.

  • EPSS 0.77%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data.