Cryptobuddy
CVEs (4)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2003-1391 | 0.00 | — | 0.00 | Dec 31, 2003 | RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for attackers to guess the passphrase. | |||
| CVE-2003-1390 | 0.00 | — | 0.00 | Dec 31, 2003 | RTS CryptoBuddy 1.2 and earlier stores bytes 53 through 55 of a 55-byte passphrase in plaintext, which makes it easier for local users to guess the passphrase. | |||
| CVE-2003-1392 | 0.00 | — | 0.01 | Dec 31, 2003 | CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data. | |||
| CVE-2003-1389 | 0.00 | — | 0.00 | Dec 31, 2003 | RTS CryptoBuddy 1.2 and earlier truncates long passphrases without warning the user, which may make it easier to conduct certain brute force guessing attacks. |
- CVE-2003-1391Dec 31, 2003risk 0.00cvss —epss 0.00
RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for attackers to guess the passphrase.
- CVE-2003-1390Dec 31, 2003risk 0.00cvss —epss 0.00
RTS CryptoBuddy 1.2 and earlier stores bytes 53 through 55 of a 55-byte passphrase in plaintext, which makes it easier for local users to guess the passphrase.
- CVE-2003-1392Dec 31, 2003risk 0.00cvss —epss 0.01
CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data.
- CVE-2003-1389Dec 31, 2003risk 0.00cvss —epss 0.00
RTS CryptoBuddy 1.2 and earlier truncates long passphrases without warning the user, which may make it easier to conduct certain brute force guessing attacks.