Revelation 0.4.13-2 and earlier uses only the first 32 characters of a password followed by a sequence of zeros, which reduces the entropy and makes it easier for context-dependent attackers to crack passwords and obtain access to keys via a brute-force attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Revelation | Mikel_olasagasti | 0.3.1 | 0.3.1 |
Revelation | Mikel_olasagasti | 0.4.1 | 0.4.1 |
Revelation | Mikel_olasagasti | 0.1.0 | 0.1.0 |
Revelation | Mikel_olasagasti | * | 0.4.13-2 |
Revelation | Mikel_olasagasti | 0.4.4 | 0.4.4 |
Revelation | Mikel_olasagasti | 0.4.12 | 0.4.12 |
Revelation | Mikel_olasagasti | 0.3.0 | 0.3.0 |
Revelation | Mikel_olasagasti | 0.3.3 | 0.3.3 |
Revelation | Mikel_olasagasti | 0.4.9 | 0.4.9 |
Revelation | Mikel_olasagasti | 0.4.8 | 0.4.8 |
Revelation | Mikel_olasagasti | 0.3.2 | 0.3.2 |
Revelation | Mikel_olasagasti | 0.4.6 | 0.4.6 |
Revelation | Mikel_olasagasti | 0.4.5 | 0.4.5 |
Revelation | Mikel_olasagasti | 0.4.0 | 0.4.0 |
Revelation | Mikel_olasagasti | 0.1.2 | 0.1.2 |
Revelation | Mikel_olasagasti | 0.4.11 | 0.4.11 |
Revelation | Mikel_olasagasti | 0.1.1 | 0.1.1 |
Revelation | Mikel_olasagasti | 0.4.10 | 0.4.10 |
Revelation | Mikel_olasagasti | 0.4.3 | 0.4.3 |
Revelation | Mikel_olasagasti | 0.4.7 | 0.4.7 |
Revelation | Mikel_olasagasti | 0.2.0 | 0.2.0 |
Revelation | Mikel_olasagasti | 0.2.1 | 0.2.1 |
Revelation | Mikel_olasagasti | 0.3.4 | 0.3.4 |
Revelation | Mikel_olasagasti | 0.4.2 | 0.4.2 |