Revelation 0.4.13-2 and earlier does not iterate through SHA hashing algorithms for AES encryption, which makes it easier for context-dependent attackers to guess passwords via a brute force attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Revelation | Mikel_olasagasti | * | 0.4.13-2 (including) |
Revelation | Mikel_olasagasti | 0.1.0 (including) | 0.1.0 (including) |
Revelation | Mikel_olasagasti | 0.1.1 (including) | 0.1.1 (including) |
Revelation | Mikel_olasagasti | 0.1.2 (including) | 0.1.2 (including) |
Revelation | Mikel_olasagasti | 0.2.0 (including) | 0.2.0 (including) |
Revelation | Mikel_olasagasti | 0.2.1 (including) | 0.2.1 (including) |
Revelation | Mikel_olasagasti | 0.3.0 (including) | 0.3.0 (including) |
Revelation | Mikel_olasagasti | 0.3.1 (including) | 0.3.1 (including) |
Revelation | Mikel_olasagasti | 0.3.2 (including) | 0.3.2 (including) |
Revelation | Mikel_olasagasti | 0.3.3 (including) | 0.3.3 (including) |
Revelation | Mikel_olasagasti | 0.3.4 (including) | 0.3.4 (including) |
Revelation | Mikel_olasagasti | 0.4.0 (including) | 0.4.0 (including) |
Revelation | Mikel_olasagasti | 0.4.1 (including) | 0.4.1 (including) |
Revelation | Mikel_olasagasti | 0.4.2 (including) | 0.4.2 (including) |
Revelation | Mikel_olasagasti | 0.4.3 (including) | 0.4.3 (including) |
Revelation | Mikel_olasagasti | 0.4.4 (including) | 0.4.4 (including) |
Revelation | Mikel_olasagasti | 0.4.5 (including) | 0.4.5 (including) |
Revelation | Mikel_olasagasti | 0.4.6 (including) | 0.4.6 (including) |
Revelation | Mikel_olasagasti | 0.4.7 (including) | 0.4.7 (including) |
Revelation | Mikel_olasagasti | 0.4.8 (including) | 0.4.8 (including) |
Revelation | Mikel_olasagasti | 0.4.9 (including) | 0.4.9 (including) |
Revelation | Mikel_olasagasti | 0.4.10 (including) | 0.4.10 (including) |
Revelation | Mikel_olasagasti | 0.4.11 (including) | 0.4.11 (including) |
Revelation | Mikel_olasagasti | 0.4.12 (including) | 0.4.12 (including) |