Vulnerabilities
Vulnerable Software
Faircom:  Security Vulnerabilities
The Data Camouflage (aka FairCom Standard Encryption) algorithm in FairCom c-treeACE does not ensure that a decryption key is needed for accessing database contents, which allows context-dependent attackers to read cleartext database records by copying a database to another system that has a certain default configuration.
CVSS Score
7.1
EPSS Score
0.001
Published
2013-06-16


Contact Us

Shodan ® - All rights reserved