Vulnerabilities
Vulnerable Software
Geert Moernaut:  Security Vulnerabilities
Geert Moernaut LSrunasE and Supercrypt use an encryption key composed of an SHA1 hash of a fixed string embedded in the executable file, which makes it easier for local users to obtain this key without reverse engineering.
CVSS Score
2.1
EPSS Score
0.0
Published
2008-02-05


Contact Us

Shodan ® - All rights reserved