Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Geert Moernaut LSrunasE and Supercrypt use an encryption key composed of an SHA1 hash of a fixed string embedded in the executable file, which makes it easier for local users to obtain this key without reverse engineering.

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.