Computer Security
[EN] securityvulns.ru no-pyccku


Hamachi VPN Client cleartext password in process memory
Published:25.03.2008
Source:
SecurityVulns ID:8833
Type:local
Threat Level:
3/10
Description:Cleartext username and password can be dumped in cleartext from process memory.
Affected:HAMACHI : Hamachi VPN Client 1.0
Original documentdocumentevilcry_(at)_gmail.com, Hamachi Password Disclosure Vulnerability (25.03.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod