Omnis Studio 2.4 Weak Database Field Encryption Vulnerability

e=encrypted byte
p=byte's position in the string, mod 4.
u = unencrypted byte

u=e-89+((3p^2-3p)/2)


 

Privacy Statement
Copyright 2010, SecurityFocus