info
discussion
exploit
solution
references
Omnis Studio 2.4 Weak Database Field Encryption Vulnerability
e=encrypted byte
p=byte's position in the string, mod 4.
u = unencrypted byte
u=e-89+((3p^2-3p)/2)
Privacy Statement
Copyright 2010, SecurityFocus