{"uuid": "f0fb3de8-4101-411f-bc7c-eb1be7c2dcef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42012", "type": "seen", "source": "https://t.me/cvedetector/16116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42012 - GRau DATA Password Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-42012 \nPublished : Jan. 22, 2025, 4:15 p.m. | 44\u00a0minutes ago \nDescription : GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T18:04:05.000000Z"}