Kaspersky Password Manager caught out making easily bruteforced passwords
The big mistake made by KPM was using the current system time in seconds as the seed into a Mersenne Twister PRNG, meaning different instances will generate the same password at a given time.