Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown

CVE-2022-40974

Disclosure Date: May 10, 2023 (last updated October 08, 2023)
Incomplete cleanup in the Intel(R) IPP Cryptography software before version 2021.6 may allow a privileged user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2022-37409

Disclosure Date: May 10, 2023 (last updated October 08, 2023)
Insufficient control flow management for the Intel(R) IPP Cryptography software before version 2021.6 may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2023-23931

Disclosure Date: February 07, 2023 (last updated September 06, 2024)
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
Attacker Value
Unknown

CVE-2021-33147

Disclosure Date: February 09, 2022 (last updated October 07, 2023)
Improper conditions check in the Intel(R) IPP Crypto library before version 2021.2 may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2021-0001

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2020-36242

Disclosure Date: February 07, 2021 (last updated February 22, 2025)
In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
Attacker Value
Unknown

CVE-2020-20949

Disclosure Date: January 20, 2021 (last updated February 22, 2025)
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
Attacker Value
Unknown

CVE-2020-20950

Disclosure Date: January 19, 2021 (last updated February 22, 2025)
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
Attacker Value
Unknown

CVE-2020-25659

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
Attacker Value
Unknown

CVE-2020-1026

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka 'MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability'.