Show filters
79 Total Results
Displaying 11-20 of 79
Sort by:
Attacker Value
Unknown

CVE-2023-50980

Disclosure Date: December 18, 2023 (last updated December 28, 2023)
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
Attacker Value
Unknown

CVE-2023-50979

Disclosure Date: December 18, 2023 (last updated December 28, 2023)
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
Attacker Value
Unknown

CVE-2023-49083

Disclosure Date: November 29, 2023 (last updated September 06, 2024)
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.
Attacker Value
Unknown

CVE-2023-49092

Disclosure Date: November 28, 2023 (last updated December 29, 2023)
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.
Attacker Value
Unknown

CVE-2023-46233

Disclosure Date: October 25, 2023 (last updated November 07, 2023)
crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.
Attacker Value
Unknown

CVE-2022-48570

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons.
Attacker Value
Unknown

CVE-2023-39520

Disclosure Date: August 07, 2023 (last updated October 08, 2023)
Cryptomator encrypts data being stored on cloud infrastructure. The MSI installer provided on the homepage for Cryptomator version 1.9.2 allows local privilege escalation for low privileged users, via the `repair` function. The problem occurs as the repair function of the MSI is spawning an SYSTEM Powershell without the `-NoProfile` parameter. Therefore the profile of the user starting the repair will be loaded. Version 1.9.3 contains a fix for this issue. Adding a `-NoProfile` to the powershell is a possible workaround.
Attacker Value
Unknown

CVE-2023-37907

Disclosure Date: July 25, 2023 (last updated October 08, 2023)
Cryptomator is data encryption software for users who store their files in the cloud. Prior to version 1.9.2, the MSI installer provided on the homepage allows local privilege escalation (LPE) for low privileged users, if already installed. The problem occurs as the repair function of the MSI spawns two administrative CMDs. A simple LPE is possible via a breakout. Version 1.9.2 fixes this issue.
Attacker Value
Unknown

CVE-2023-38325

Disclosure Date: July 14, 2023 (last updated September 06, 2024)
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.
Attacker Value
Unknown

CVE-2020-36732

Disclosure Date: June 12, 2023 (last updated October 08, 2023)
The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.