Show filters
15 Total Results
Displaying 11-15 of 15
Sort by:
Attacker Value
Unknown
CVE-2021-38195
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.
0
Attacker Value
Unknown
CVE-2019-25003
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information.
0
Attacker Value
Unknown
CVE-2019-20399
Disclosure Date: April 19, 2019 (last updated February 21, 2025)
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
0
Attacker Value
Unknown
CVE-2017-14460
Disclosure Date: January 19, 2018 (last updated November 26, 2024)
An exploitable overly permissive cross-domain (CORS) whitelist vulnerability exists in JSON-RPC of Parity Ethereum client version 1.7.8. An automatically sent JSON object to JSON-RPC endpoint can trigger this vulnerability. A victim needs to visit a malicious website to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-18016
Disclosure Date: January 11, 2018 (last updated November 26, 2024)
Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
0