Show filters
226 Total Results
Displaying 101-110 of 226
Sort by:
Attacker Value
Unknown
CVE-2021-45709
Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the crypto2 crate through 2021-10-08 for Rust. During Chacha20 encryption and decryption, an unaligned read of a u32 may occur.
0
Attacker Value
Unknown
CVE-2021-33097
Disclosure Date: November 17, 2021 (last updated February 23, 2025)
Time-of-check time-of-use vulnerability in the Crypto API Toolkit for Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via network access.
0
Attacker Value
Unknown
CVE-2021-43398
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
0
Attacker Value
Unknown
CVE-2021-38177
Disclosure Date: September 14, 2021 (last updated February 23, 2025)
SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high impact on the availability of the SAP system.
0
Attacker Value
Unknown
CVE-2021-40530
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
0
Attacker Value
Unknown
CVE-2021-0001
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-15522
Disclosure Date: May 20, 2021 (last updated February 22, 2025)
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
0
Attacker Value
Unknown
CVE-2020-26155
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
Multiple files and folders in Utimaco SecurityServer 4.20.0.4 and 4.31.1.0. are installed with Read/Write permissions for authenticated users, which allows for binaries to be manipulated by non-administrator users. Additionally, entries are made to the PATH environment variable which, in conjunction with these weak permissions, could enable an attacker to perform a DLL hijacking attack.
0
Attacker Value
Unknown
CVE-2020-36242
Disclosure Date: February 07, 2021 (last updated February 22, 2025)
In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
0
Attacker Value
Unknown
CVE-2020-20949
Disclosure Date: January 20, 2021 (last updated February 22, 2025)
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
0