Show filters
226 Total Results
Displaying 161-170 of 226
Sort by:
Attacker Value
Unknown

CVE-2019-11840

Disclosure Date: May 09, 2019 (last updated May 10, 2024)
An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.
Attacker Value
Unknown

CVE-2019-9115

Disclosure Date: February 25, 2019 (last updated November 27, 2024)
In irisnet-crypto before 1.1.7 for IRISnet, the util/utils.js file allows code execution because of unsafe eval usage.
0
Attacker Value
Unknown

CVE-2018-12975

Disclosure Date: September 24, 2018 (last updated November 08, 2023)
The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).
0
Attacker Value
Unknown

CVE-2018-11070

Disclosure Date: September 11, 2018 (last updated November 27, 2024)
RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.
Attacker Value
Unknown

CVE-2018-11056

Disclosure Date: August 31, 2018 (last updated November 27, 2024)
RSA BSAFE Micro Edition Suite, prior to 4.1.6.1 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition versions prior to 4.0.5.3 (in 4.0.x) contain an Uncontrolled Resource Consumption ('Resource Exhaustion') vulnerability when parsing ASN.1 data. A remote attacker could use maliciously constructed ASN.1 data that would exhaust the stack, potentially causing a Denial Of Service.
Attacker Value
Unknown

CVE-2018-15560

Disclosure Date: August 20, 2018 (last updated January 12, 2024)
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes.
Attacker Value
Unknown

CVE-2018-12885

Disclosure Date: August 07, 2018 (last updated November 27, 2024)
The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
0
Attacker Value
Unknown

CVE-2018-13877

Disclosure Date: August 06, 2018 (last updated November 27, 2024)
The doPayouts() function of the smart contract implementation for MegaCryptoPolis, an Ethereum game, has a Denial of Service vulnerability. If a smart contract that has a fallback function always causing exceptions buys a land, users cannot buy lands near that contract's land, because those purchase attempts will not be completed unless the doPayouts() function successfully sends Ether to certain neighbors.
0
Attacker Value
Unknown

CVE-2018-14715

Disclosure Date: August 03, 2018 (last updated November 08, 2023)
The endCoinFlip function and throwSlammer function of the smart contract implementations for Cryptogs, an Ethereum game, generate random numbers with an old block's hash. Therefore, attackers can predict the random number and always win the game.
0
Attacker Value
Unknown

CVE-2018-10903

Disclosure Date: July 30, 2018 (last updated November 27, 2024)
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
0