Show filters
108 Total Results
Displaying 41-50 of 108
Sort by:
Attacker Value
Unknown
CVE-2022-36287
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Uncaught exception in the FCS Server software maintained by Intel before version 1.1.79.3 may allow a privileged user to potentially enable denial of service via physical access.
0
Attacker Value
Unknown
CVE-2022-21163
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-29505
Disclosure Date: July 06, 2022 (last updated February 24, 2025)
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain a Key Management Error Vulnerability.
0
Attacker Value
Unknown
CVE-2022-26320
Disclosure Date: March 14, 2022 (last updated February 23, 2025)
The Rambus SafeZone Basic Crypto Module before 10.4.0, as used in certain Fujifilm (formerly Fuji Xerox) devices before 2022-03-01, Canon imagePROGRAF and imageRUNNER devices through 2022-03-14, and potentially many other devices, generates RSA keys that can be broken with Fermat's factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate.
0
Attacker Value
Unknown
CVE-2021-33097
Disclosure Date: November 17, 2021 (last updated February 23, 2025)
Time-of-check time-of-use vulnerability in the Crypto API Toolkit for Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via network access.
0
Attacker Value
Unknown
CVE-2021-43398
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
0
Attacker Value
Unknown
CVE-2021-40530
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
0
Attacker Value
Unknown
CVE-2020-15522
Disclosure Date: May 20, 2021 (last updated February 22, 2025)
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
0
Attacker Value
Unknown
CVE-2020-25657
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2020-25646
Disclosure Date: October 29, 2020 (last updated February 22, 2025)
A flaw was found in Ansible Collection community.crypto. openssl_privatekey_info exposes private key in logs. This directly impacts confidentiality
0