Show filters
79 Total Results
Displaying 51-60 of 79
Sort by:
Attacker Value
Unknown

CVE-2013-4101

Disclosure Date: November 04, 2019 (last updated November 27, 2024)
Cryptocat before 2.0.22 Link Markup Decorator HTML Handling Weakness
Attacker Value
Unknown

CVE-2019-18673

Disclosure Date: November 02, 2019 (last updated November 27, 2024)
On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. Note: BIP39 secrets are not displayed by default on this device. The side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
Attacker Value
Unknown

CVE-2019-14823

Disclosure Date: October 14, 2019 (last updated November 27, 2024)
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to attacks such as Man in the Middle.
Attacker Value
Unknown

CVE-2019-14318

Disclosure Date: July 30, 2019 (last updated November 27, 2024)
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.
0
Attacker Value
Unknown

CVE-2018-17882

Disclosure Date: March 15, 2019 (last updated November 27, 2024)
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.
0
Attacker Value
Unknown

CVE-2018-12975

Disclosure Date: September 24, 2018 (last updated November 08, 2023)
The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).
0
Attacker Value
Unknown

CVE-2018-15560

Disclosure Date: August 20, 2018 (last updated January 12, 2024)
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes.
Attacker Value
Unknown

CVE-2018-12885

Disclosure Date: August 07, 2018 (last updated November 27, 2024)
The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
0
Attacker Value
Unknown

CVE-2018-13877

Disclosure Date: August 06, 2018 (last updated November 27, 2024)
The doPayouts() function of the smart contract implementation for MegaCryptoPolis, an Ethereum game, has a Denial of Service vulnerability. If a smart contract that has a fallback function always causing exceptions buys a land, users cannot buy lands near that contract's land, because those purchase attempts will not be completed unless the doPayouts() function successfully sends Ether to certain neighbors.
0
Attacker Value
Unknown

CVE-2018-14715

Disclosure Date: August 03, 2018 (last updated November 08, 2023)
The endCoinFlip function and throwSlammer function of the smart contract implementations for Cryptogs, an Ethereum game, generate random numbers with an old block's hash. Therefore, attackers can predict the random number and always win the game.
0