Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2023-52323
Disclosure Date: January 05, 2024 (last updated January 12, 2024)
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
0
Attacker Value
Unknown
CVE-2018-15560
Disclosure Date: August 20, 2018 (last updated January 12, 2024)
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, related to the AESNI_encrypt and AESNI_decrypt functions, leading to the mishandling of messages shorter than 16 bytes.
0
Attacker Value
Unknown
CVE-2018-6594
Disclosure Date: February 03, 2018 (last updated November 26, 2024)
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
0
Attacker Value
Unknown
CVE-2013-7459
Disclosure Date: February 15, 2017 (last updated November 08, 2023)
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
0
Attacker Value
Unknown
CVE-2013-1445
Disclosure Date: October 26, 2013 (last updated October 05, 2023)
The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
0
Attacker Value
Unknown
CVE-2012-2417
Disclosure Date: June 17, 2012 (last updated October 04, 2023)
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
0