Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2023-51939
Disclosure Date: February 01, 2024 (last updated February 09, 2024)
An issue in the cp_bbs_sig function in relic/src/cp/relic_cp_bbs.c of Relic relic-toolkit 0.6.0 allows a remote attacker to obtain sensitive information and escalate privileges via the cp_bbs_sig function.
0
Attacker Value
Unknown
CVE-2023-36327
Disclosure Date: September 01, 2023 (last updated October 08, 2023)
Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba42473d4d54daf24e295679e290e, allows attackers to execute arbitrary code and cause a denial of service in pos argument in bn_get_prime function.
0
Attacker Value
Unknown
CVE-2023-36326
Disclosure Date: September 01, 2023 (last updated October 08, 2023)
Integer Overflow vulnerability in RELIC before commit 34580d840469361ba9b5f001361cad659687b9ab, allows attackers to execute arbitrary code, cause a denial of service, and escalate privileges when calling realloc function in bn_grow function.
0
Attacker Value
Unknown
CVE-2020-36316
Disclosure Date: April 07, 2021 (last updated February 22, 2025)
In RELIC before 2021-04-03, there is a buffer overflow in PKCS#1 v1.5 signature verification because garbage bytes can be present.
0
Attacker Value
Unknown
CVE-2020-36315
Disclosure Date: April 07, 2021 (last updated February 22, 2025)
In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number.
0
Attacker Value
Unknown
CVE-2014-1234
Disclosure Date: January 10, 2014 (last updated October 05, 2023)
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
0