Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
crypto vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2021-43839
Cronos is a commercial implementation of a blockchain. In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx. This problem has been patched in Cro...
Crypto Cronos
Crypto Ethermint
Crypto Evmos
1 Github repository
NA
CVE-2023-46233
crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic h...
Crypto-js Project Crypto-js
NA
CVE-2020-36732
The crypto-js package prior to 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.
Crypto-js Project Crypto-js
2 Github repositories
445
VMScore
CVE-2018-13488
The mintToken function of a smart contract implementation for Crypto Alley Shares (CAST), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
Crypto Alley Shares Project Crypto Alley Shares -
517
VMScore
CVE-2007-6755
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent malicious users to...
Dell Bsafe Crypto-c-micro-edition
Dell Bsafe Crypto-j 5.0.1
Dell Bsafe Crypto-j 5.0
3 Github repositories
356
VMScore
CVE-2019-3733
RSA BSAFE Crypto-C Micro Edition, all versions before 4.1.4, is vulnerable to three (3) different Improper Clearing of Heap Memory Before Release vulnerability, also known as 'Heap Inspection vulnerability'. A malicious remote user could potentially exploit this vulnera...
Dell Bsafe Crypto-c-micro-edition
Emc Rsa Bsafe Crypto-c
605
VMScore
CVE-2017-3204
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
Golang Crypto
1 Github repository
445
VMScore
CVE-2021-43398
Crypto++ (aka Cryptopp) 8.6.0 and previous versions contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow malicious users ...
Cryptopp Crypto\\+\\+
NA
CVE-2023-50979
Crypto++ (aka cryptopp) up to and including 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
Cryptopp Crypto\\+\\+
NA
CVE-2023-50980
gf2n.cpp in Crypto++ (aka cryptopp) up to and including 8.9.0 allows malicious users to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
Cryptopp Crypto\\+\\+
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »