Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
crypto vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-43839
Cronos is a commercial implementation of a blockchain. In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx. This problem has been patched in Cro...
Crypto Evmos
Crypto Ethermint
Crypto Cronos
1 Github repository
5.3
CVSSv3
CVE-2020-36732
The crypto-js package prior to 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.
Crypto-js Project Crypto-js
2 Github repositories
9.1
CVSSv3
CVE-2023-46233
crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic h...
Crypto-js Project Crypto-js
7.5
CVSSv3
CVE-2018-13488
The mintToken function of a smart contract implementation for Crypto Alley Shares (CAST), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
Crypto Alley Shares Project Crypto Alley Shares -
NA
CVE-2007-6755
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent malicious users to...
Dell Bsafe Crypto-c-micro-edition
Dell Bsafe Crypto-j 5.0.1
Dell Bsafe Crypto-j 5.0
3 Github repositories
4.9
CVSSv3
CVE-2019-3733
RSA BSAFE Crypto-C Micro Edition, all versions before 4.1.4, is vulnerable to three (3) different Improper Clearing of Heap Memory Before Release vulnerability, also known as 'Heap Inspection vulnerability'. A malicious remote user could potentially exploit this vulnera...
Emc Rsa Bsafe Crypto-c
Dell Bsafe Crypto-c-micro-edition
5.9
CVSSv3
CVE-2023-50979
Crypto++ (aka cryptopp) up to and including 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
Cryptopp Crypto++
7.5
CVSSv3
CVE-2023-50981
ModularSquareRoot in Crypto++ (aka cryptopp) up to and including 8.9.0 allows malicious users to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
Cryptopp Crypto++
8.1
CVSSv3
CVE-2017-3204
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
Golang Crypto
1 Github repository
5.9
CVSSv3
CVE-2019-14318
Crypto++ 8.3.0 and previous versions contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar...
Cryptopp Crypto++
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »