Количество 11
Количество 11

CVE-2021-40528
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVE-2021-40528
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVE-2021-40528
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.

CVE-2021-40528
CVE-2021-40528
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext ...

ROS-20220125-15
Уязвимость криптографической библиотеки Libgcrypt

RLSA-2022:5311
Moderate: libgcrypt security update
GHSA-8m2v-68m9-q2c7
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
ELSA-2022-9564
ELSA-2022-9564: libgcrypt security update (IMPORTANT)
ELSA-2022-5311
ELSA-2022-5311: libgcrypt security update (MODERATE)

BDU:2022-00593
Уязвимость криптографической библиотеки Libgcrypt, связанная с использованием слабых криптографических алгоритмов, позволяющая нарушителю получить доступ к конфиденциальной информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-40528 The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | CVSS3: 5.9 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-40528 The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | CVSS3: 5.9 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-40528 The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | CVSS3: 5.9 | 0% Низкий | почти 4 года назад |
![]() | CVSS3: 5.9 | 0% Низкий | почти 4 года назад | |
CVE-2021-40528 The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext ... | CVSS3: 5.9 | 0% Низкий | почти 4 года назад | |
![]() | ROS-20220125-15 Уязвимость криптографической библиотеки Libgcrypt | 0% Низкий | больше 3 лет назад | |
![]() | RLSA-2022:5311 Moderate: libgcrypt security update | 0% Низкий | почти 3 года назад | |
GHSA-8m2v-68m9-q2c7 The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | CVSS3: 5.9 | 0% Низкий | около 3 лет назад | |
ELSA-2022-9564 ELSA-2022-9564: libgcrypt security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2022-5311 ELSA-2022-5311: libgcrypt security update (MODERATE) | почти 3 года назад | |||
![]() | BDU:2022-00593 Уязвимость криптографической библиотеки Libgcrypt, связанная с использованием слабых криптографических алгоритмов, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 5.9 | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу