Количество 30
Количество 30
RLSA-2021:0538
Moderate: nss security and bug fix update
SUSE-RU-2021:3116-1
Recommended update for mozilla-nspr, mozilla-nss
SUSE-RU-2021:3115-1
Recommended update for mozilla-nspr, mozilla-nss
SUSE-RU-2021:14818-1
Recommended update for mozilla-nspr, mozilla-nss
ELSA-2020-4076
ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE)
ELSA-2021-0538
ELSA-2021-0538: nss security and bug fix update (MODERATE)
CVE-2020-12400
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-12400
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-12400
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-12400
When converting coordinates from projective to affine, the modular inv ...
GHSA-38vr-4p57-8h9g
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
BDU:2020-03960
Уязвимость функции модульной инверсии набора библиотек NSS (Network Security Services), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce design ...
GHSA-cm2q-67xf-jw8c
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
BDU:2020-03961
Уязвимость набора библиотек NSS (Network Security Services), связанная с использованием криптографического алгоритма ECDSA (Elliptic Curve Digital Signature Algorithm), содержащего дефекты, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
CVE-2020-6829
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2020-6829
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2021:0538 Moderate: nss security and bug fix update | почти 5 лет назад | |||
SUSE-RU-2021:3116-1 Recommended update for mozilla-nspr, mozilla-nss | больше 4 лет назад | |||
SUSE-RU-2021:3115-1 Recommended update for mozilla-nspr, mozilla-nss | больше 4 лет назад | |||
SUSE-RU-2021:14818-1 Recommended update for mozilla-nspr, mozilla-nss | больше 4 лет назад | |||
ELSA-2020-4076 ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE) | больше 5 лет назад | |||
ELSA-2021-0538 ELSA-2021-0538: nss security and bug fix update (MODERATE) | почти 5 лет назад | |||
CVE-2020-12400 When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12400 When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12400 When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12400 When converting coordinates from projective to affine, the modular inv ... | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
GHSA-38vr-4p57-8h9g When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.7 | 0% Низкий | больше 3 лет назад | |
BDU:2020-03960 Уязвимость функции модульной инверсии набора библиотек NSS (Network Security Services), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12401 During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12401 During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12401 During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12401 During ECDSA signature generation, padding applied in the nonce design ... | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
GHSA-cm2q-67xf-jw8c During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.7 | 0% Низкий | больше 3 лет назад | |
BDU:2020-03961 Уязвимость набора библиотек NSS (Network Security Services), связанная с использованием криптографического алгоритма ECDSA (Elliptic Curve Digital Signature Algorithm), содержащего дефекты, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад | |
CVE-2020-6829 When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 5.3 | 0% Низкий | больше 5 лет назад | |
CVE-2020-6829 When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80. | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад |
Уязвимостей на страницу