Количество 6
Количество 6
CVE-2018-6594
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
CVE-2018-6594
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
CVE-2018-6594
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
CVE-2018-6594
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates we ...
GHSA-6528-wvf6-f6qg
Pycrypto generates weak key parameters
BDU:2018-01506
Уязвимость пакета, содержащего криптографические алгоритмы и протоколы для Python, Python-crypto, связанная с генерацией слабых ключевых параметров, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-6594 lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation. | CVSS3: 7.5 | 1% Низкий | около 8 лет назад | |
CVE-2018-6594 lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation. | CVSS3: 5.3 | 1% Низкий | около 8 лет назад | |
CVE-2018-6594 lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation. | CVSS3: 7.5 | 1% Низкий | около 8 лет назад | |
CVE-2018-6594 lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates we ... | CVSS3: 7.5 | 1% Низкий | около 8 лет назад | |
GHSA-6528-wvf6-f6qg Pycrypto generates weak key parameters | CVSS3: 7.5 | 1% Низкий | больше 7 лет назад | |
BDU:2018-01506 Уязвимость пакета, содержащего криптографические алгоритмы и протоколы для Python, Python-crypto, связанная с генерацией слабых ключевых параметров, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным | CVSS3: 7.5 | 1% Низкий | около 8 лет назад |
Уязвимостей на страницу