Количество 10
Количество 10
CVE-2020-13757
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
CVE-2020-13757
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
CVE-2020-13757
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
CVE-2020-13757
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ...
openSUSE-SU-2021:2008-1
Security update for python-rsa
openSUSE-SU-2021:0901-1
Security update for python-rsa
SUSE-SU-2021:2237-1
Security update for python-rsa
SUSE-SU-2021:2008-1
Security update for python-rsa
GHSA-537h-rv9q-vvph
Python-RSA decryption of ciphertext leads to DoS
BDU:2025-03987
Уязвимость криптографической библиотеки Python RSA, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю получить доступ к конфиденциальным данным
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-13757 Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-13757 Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-13757 Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-13757 Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ... | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад | |
openSUSE-SU-2021:2008-1 Security update for python-rsa | 0% Низкий | больше 4 лет назад | ||
openSUSE-SU-2021:0901-1 Security update for python-rsa | 0% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:2237-1 Security update for python-rsa | 0% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:2008-1 Security update for python-rsa | 0% Низкий | больше 4 лет назад | ||
GHSA-537h-rv9q-vvph Python-RSA decryption of ciphertext leads to DoS | CVSS3: 7.5 | 0% Низкий | почти 5 лет назад | |
BDU:2025-03987 Уязвимость криптографической библиотеки Python RSA, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 7.5 | 0% Низкий | больше 5 лет назад |
Уязвимостей на страницу