Логотип exploitDog
bind:CVE-2020-13895
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-13895

Количество 3

Количество 3

nvd логотип

CVE-2020-13895

больше 5 лет назад

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-13895

больше 5 лет назад

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module befor ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-jxxc-m3fj-q52w

больше 3 лет назад

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-13895

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.

CVSS3: 8.8
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-13895

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module befor ...

CVSS3: 8.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-jxxc-m3fj-q52w

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу