Filtered by vendor Relic Project
Subscriptions
Filtered by product Relic
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-36326 | 1 Relic Project | 1 Relic | 2024-10-01 | 9.8 Critical |
Integer Overflow vulnerability in RELIC before commit 34580d840469361ba9b5f001361cad659687b9ab, allows attackers to execute arbitrary code, cause a denial of service, and escalate privileges when calling realloc function in bn_grow function. | ||||
CVE-2023-36327 | 1 Relic Project | 1 Relic | 2024-10-01 | 9.8 Critical |
Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba42473d4d54daf24e295679e290e, allows attackers to execute arbitrary code and cause a denial of service in pos argument in bn_get_prime function. | ||||
CVE-2023-51939 | 1 Relic Project | 1 Relic | 2024-09-12 | 8.8 High |
An issue in the cp_bbs_sig function in relic/src/cp/relic_cp_bbs.c of Relic relic-toolkit 0.6.0 allows a remote attacker to obtain sensitive information and escalate privileges via the cp_bbs_sig function. | ||||
CVE-2020-36316 | 1 Relic Project | 1 Relic | 2024-08-04 | 5.5 Medium |
In RELIC before 2021-04-03, there is a buffer overflow in PKCS#1 v1.5 signature verification because garbage bytes can be present. | ||||
CVE-2020-36315 | 1 Relic Project | 1 Relic | 2024-08-04 | 5.3 Medium |
In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number. |
Page 1 of 1.