Description
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption. This vulnerability can lead to the disclosure of information and communications.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0218 | PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption. This vulnerability can lead to the disclosure of information and communications. |
Github GHSA |
GHSA-fxff-wxxv-c2jc | PyPinkSign uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption |
References
History
Tue, 07 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-07T18:45:49.208Z
Reserved: 2023-11-13T00:00:00.000Z
Link: CVE-2023-48056
Updated: 2024-08-02T21:23:37.927Z
Status : Modified
Published: 2023-11-16T18:15:07.440
Modified: 2024-11-21T08:31:03.290
Link: CVE-2023-48056
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA