Max CVSS | 4.3 | Min CVSS | 1.2 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-2894 | 4.3 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthen
|
06-10-2022 - 18:47 | 16-10-2019 - 18:15 | |
CVE-2019-13627 | 2.6 |
It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
|
21-07-2021 - 11:39 | 25-09-2019 - 15:15 | |
CVE-2019-13629 | 4.3 |
MatrixSSL 4.2.1 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or a remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issu
|
21-07-2021 - 11:39 | 03-10-2019 - 14:15 | |
CVE-2019-15809 | 1.2 |
Smart cards from the Athena SCS manufacturer, based on the Atmel Toolbox 00.03.11.05 and the AT90SC chip, contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to measure the duration of hundreds to thousands
|
13-04-2021 - 19:31 | 03-10-2019 - 14:15 | |
CVE-2019-13628 | 1.2 |
wolfSSL and wolfCrypt 4.0.0 and earlier (when configured without --enable-fpecc, --enable-sp, or --enable-sp-math) contain a timing side channel in ECDSA signature generation. This allows a local attacker, able to precisely measure the duration of si
|
10-10-2019 - 14:26 | 03-10-2019 - 14:15 | |
CVE-2019-14318 | 4.3 |
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue o
|
20-08-2019 - 18:15 | 30-07-2019 - 17:15 |