CVE-2025-24013
Lun, 20/01/2025 – 16:15
CVE-2025-24013
CVE-2025-24013
Lun, 20/01/2025 – 16:15
CVE-2025-24013
CVE-2025-24010
Lun, 20/01/2025 – 16:15
CVE-2025-24010
CVE-2025-23220
Lun, 20/01/2025 – 16:15
CVE-2025-23220
CVE-2025-23219
Lun, 20/01/2025 – 16:15
CVE-2025-23219
CVE-2025-23218
Lun, 20/01/2025 – 16:15
CVE-2025-23218
CVE-2025-23044
Lun, 20/01/2025 – 16:15
CVE-2025-23044
CVE-2025-22620
Lun, 20/01/2025 – 16:15
CVE-2025-22620
CVE-2025-23221
Lun, 20/01/2025 – 17:15
CVE-2025-23221
CVE-2025-0479
Lun, 20/01/2025 – 12:15
CVE-2025-0479
Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and compromise the targeted system.
CVE-2024-13176
Lun, 20/01/2025 – 14:15
CVE-2024-13176
Impact summary: A timing side-channel in ECDSA signature computations
could allow recovering the private key by an attacker. However, measuring
the timing would require either local access to the signing application or
a very fast network connection with low latency.
There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the attacker
process must either be located in the same physical computer or must
have a very fast network connection with low latency. For that reason
the severity of this vulnerability is Low.