Vulnerabilities > Botan Project > Botan > 1.11.32
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-08 | CVE-2024-39312 | Unspecified vulnerability in Botan Project Botan Botan is a C++ cryptography library. | 5.3 |
2023-11-03 | CVE-2017-7252 | Cleartext Transmission of Sensitive Information vulnerability in Botan Project Botan bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password. | 7.5 |
2021-09-06 | CVE-2021-40529 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | 5.9 |
2021-02-22 | CVE-2021-24115 | Unspecified vulnerability in Botan Project Botan In Botan before 2.17.3, constant-time computations are not used for certain decoding and encoding operations (base32, base58, base64, and hex). | 9.8 |
2019-03-08 | CVE-2018-20187 | Key Management Errors vulnerability in Botan Project Botan A side-channel issue was discovered in Botan before 2.9.0. | 5.9 |
2018-04-12 | CVE-2018-9860 | Off-by-one Error vulnerability in Botan Project Botan An issue was discovered in Botan 1.11.32 through 2.x before 2.6.0. | 7.5 |
2017-01-30 | CVE-2016-9132 | Integer Overflow or Wraparound vulnerability in Botan Project Botan In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed. | 9.8 |
2016-10-28 | CVE-2016-8871 | Information Exposure vulnerability in Botan Project Botan In Botan 1.11.29 through 1.11.32, RSA decryption with certain padding options had a detectable timing channel which could given sufficient queries be used to recover plaintext, aka an "OAEP side channel" attack. | 6.2 |