Vulnerabilities (CVE)

Filtered by CWE-347
Total 426 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-42461 1 Elliptic Project 1 Elliptic 2024-08-16 N/A 9.1 CRITICAL
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
CVE-2024-41258 1 Filestash 1 Filestash 2024-08-15 N/A 5.3 MEDIUM
An issue was discovered in filestash v0.4. The usage of the ssh.InsecureIgnoreHostKey() disables host key verification, possibly allowing attackers to obtain sensitive information via a man-in-the-middle attack.
CVE-2024-23456 1 Zscaler 1 Client Connector 2024-08-07 N/A 7.5 HIGH
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
CVE-2023-28806 1 Zscaler 1 Client Connector 2024-08-07 N/A 6.5 MEDIUM
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.
CVE-2024-23460 1 Zscaler 1 Client Connector 2024-08-07 N/A 7.8 HIGH
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.
CVE-2024-42459 2024-08-02 N/A 5.3 MEDIUM
In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.