cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-3740,https://securityvulnerability.io/vulnerability/CVE-2019-3740,,RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.,Dell,Rsa Bsafe Crypto-j,6.5,MEDIUM,0.007300000172108412,false,,false,false,false,,,false,false,,2019-09-18T23:15:00.000Z,0 CVE-2019-3739,https://securityvulnerability.io/vulnerability/CVE-2019-3739,,RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.,Dell,Rsa Bsafe Crypto-j,6.5,MEDIUM,0.007300000172108412,false,,false,false,false,,,false,false,,2019-09-18T23:15:00.000Z,0 CVE-2019-3738,https://securityvulnerability.io/vulnerability/CVE-2019-3738,,RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to a Missing Required Cryptographic Step vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.,Dell,Rsa Bsafe Crypto-j,6.5,MEDIUM,0.007269999943673611,false,,false,false,false,,,false,false,,2019-09-18T23:15:00.000Z,0 CVE-2018-11070,https://securityvulnerability.io/vulnerability/CVE-2018-11070,,"RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.",Dell,"Rsa Bsafe Crypto-j,Rsa Bsafe Ssl-j",5.9,MEDIUM,0.0016499999910593033,false,,false,false,false,,,false,false,,2018-09-11T19:29:00.000Z,0 CVE-2016-8217,https://securityvulnerability.io/vulnerability/CVE-2016-8217,,EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.,Dell,Rsa Bsafe Crypto-j Rsa Bsafe Crypto-j Versions Prior To 6.2.2,3.7,LOW,0.0017999999690800905,false,,false,false,false,,,false,false,,2017-02-03T07:24:00.000Z,0 CVE-2016-8212,https://securityvulnerability.io/vulnerability/CVE-2016-8212,,"An issue was discovered in EMC RSA BSAFE Crypto-J versions prior to 6.2.2. There is an Improper OCSP Validation Vulnerability. OCSP responses have two time values: thisUpdate and nextUpdate. These specify a validity period; however, both values are optional. Crypto-J treats the lack of a nextUpdate as indicating that the OCSP response is valid indefinitely instead of restricting its validity for a brief period surrounding the thisUpdate time. This vulnerability is similar to the issue described in CVE-2015-4748.",Dell,Rsa Bsafe Crypto-j Rsa Bsafe Crypto-j Versions Prior To 6.2.2,7.5,HIGH,0.002099999925121665,false,,false,false,false,,,false,false,,2017-02-03T07:24:00.000Z,0