Vulnerabilities
Vulnerable Software
Parity:  Security Vulnerabilities
An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information.
CVSS Score
7.5
EPSS Score
0.003
Published
2020-12-31
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
CVSS Score
5.9
EPSS Score
0.004
Published
2020-01-23
An exploitable overly permissive cross-domain (CORS) whitelist vulnerability exists in JSON-RPC of Parity Ethereum client version 1.7.8. An automatically sent JSON object to JSON-RPC endpoint can trigger this vulnerability. A victim needs to visit a malicious website to trigger this vulnerability.
CVSS Score
7.5
EPSS Score
0.005
Published
2018-01-19
Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
CVSS Score
5.3
EPSS Score
0.017
Published
2018-01-11


Contact Us

Shodan ® - All rights reserved