Total vulnerabilities in the database
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
Software | From | Fixed in |
---|---|---|
golang / go | 1.12 | 1.12.16 |
golang / go | 1.13 | 1.13.7 |
microsoft / windows_10_1809 | - | - |