Safety vulnerability ID: 54232
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext.
Latest version: 1.10.0
A multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application