RedShift
HomeCasesContact
vulnerability cases

Discovered Vulnerabilities

A curated list of real vulnerabilities found by RedShift. Each case includes full reproduction steps, root cause analysis, and remediation guidance.

8 total cases0 critical2 high6 medium0 low
vulnerabilityseveritytypecategorydate
CBC/ECB PKCS#7 Padding Validation Timing Oraclenoble-ciphers
Medium
CWE-208Crypto2026-02-23
CBC Encrypt Out-of-Bounds Read/Write on Sub-Block Lengthtiny-AES-c
High
CWE-787Crypto2026-02-23
Identity Point R Causes Universal Signature Forgery in Ed25519noble-ed25519
High
CWE-347Crypto2026-02-23
ML-DSA Verify Throws Exception for Wrong-Length Public Keysnoble-post-quantum
Medium
CWE-754Crypto2026-02-23
ML-KEM Decapsulate Leaks Re-encryption Randomness via Subarray Buffernoble-post-quantum
Medium
CWE-200Crypto2026-02-23
ML-KEM Encapsulation Key Modulus Check Bypassnoble-post-quantum
Medium
CWE-20Crypto2026-02-23
Prototype Pollution Disables Low-S Signature Malleability Protectionnoble-secp256k1
Medium
CWE-1321Crypto2026-02-23
SLH-DSA Verify Throws Exceptions on Malformed Inputsnoble-post-quantum
Medium
CWE-754Crypto2026-02-23
RedShift

Automated Vulnerability Detection

HomeCasesContact
© 2026 RedShift. All rights reserved.