{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T20:08:48.763","vulnerabilities":[{"cve":{"id":"CVE-2020-36843","sourceIdentifier":"cve@mitre.org","published":"2025-03-13T06:15:34.043","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message."},{"lang":"es","value":"La implementación de EdDSA en EdDSA-Java (también conocido como ed25519-java) hasta la versión 0.3.0 presenta maleabilidad de firmas y no cumple con la propiedad SUF-CMA (Fuerte Infalsificación Existencial ante Ataques de Mensajes Elegidos). Esto permite a los atacantes crear nuevas firmas válidas, diferentes de las firmas previas, para un mensaje conocido."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.5,"impactScore":1.4}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-347"}]}],"references":[{"url":"https://eprint.iacr.org/2020/1244","source":"cve@mitre.org"},{"url":"https://github.com/str4d/ed25519-java/issues/82#issue-727629226","source":"cve@mitre.org"}]}}]}