Filtered by CWE-203
Total 656 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-34125 1 Glpi-project 1 Cmdb 2025-02-06 6.5 Medium
front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
CVE-2020-35165 1 Dell 2 Bsafe Crypto-c-micro-edition, Bsafe Micro-edition-suite 2025-02-06 5.1 Medium
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
CVE-2023-26557 1 Iofinnet 1 Tss-lib 2025-02-05 7.5 High
io.finnet tss-lib before 2.0.0 can leak the lambda value of a private key via a timing side-channel attack because it relies on Go big.Int, which is not constant time for Cmp, modular exponentiation, or modular inverse. An example leak is in crypto/paillier/paillier.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
CVE-2023-26556 1 Iofinnet 1 Tss-lib 2025-02-05 9.1 Critical
io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
CVE-2025-24506 2025-02-05 N/A
A specific authentication strategy allows to learn ids of PAM users associated with certain authentication types.
CVE-2023-30458 1 Medicine Tracker System Project 1 Medicine Tracker System 2025-02-04 5.3 Medium
A username enumeration issue was discovered in Medicine Tracker System 1.0. The login functionality allows a malicious user to guess a valid username due to a different response time from invalid usernames. When one enters a valid username, the response time increases depending on the length of the supplied password.
CVE-2023-26560 1 Northern.tech 1 Cfengine 2025-02-04 6.5 Medium
Northern.tech CFEngine Enterprise before 3.21.1 allows a subset of authenticated users to leverage the Scheduled Reports feature to read arbitrary files and potentially discover credentials.
CVE-2022-40482 1 Laravel 1 Framework 2025-02-03 5.3 Medium
The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist.
CVE-2023-28770 1 Zyxel 2 Dx5401-b0, Dx5401-b0 Firmware 2025-01-31 7.5 High
The sensitive information exposure vulnerability in the CGI “Export_Log” and the binary “zcmd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to read the system files and to retrieve the password of the supervisor from the encrypted file.
CVE-2024-36510 1 Fortinet 2 Forticlientems, Fortisoar 2025-01-31 4.9 Medium
An observable response discrepancy vulnerability [CWE-204] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, and FortiSOAR 7.5.0, 7.4.0 through 7.4.4, 7.3.0 through 7.3.2, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to enumerate valid users via observing login request responses.
CVE-2024-43546 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 5 more 2025-01-29 5.6 Medium
Windows Cryptographic Information Disclosure Vulnerability
CVE-2024-39894 2025-01-29 7.5 High
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
CVE-2023-27931 1 Apple 5 Ipados, Iphone Os, Macos and 2 more 2025-01-29 5.5 Medium
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.3, tvOS 16.4, watchOS 9.4. An app may be able to access user-sensitive data.
CVE-2024-26268 1 Liferay 2 Digital Experience Platform, Liferay Portal 2025-01-28 5.3 Medium
User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.
CVE-2023-27870 1 Ibm 1 Spectrum Virtualize 2025-01-24 5.9 Medium
IBM Spectrum Virtualize 8.5, under certain circumstances, could disclose sensitive credential information while a download from Fix Central is in progress. IBM X-Force ID: 249518.
CVE-2024-43095 2025-01-24 7.8 High
In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2023-23449 1 Sick 14 Ftmg-esd15axx, Ftmg-esd15axx Firmware, Ftmg-esd20axx and 11 more 2025-01-23 5.3 Medium
Observable Response Discrepancy in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote attacker to gain information about valid usernames by analyzing challenge responses from the server via the REST interface.
CVE-2024-26221 1 Microsoft 4 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 1 more 2025-01-23 7.2 High
Windows DNS Server Remote Code Execution Vulnerability
CVE-2023-1696 1 Huawei 2 Emui, Harmonyos 2025-01-21 7.5 High
The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability.
CVE-2023-28015 1 Hcl 1 Domino Appdev Pack 2025-01-17 5.3 Medium
The HCL Domino AppDev Pack IAM service is susceptible to a User Account Enumeration vulnerability.   During a failed login attempt a difference in messages could allow an attacker to determine if the user is valid or not.  The attacker could use this information to focus a brute force attack on valid users.