Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-45177

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-21 Feb, 2024 | 00:00
Updated At-26 Aug, 2024 | 17:03
Rejected At-
Credits

An issue was discovered in LIVEBOX Collaboration vDesk through v031. An Observable Response Discrepancy can occur under the /api/v1/vdeskintegration/user/isenableuser endpoint, the /api/v1/sharedsearch?search={NAME]+{SURNAME] endpoint, and the /login endpoint. The web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:21 Feb, 2024 | 00:00
Updated At:26 Aug, 2024 | 17:03
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in LIVEBOX Collaboration vDesk through v031. An Observable Response Discrepancy can occur under the /api/v1/vdeskintegration/user/isenableuser endpoint, the /api/v1/sharedsearch?search={NAME]+{SURNAME] endpoint, and the /login endpoint. The web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.gruppotim.it/it/footer/red-team.html
N/A
Hyperlink: https://www.gruppotim.it/it/footer/red-team.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.gruppotim.it/it/footer/red-team.html
x_transferred
Hyperlink: https://www.gruppotim.it/it/footer/red-team.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
liveboxcloud
Product
vdesk
CPEs
  • cpe:2.3:a:liveboxcloud:vdesk:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through v031 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-94CWE-94 Improper Control of Generation of Code ('Code Injection')
Type: CWE
CWE ID: CWE-94
Description: CWE-94 Improper Control of Generation of Code ('Code Injection')
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:21 Feb, 2024 | 16:15
Updated At:26 Aug, 2024 | 17:35

An issue was discovered in LIVEBOX Collaboration vDesk through v031. An Observable Response Discrepancy can occur under the /api/v1/vdeskintegration/user/isenableuser endpoint, the /api/v1/sharedsearch?search={NAME]+{SURNAME] endpoint, and the /login endpoint. The web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

liveboxcloud
liveboxcloud
>>vdesk>>Versions up to 031(inclusive)
cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE-94Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-94
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.gruppotim.it/it/footer/red-team.htmlcve@mitre.org
Third Party Advisory
Hyperlink: https://www.gruppotim.it/it/footer/red-team.html
Source: cve@mitre.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

84Records found

CVE-2021-22892
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.92% / 75.10%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 11:14
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists in the Rocket.Chat server fixed v3.13, v3.12.2 & v3.11.3 that allowed email addresses to be disclosed by enumeration and validation checks.

Action-Not Available
Vendor-rocket.chatn/a
Product-rocket.chatRocket.Chat server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-22395
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.41%
||
7 Day CHG~0.00%
Published-25 Feb, 2022 | 18:11
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-magic_uiemuiharmonyosMagic UIHarmonyOSEMUI
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-50781
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.23%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 20:45
Updated-30 Aug, 2025 | 07:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
M2crypto: bleichenbacher timing attacks in the rsa decryption api - incomplete fix for cve-2020-25657

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Action-Not Available
Vendor-m2crypto_projectRed Hat, Inc.
Product-m2cryptoupdate_infrastructureenterprise_linuxRed Hat Update Infrastructure 4 for Cloud ProvidersRed Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Virtualization 4
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-0553
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.91% / 74.89%
||
7 Day CHG-0.15%
Published-16 Jan, 2024 | 11:40
Updated-30 Aug, 2025 | 08:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gnutls: incomplete fix for cve-2023-5981

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

Action-Not Available
Vendor-Fedora ProjectGNURed Hat, Inc.
Product-fedoragnutlsenterprise_linuxRed Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 8.6 Extended Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 6RHODF-4.15-RHEL-9RHOL-5.8-RHEL-9Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9.2 Extended Update Support
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-18850
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.70%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 12:42
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TrevorC2 v1.1/v1.2 fails to prevent fingerprinting primarily via a discrepancy between response headers when responding to different HTTP methods, also via predictible responses when accessing and interacting with the "SITE_PATH_QUERY".

Action-Not Available
Vendor-trustedsecn/a
Product-trevorc2n/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-203
Observable Discrepancy
CVE-2010-10006
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-2.6||LOW
EPSS-0.12% / 31.16%
||
7 Day CHG~0.00%
Published-17 Jan, 2023 | 23:58
Updated-03 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
michaelliao jopenid OpenIdManager.java getAuthentication timing discrepancy

A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.08 is able to address this issue. The name of the patch is c9baaa976b684637f0d5a50268e91846a7a719ab. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218460.

Action-Not Available
Vendor-jopenid_projectmichaelliao
Product-jopenidjopenid
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2024-11297
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 40.03%
||
7 Day CHG+0.01%
Published-20 Dec, 2024 | 06:59
Updated-03 Jul, 2025 | 00:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Page Restriction WordPress (WP) – Protect WP Pages/Post <= 1.3.6 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure

The Page Restriction WordPress (WP) – Protect WP Pages/Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.

Action-Not Available
Vendor-miniorangecyberlord92
Product-page_restrictionPage Restriction WordPress (WP) – Protect WP Pages/Post
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-10463
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.12%
||
7 Day CHG+0.03%
Published-29 Oct, 2024 | 12:19
Updated-04 Nov, 2024 | 13:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxthunderbirdFirefoxFirefox ESRThunderbirdfirefoxthunderbirdfirefox_esr
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-34477
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.35%
||
7 Day CHG~0.00%
Published-22 Dec, 2022 | 00:00
Updated-15 Apr, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MediaError message property should be consistent to avoid leaking information about cross-origin resources; however for a same-site cross-origin resource, the message could have leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 102.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxFirefox
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-34174
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-2.50% / 84.74%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 14:40
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.

Action-Not Available
Vendor-Jenkins
Product-jenkinsJenkins
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-6540
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.21% / 43.90%
||
7 Day CHG~0.00%
Published-03 Jan, 2024 | 21:01
Updated-17 Jun, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in the Lenovo Browser Mobile and Lenovo Browser HD Apps for Android that could allow an attacker to craft a payload that could result in the disclosure of sensitive information.

Action-Not Available
Vendor-Lenovo Group Limited
Product-browser_mobilebrowser_hdLenovo Browser HDLenovo Browser Mobile
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-14716
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-73.35% / 98.74%
||
7 Day CHG~0.00%
Published-06 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Server Side Template Injection (SSTI) was discovered in the SEOmatic plugin before 3.1.4 for Craft CMS, because requests that don't match any elements incorrectly generate the canonicalUrl, and can lead to execution of Twig code.

Action-Not Available
Vendor-nystudio107n/a
Product-seomaticn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-31142
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.61% / 68.72%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 18:55
Updated-23 Apr, 2025 | 18:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential Timing Attack Vector in @fastify/bearer-auth

@fastify/bearer-auth is a Fastify plugin to require bearer Authorization headers. @fastify/bearer-auth prior to versions 7.0.2 and 8.0.1 does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack. Version 7.0.2 and 8.0.1 of @fastify/bearer-auth contain a patch. There are currently no known workarounds. The package fastify-bearer-auth, which covers versions 6.0.3 and prior, is also vulnerable starting at version 5.0.1. Users of fastify-bearer-auth should upgrade to a patched version of @fastify/bearer-auth.

Action-Not Available
Vendor-fastifyfastify
Product-bearer-authfastify-bearer-auth
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-51770
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-1.01% / 76.15%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 10:02
Updated-27 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache DolphinScheduler: Arbitrary File Read Vulnerability

Arbitrary File Read Vulnerability in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-dolphinschedulerApache DolphinScheduler
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-50782
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.71% / 71.27%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 20:45
Updated-03 Aug, 2025 | 10:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659

A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

Action-Not Available
Vendor-cryptography.ioRed Hat, Inc.Couchbase, Inc.
Product-ansible_automation_platformcryptographyenterprise_linuxupdate_infrastructurecouchbase_serverRed Hat Enterprise Linux 7Red Hat Ansible Automation Platform 2Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat Satellite 6Red Hat Update Infrastructure 4 for Cloud Providers
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-51282
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 42.82%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 00:00
Updated-17 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in mingSoft MCMS v.5.2.4 allows a a remote attacker to obtain sensitive information via a crafted script to the password parameter.

Action-Not Available
Vendor-mingsoftn/a
Product-mcmsn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-36517
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.85% / 82.24%
||
7 Day CHG~0.00%
Published-07 Mar, 2022 | 21:08
Updated-04 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.

Action-Not Available
Vendor-home-assistantn/a
Product-home-assistantn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-24912
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.33%
||
7 Day CHG~0.00%
Published-29 Jul, 2022 | 10:00
Updated-17 Sep, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing Attack

The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.

Action-Not Available
Vendor-runatlantisn/a
Product-atlantisgithub.com/runatlantis/atlantis/server/controllers/events
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-24429
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.35%
||
7 Day CHG~0.00%
Published-10 Jun, 2022 | 20:00
Updated-17 Sep, 2024 | 01:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Code Injection

The package convert-svg-core before 0.6.3 are vulnerable to Arbitrary Code Injection when using a specially crafted SVG file. An attacker can read arbitrary files from the file system and then show the file content as a converted PNG file.

Action-Not Available
Vendor-convert-svg-core_projectn/a
Product-convert-svg-coreconvert-svg-core
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-45560
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 42.77%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 00:00
Updated-03 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.

Action-Not Available
Vendor-memberscard_projectn/a
Product-memberscardn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-25065
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.28%
||
7 Day CHG~0.00%
Published-31 Aug, 2020 | 20:45
Updated-04 Aug, 2024 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on LG mobile devices with Android OS 4.4, 5.0, 5.1, 6.0, 7.0, 7.1, 8.0, 8.1, 9.0, and 10 software. Key logging may occur because of an obsolete API. The LG ID is LVE-SMP-170010 (August 2020).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-45287
Matching Score-4
Assigner-Go Project
ShareView Details
Matching Score-4
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.48%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 16:18
Updated-13 Feb, 2025 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/tls
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-20866
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-14.41% / 94.17%
||
7 Day CHG-7.67%
Published-10 Aug, 2022 | 16:20
Updated-01 Nov, 2024 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability

A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This vulnerability is due to a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. An attacker could exploit this vulnerability by using a Lenstra side-channel attack against the targeted device. A successful exploit could allow the attacker to retrieve the RSA private key. The following conditions may be observed on an affected device: This vulnerability will apply to approximately 5 percent of the RSA keys on a device that is running a vulnerable release of Cisco ASA Software or Cisco FTD Software; not all RSA keys are expected to be affected due to mathematical calculations applied to the RSA key. The RSA key could be valid but have specific characteristics that make it vulnerable to the potential leak of the RSA private key. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. See the Indicators of Compromise section for more information on the detection of this type of RSA key. The RSA key could be malformed and invalid. A malformed RSA key is not functional, and a TLS client connection to a device that is running Cisco ASA Software or Cisco FTD Software that uses the malformed RSA key will result in a TLS signature failure, which means a vulnerable software release created an invalid RSA signature that failed verification. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_9300firepower_4150firepower_1020secure_firewall_3110firepower_2130firepower_4110firepower_2110firepower_4125firepower_1000firepower_1030firepower_4145firepower_4120firepower_1150secure_firewall_3140firepower_threat_defensefirepower_4115firepower_1010firepower_1140secure_firewall_3130firepower_2120firepower_4100adaptive_security_appliance_softwarefirepower_2100firepower_1120asa_5506h-xfirepower_1040firepower_4112firepower_4140asa_5506w-xfirepower_2140asa_5506-xasa_5516-xsecure_firewall_3120asa_5508-xCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-17478
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.10%
||
7 Day CHG~0.00%
Published-10 Aug, 2020 | 17:23
Updated-04 Aug, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.

Action-Not Available
Vendor-p5-crypt-perl_projectn/a
Product-p5-crypt-perln/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-42016
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.66%
||
7 Day CHG~0.00%
Published-08 Mar, 2022 | 11:31
Updated-12 Aug, 2025 | 12:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i801, RUGGEDCOM i802, RUGGEDCOM i803, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM RMC30, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RP110, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600T, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS401, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000H, RUGGEDCOM RS8000T, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900L, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS969, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100P (32M) V4.X, RUGGEDCOM RSG2100P (32M) V5.X, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSL910, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. A timing attack, in a third-party component, could make the retrieval of the private key possible, used for encryption of sensitive data. If a threat actor were to exploit this, the data integrity and security could be compromised.

Action-Not Available
Vendor-Siemens AG
Product-ruggedcom_rs969ruggedcom_rs910ruggedcom_rsg2100ruggedcom_rsg2300pruggedcom_rs930lruggedcom_rsg907rruggedcom_rsg910cruggedcom_rs416ruggedcom_rs900wruggedcom_i801ruggedcom_rosruggedcom_m2100ruggedcom_rmcruggedcom_i800ruggedcom_rst2228ruggedcom_rs930wruggedcom_rmc8388ruggedcom_rsg2200ruggedcom_rs900ruggedcom_rs401ruggedcom_rs8000truggedcom_rsg909rruggedcom_rp110ruggedcom_rs910lruggedcom_i802ruggedcom_m969ruggedcom_rs910wruggedcom_rsg2100pruggedcom_rs8000ruggedcom_rst916pruggedcom_rs900gpruggedcom_rs900lruggedcom_rmc40ruggedcom_rsl910ruggedcom_rmc41ruggedcom_rsg920pruggedcom_rs920wruggedcom_rs416v2ruggedcom_rs8000aruggedcom_rsg2300ruggedcom_rst916cruggedcom_m2200ruggedcom_rs400ruggedcom_rst2228pruggedcom_rmc20ruggedcom_rs8000hruggedcom_rsg908cruggedcom_i803ruggedcom_rsg2488ruggedcom_rs900gruggedcom_rsg2288ruggedcom_rs920lruggedcom_rs940gruggedcom_rmc30RUGGEDCOM RS8000RUGGEDCOM RS900LRUGGEDCOM RSG2300 V4.XRUGGEDCOM RSG920P V4.XRUGGEDCOM RS930WRUGGEDCOM RS910LRUGGEDCOM RSG2300P V4.XRUGGEDCOM RS416v2 V5.XRUGGEDCOM RSG2100 (32M) V5.XRUGGEDCOM RS416Pv2 V4.XRUGGEDCOM RS1600RUGGEDCOM RS920WRUGGEDCOM RS940GRUGGEDCOM RS900FRUGGEDCOM M2200RUGGEDCOM RS910RUGGEDCOM RSG908CRUGGEDCOM RS900RUGGEDCOM RS400FRUGGEDCOM RS920LRUGGEDCOM RMC8388 V4.XRUGGEDCOM RSG2100RUGGEDCOM RS8000HRUGGEDCOM RS400RUGGEDCOM RS8000TRUGGEDCOM RS900G (32M) V4.XRUGGEDCOM M969RUGGEDCOM RS416PFRUGGEDCOM RS900GRUGGEDCOM M2100FRUGGEDCOM RS900M-STND-XXRUGGEDCOM RS900WRUGGEDCOM RS8000ARUGGEDCOM RMC8388 V5.XRUGGEDCOM i803RUGGEDCOM RSG910CRUGGEDCOM RSG2300PFRUGGEDCOM RSG2288 V4.XRUGGEDCOM RSG2488FRUGGEDCOM RS969RUGGEDCOM RSG2200RUGGEDCOM RS900 (32M) V4.XRUGGEDCOM RSG909RRUGGEDCOM RS416RUGGEDCOM RS416FRUGGEDCOM RS900GPFRUGGEDCOM RST2228PRUGGEDCOM RSG2100PRUGGEDCOM i800RUGGEDCOM RS416PRUGGEDCOM RS900M-STND-C01RUGGEDCOM RS900M-GETS-XXRUGGEDCOM RST916PRUGGEDCOM RSG920P V5.XRUGGEDCOM RSG2100 (32M) V4.XRUGGEDCOM RSG2288 V5.XRUGGEDCOM RS1600FRUGGEDCOM RSL910RUGGEDCOM RSG907RRUGGEDCOM RS930LRUGGEDCOM RSG2300P V5.XRUGGEDCOM RS910WRUGGEDCOM RSG2300 V5.XRUGGEDCOM RSG2100PFRUGGEDCOM RS900GPRUGGEDCOM RST916CRUGGEDCOM RSG2100FRUGGEDCOM RSG2488 V4.XRUGGEDCOM i802RUGGEDCOM RSG2100P (32M) V4.XRUGGEDCOM RS940GFRUGGEDCOM RSG2488 V5.XRUGGEDCOM RST2228RUGGEDCOM RS401RUGGEDCOM RMC30RUGGEDCOM RS900GFRUGGEDCOM M2100RUGGEDCOM RSG2300FRUGGEDCOM RS1600TRUGGEDCOM M969FRUGGEDCOM RS900G (32M) V5.XRUGGEDCOM RS416Pv2 V5.XRUGGEDCOM RS900M-GETS-C01RUGGEDCOM RS900 (32M) V5.XRUGGEDCOM M2200FRUGGEDCOM RP110RUGGEDCOM RSG2200FRUGGEDCOM i801RUGGEDCOM RSG2100P (32M) V5.XRUGGEDCOM RS416v2 V4.X
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2020-13998
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.03% / 76.46%
||
7 Day CHG~0.00%
Published-11 Jun, 2020 | 01:59
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Citrix XenApp 6.5, when 2FA is enabled, allows a remote unauthenticated attacker to ascertain whether a user exists on the server, because the 2FA error page only occurs after a valid username is entered. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-xenappn/axenapp
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-38562
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.69%
||
7 Day CHG~0.00%
Published-18 Oct, 2021 | 08:52
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.

Action-Not Available
Vendor-n/aBest Practical Solutions, LLCFedora ProjectDebian GNU/Linux
Product-debian_linuxrequest_trackerfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-4286
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-2.6||LOW
EPSS-0.13% / 33.37%
||
7 Day CHG~0.00%
Published-27 Dec, 2022 | 10:21
Updated-11 Apr, 2025 | 16:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cocagne pysrp _ctsrp.py calculate_x information exposure

A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 is able to address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875.

Action-Not Available
Vendor-pysrp_projectcocagne
Product-pysrppysrp
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12788
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.10%
||
7 Day CHG~0.00%
Published-14 Sep, 2020 | 13:24
Updated-04 Aug, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks.

Action-Not Available
Vendor-microchipn/a
Product-atsama5d36a-curatsama5d28c-ld2g-cuatsama5d43b-cur_firmwareatsama5d42b-curatsama5d27c-d5m-cur_firmwareatsama5d34a-cuatsama5d44a-curatsama5d28c-cn_firmwareatsama5d22c-cnratsama5d26c-curatsama5d35a-cu_firmwareatsama5d21c-cur_firmwareatsama5d27c-ld2g-cur_firmwareatsama5d27-som1atsama5d41a-cu_firmwareatsama5d36a-cur_firmwareatsama5d23c-cur_firmwareatsama5d28c-cu_firmwareatsama5d23c-cuatsama5d27c-d5m-curatsama5d31a-cfuatsama5d27c-cnvaoatsama5d41b-cuatsama5d28c-ld1g-cur_firmwareatsama5d21c-cuatsama5d26c-cn_firmwareatsama5d41a-cuatsama5d28c-ld2g-cu_firmwareatsama5d42a-cuatsama5d43a-cuatsama5d33a-cu_firmwareatsama5d36a-cuatsama5d27c-d1g-cu_firmwareatsama5d43b-cu_firmwareatsama5d34a-cur_firmwareatsama5d22c-cnr_firmwareatsama5d225c-d1m-cur_firmwareatsama5d43b-curatsama5d27c-cnatsama5d33a-cuatsama5d42b-cu_firmwareatsama5d23c-cnr_firmwareatsama5d44b-cu_firmwareatsama5d31a-cuatsama5d27c-cur_firmwareatsama5d27-wlsom1_firmwareatsama5d23c-curatsama5d24c-cuf_firmwareatsama5d28c-cuatsama5d34a-cu_firmwareatsama5d28c-curatsama5d43a-cur_firmwareatsama5d27c-ld2g-cu_firmwareatsama5d24c-cuatsama5d27c-cnrvao_firmwareatsama5d33a-cur_firmwareatsama5d24c-cur_firmwareatsama5d28c-cnratsama5d28c-ld1g-cu_firmwareatsama5d27c-curatsama5d21c-curatsama5d27c-d5m-cu_firmwareatsama5d35a-cnr_firmwareatsama5d42b-cuatsama5d36a-cnr_firmwareatsama5d24c-cufatsama5d44b-cuatsama5d27c-cn_firmwareatsama5d35a-cn_firmwareatsama5d42a-curatsama5d24c-cu_firmwareatsama5d27c-cnvao_firmwareatsama5d27c-cnratsama5d27c-ld1g-curatsama5d27c-ld2g-curatsama5d44a-cur_firmwareatsama5d27c-ld1g-cu_firmwareatsama5d225c-d1m-curatsama5d28c-ld1g-cuatsama5d27c-d1g-cuatsama5d28c-ld1g-curatsama5d22c-cur_firmwareatsama5d24c-curatsama5d28c-ld2g-cur_firmwareatsama5d44b-cur_firmwareatsama5d41b-cu_firmwareatsama5d41a-curatsama5d27c-d5m-cuatsama5d43a-curatsama5d26c-cnatsama5d31a-cfu_firmwareatsama5d36a-cn_firmwareatsama5d21c-cu_firmwareatsama5d31a-cfur_firmwareatsama5d36a-cnratsama5d27-som1_firmwareatsama5d41b-curatsama5d33a-curatsama5d26c-cnratsama5d27c-cnrvaoatsama5d41a-cur_firmwareatsama5d44a-cuatsama5d26c-cu_firmwareatsama5d35a-cnratsama5d22c-cu_firmwareatsama5d23c-cn_firmwareatsama5d23c-cnratsama5d31a-curatsama5d36a-cnatsama5d27c-ld2g-cuatsama5d22c-cuatsama5d27c-d1g-cur_firmwareatsama5d28c-ld2g-curatsama5d41b-cur_firmwareatsama5d43b-cuatsama5d36a-cu_firmwareatsama5d27c-ld1g-cur_firmwareatsama5d26c-cur_firmwareatsama5d42a-cu_firmwareatsama5d31a-cu_firmwareatsama5d27c-cnr_firmwareatsama5d22c-cn_firmwareatsama5d28c-d1g-cuatsama5d22c-curatsama5d28c-d1g-cur_firmwareatsama5d26c-cuatsama5d27c-cu_firmwareatsama5d31a-cfuratsama5d43a-cu_firmwareatsama5d35a-cur_firmwareatsama5d35a-curatsama5d23c-cnatsama5d26c-cnr_firmwareatsama5d23c-cu_firmwareatsama5d28c-cnr_firmwareatsama5d28c-cur_firmwareatsama5d28c-d1g-cu_firmwareatsama5d35a-cnatsama5d22c-cnatsama5d27c-d1g-curatsama5d27-wlsom1atsama5d44b-curatsama5d42a-cur_firmwareatsama5d27c-cuatsama5d34a-curatsama5d44a-cu_firmwareatsama5d28c-d1g-curatsama5d42b-cur_firmwareatsama5d31a-cur_firmwareatsama5d35a-cuatsama5d27c-ld1g-cuatsama5d28c-cnn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2017-9735
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.54% / 66.51%
||
7 Day CHG~0.00%
Published-16 Jun, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.

Action-Not Available
Vendor-n/aEclipse Foundation AISBLDebian GNU/LinuxOracle Corporation
Product-jettyretail_xstore_point_of_servicedebian_linuxcommunications_cloud_native_core_policyhospitality_guest_accessenterprise_manager_base_platformrest_data_servicesn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2013-10006
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-2.6||LOW
EPSS-0.08% / 24.87%
||
7 Day CHG~0.00%
Published-01 Jan, 2023 | 16:30
Updated-10 Apr, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ziftr primecoin bitcoinrpc.cpp HTTPAuthorized timing discrepancy

A vulnerability classified as problematic was found in Ziftr primecoin up to 0.8.4rc1. Affected by this vulnerability is the function HTTPAuthorized of the file src/bitcoinrpc.cpp. The manipulation of the argument strUserPass/strRPCUserColonPass leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.8.4rc2 is able to address this issue. The patch is named cdb3441b5cd2c1bae49fae671dc4a496f7c96322. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217171.

Action-Not Available
Vendor-ziftrshopZiftr
Product-primecoinprimecoin
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-41097
Matching Score-4
Assigner-Silicon Labs
ShareView Details
Matching Score-4
Assigner-Silicon Labs
CVSS Score-4.6||MEDIUM
EPSS-0.11% / 29.45%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 20:33
Updated-23 Apr, 2025 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential Timing vulnerability in CBC PKCS7 padding calculations

An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-36127
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.95%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

User enumeration is found in in PHPJabbers Appointment Scheduler 3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.

Action-Not Available
Vendor-n/aPHPJabbers Ltd.
Product-appointment_schedulern/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-3604
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.52%
||
7 Day CHG~0.00%
Published-21 Aug, 2023 | 12:29
Updated-02 Oct, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Change WP Admin < 1.1.4 - Secret Login Page Disclosure

The Change WP Admin Login WordPress plugin before 1.1.4 discloses the URL of the hidden login page when accessing a crafted URL, bypassing the protection offered.

Action-Not Available
Vendor-wpexpertsioUnknown
Product-change_wp_admin_loginChange WP Admin Login
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-34878
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.38%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 00:00
Updated-02 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensitive information via the dir parameter to /api/backend/core/web-file-html/download-zip.

Action-Not Available
Vendor-ujcmsn/a
Product-ujcmsn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-3529
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 26.98%
||
7 Day CHG~0.00%
Published-06 Jul, 2023 | 18:31
Updated-02 Aug, 2024 | 06:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rotem Dynamics Rotem CRM OTP URI Interface information exposure

A vulnerability classified as problematic has been found in Rotem Dynamics Rotem CRM up to 20230729. This affects an unknown part of the file /LandingPages/api/otp/send?id=[ID][ampersand]method=sms of the component OTP URI Interface. The manipulation leads to information exposure through discrepancy. It is possible to initiate the attack remotely. The identifier VDB-233253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-rotem-dynamicsRotem Dynamics
Product-rotem_crmRotem CRM
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-33741
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.95%
||
7 Day CHG~0.00%
Published-30 May, 2023 | 00:00
Updated-13 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Macrovideo v380pro v1.4.97 shares the device id and password when sharing the device.

Action-Not Available
Vendor-macro-videon/aGoogle LLC
Product-v380_proandroidn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-33850
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.69%
||
7 Day CHG~0.00%
Published-22 Aug, 2023 | 20:31
Updated-03 Oct, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM GSKit-Crypto information disclosure

IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, Inc
Product-linux_kerneltxseries_for_multiplatformcics_txhp-uxwindowsaixCICS TX AdvancedCICS TX StandardTXSeries for Multiplatformstxseries_for_multiplatformcics_tx
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-32342
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 5.13%
||
7 Day CHG~0.00%
Published-30 May, 2023 | 21:03
Updated-09 Jan, 2025 | 21:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM GSKit information disclosure

IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 255828.

Action-Not Available
Vendor-IBM Corporation
Product-http_serverGSKit
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-11713
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.48%
||
7 Day CHG~0.00%
Published-12 Apr, 2020 | 16:54
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wolfSSL 4.3.0 has mulmod code in wc_ecc_mulmod_ex in ecc.c that does not properly resist timing side-channel attacks.

Action-Not Available
Vendor-wolfssln/a
Product-wolfssln/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-29850
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.38%
||
7 Day CHG~0.00%
Published-14 Apr, 2023 | 00:00
Updated-06 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SENAYAN Library Management System (SLiMS) Bulian v9.5.2 does not strip exif data from uploaded images. This allows attackers to obtain information such as the user's geolocation and device information.

Action-Not Available
Vendor-slimsn/a
Product-senayan_library_management_systemn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-28770
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-7.5||HIGH
EPSS-79.11% / 99.03%
||
7 Day CHG~0.00%
Published-27 Apr, 2023 | 00:00
Updated-31 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sensitive information exposure vulnerability in the CGI “Export_Log” and the binary “zcmd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to read the system files and to retrieve the password of the supervisor from the encrypted file.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-dx5401-b0_firmwaredx5401-b0DX5401-B0 firmware
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-27870
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 19.49%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 19:36
Updated-24 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Spectrum Virtualize information disclosure

IBM Spectrum Virtualize 8.5, under certain circumstances, could disclose sensitive credential information while a download from Fix Central is in progress. IBM X-Force ID: 249518.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_virtualizeSpectrum Virtualize
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-26071
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.95%
||
7 Day CHG~0.00%
Published-28 Mar, 2023 | 00:00
Updated-19 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in MCUBO ICT through 10.12.4 (aka 6.0.2). An Observable Response Discrepancy can occur under the login web page. In particular, the web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor. That allow an unauthorized actor to perform User Enumeration attacks.

Action-Not Available
Vendor-harpaitalian/a
Product-mcuboictn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-37848
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.10%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 19:46
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

common/password.c in Pengutronix barebox through 2021.07.0 leaks timing information because strncmp is used during hash comparison.

Action-Not Available
Vendor-pengutronixn/a
Product-bareboxn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-24576
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.77% / 72.47%
||
7 Day CHG~0.00%
Published-03 Feb, 2023 | 17:21
Updated-25 Mar, 2025 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the NetWorker Client execution service (nsrexecd) irrespective of any auth used.

Action-Not Available
Vendor-Dell Inc.
Product-emc_networkerNetWorker, NVE
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-1707
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.27%
||
7 Day CHG~0.00%
Published-13 Jun, 2023 | 17:06
Updated-03 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.

Action-Not Available
Vendor-HP Inc.
Product-color_laserjet_managed_mfp_e78625_5qj90alaserjet_managed_flow_mfp_e73140_6bs58acolor_laserjet_managed_mfp_e786_3sj13alaserjet_managed_mfp_e73140_6bs57acolor_laserjet_enterprise_6700_49l00alaserjet_managed_e82670_3sj07acolor_laserjet_managed_flow_e87750_5qk20acolor_laserjet_managed_flow_mfp_e78625_5qj90alaserjet_managed_flow_mfp_e73130_5qk02acolor_laserjet_managed_flow_e87750_3sj37acolor_laserjet_managed_flow_mfp_e78630_3sj12acolor_laserjet_managed_mfp_e78630_5qj90alaserjet_enterprise_mfp_m430_3pz55acolor_laserjet_managed_mfp_e87760_3sj22acolor_laserjet_managed_flow_e87740_3sj19alaserjet_managed_mfp_e826dn_5qk13acolor_laserjet_managed_mfp_e87740_3sj38alaserjet_managed_mfp_e42540_3pz75acolor_laserjet_managed_mfp_e78625_3sj32alaserjet_managed_flow_mfp_e826z_3sj29alaserjet_managed_mfp_e73140_3sj00acolor_laserjet_managed_flow_e87770_5qk03alaserjet_managed_mfp_e73135_6bs58acolor_laserjet_managed_flow_e87760_3sj38acolor_laserjet_enterprise_flow_mfp_6800_6qn37acolor_laserjet_enterprise_6700_4y280alaserjet_managed_flow_mfp_e826z_5qk09alaserjet_managed_e40040_3pz35acolor_laserjet_managed_flow_e87760_3sj20acolor_laserjet_managed_flow_e87760_3sj19alaserjet_managed_e82650_3sj09acolor_laserjet_managed_mfp_e78625_3sj12acolor_laserjet_managed_mfp_e87750_3sj22acolor_laserjet_managed_mfp_e87740_3sj21acolor_laserjet_enterprise_5700_6qn28alaserjet_enterprise_mfp_m431_3pz56acolor_laserjet_managed_flow_mfp_e78630_5qk18alaserjet_managed_e82670_3sj28acolor_laserjet_managed_mfp_e87750_5qk03acolor_laserjet_enterprise_flow_mfp_6800_4y279acolor_laserjet_managed_mfp_e87750_3sj36acolor_laserjet_managed_flow_e87770_3sj38acolor_laserjet_managed_mfp_e87750_3sj21acolor_laserjet_managed_flow_e87750_5qk03acolor_laserjet_managed_flow_e87740_3sj36acolor_laserjet_managed_mfp_e87760_5qk20acolor_laserjet_managed_flow_e87760_3sj21alaserjet_managed_flow_mfp_e73135_5qj98acolor_laserjet_managed_mfp_e87770_5qk20alaserjet_managed_flow_mfp_e73130_3sj02alaserjet_managed_mfp_e826dn_3sj09acolor_laserjet_enterprise_mfp_6800_6qn35alaserjet_managed_e82660_3sj09alaserjet_managed_mfp_e73130_6bs57acolor_laserjet_managed_mfp_e78635_3sj32acolor_laserjet_enterprise_x55745_6qp97acolor_laserjet_managed_mfp_e78528_5qj81acolor_laserjet_enterprise_mfp_x57945_6qp98acolor_laserjet_enterprise_mfp_6800_6qn36alaserjet_managed_flow_mfp_e826z_3sj09acolor_laserjet_managed_mfp_e87770_3sj21acolor_laserjet_managed_flow_e87760_3sj35acolor_laserjet_managed_mfp_e87760_3sj37acolor_laserjet_enterprise_6701_4y280acolor_laserjet_managed_mfp_e786_3sj12acolor_laserjet_managed_mfp_e78625_5qj94acolor_laserjet_managed_flow_mfp_e78630_3sj34acolor_laserjet_managed_mfp_e87740_3sj37acolor_laserjet_enterprise_flow_mfp_5800_49k96avcolor_laserjet_managed_mfp_e87770_3sj19acolor_laserjet_managed_mfp_e78630_3sj33alaserjet_managed_mfp_e826dn_3sj29acolor_laserjet_managed_mfp_e786_5qj90acolor_laserjet_managed_mfp_e78635_5qj90acolor_laserjet_managed_flow_mfp_e786_5qj90acolor_laserjet_enterprise_flow_mfp_x57945_6qp99acolor_laserjet_managed_flow_e87760_3sj37acolor_laserjet_managed_mfp_e87740_5qk03acolor_laserjet_enterprise_mfp_5800_6qn29acolor_laserjet_managed_flow_e87740_3sj35acolor_laserjet_managed_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e786_3sj12alaserjet_managed_mfp_e73025_3sj03alaserjet_managed_mfp_e73030_3sj04acolor_laserjet_enterprise_mfp_x57945_49k97avcolor_laserjet_managed_mfp_e78625_3sj34acolor_laserjet_enterprise_6700_6qn33acolor_laserjet_managed_flow_e87770_3sj21acolor_laserjet_managed_flow_mfp_e786_3sj32acolor_laserjet_managed_mfp_e78625_3sj11alaserjet_managed_mfp_e73130_5qk02acolor_laserjet_managed_mfp_e87770_3sj36acolor_laserjet_managed_flow_e87750_3sj36acolor_laserjet_managed_mfp_e78635_3sj33acolor_laserjet_managed_mfp_e78635_5qk18alaserjet_managed_mfp_e73135_3sj01acolor_laserjet_managed_mfp_e87760_3sj20alaserjet_managed_e82670_5qk13acolor_laserjet_managed_flow_mfp_e786_5qk18acolor_laserjet_managed_flow_e87750_3sj20acolor_laserjet_managed_flow_mfp_e786_3sj11acolor_laserjet_managed_flow_e87740_3sj22acolor_laserjet_enterprise_mfp_6800_4y279acolor_laserjet_managed_flow_e87770_3sj35acolor_laserjet_enterprise_flow_mfp_5800_6qn29acolor_laserjet_managed_mfp_e78630_3sj11acolor_laserjet_managed_flow_mfp_e78625_3sj12acolor_laserjet_managed_flow_mfp_e78625_3sj32alaserjet_managed_e82660_3sj29acolor_laserjet_managed_mfp_e78625_3sj33alaserjet_managed_e82650_3sj08acolor_laserjet_managed_mfp_e87760_3sj21alaserjet_managed_e82670_3sj08alaserjet_managed_mfp_e73140_5qj98alaserjet_managed_e82660_5qk13alaserjet_managed_flow_mfp_e73135_3sj01acolor_laserjet_managed_flow_e87740_5qk20acolor_laserjet_managed_flow_mfp_e78635_3sj12alaserjet_managed_mfp_e73130_5qj98alaserjet_managed_mfp_e73135_3sj02alaserjet_managed_mfp_e73030_3sj03acolor_laserjet_managed_mfp_e87770_3sj38acolor_laserjet_managed_flow_e87740_3sj38acolor_laserjet_enterprise_flow_mfp_5800_6qn30acolor_laserjet_managed_mfp_e78523_5qj83alaserjet_managed_flow_mfp_e826z_3sj07alaserjet_managed_flow_mfp_e73140_6bs59alaserjet_managed_flow_mfp_e826z_3sj30alaserjet_managed_mfp_e826dn_3sj08acolor_laserjet_enterprise_flow_mfp_x57945_49k97avcolor_laserjet_managed_flow_mfp_e78630_3sj32acolor_laserjet_managed_mfp_e78528_5qk15alaserjet_managed_e82650_3sj28acolor_laserjet_managed_mfp_e87740_3sj22alaserjet_managed_mfp_e73135_5qj98acolor_laserjet_managed_flow_e87740_3sj37acolor_laserjet_managed_flow_mfp_e78635_3sj32acolor_laserjet_managed_flow_e87770_3sj22acolor_laserjet_enterprise_flow_mfp_6800_6qn35acolor_laserjet_managed_flow_mfp_e78635_3sj13acolor_laserjet_managed_mfp_e78625_3sj13acolor_laserjet_enterprise_mfp_6800_6qn38acolor_laserjet_enterprise_flow_mfp_5800_58r10acolor_laserjet_managed_flow_mfp_e78635_5qk18acolor_laserjet_managed_flow_e87750_3sj21alaserjet_managed_mfp_e73140_6bs59alaserjet_managed_mfp_e73135_5qk02acolor_laserjet_managed_mfp_e786_5qj94acolor_laserjet_managed_mfp_e87770_3sj37alaserjet_managed_e82670_3sj29acolor_laserjet_managed_mfp_e87740_3sj36alaserjet_managed_e82650_3sj30acolor_laserjet_managed_flow_mfp_e78635_5qj90acolor_laserjet_managed_mfp_e786_3sj33acolor_laserjet_managed_mfp_e78635_3sj13acolor_laserjet_managed_mfp_e78523_5qj81acolor_laserjet_enterprise_flow_mfp_x57945_6qp98acolor_laserjet_managed_mfp_e78630_5qk18alaserjet_enterprise_m407_3pz16acolor_laserjet_managed_mfp_e87740_3sj35acolor_laserjet_enterprise_6701_6qn33acolor_laserjet_enterprise_mfp_5800_6qn30acolor_laserjet_enterprise_flow_mfp_6800_6qn36alaserjet_managed_flow_mfp_e73130_6bs59alaserjet_managed_flow_mfp_e73135_3sj00alaserjet_managed_flow_mfp_e73130_6bs57alaserjet_managed_e82670_3sj09alaserjet_managed_flow_mfp_e73135_3sj02alaserjet_managed_mfp_e73130_3sj01alaserjet_managed_flow_mfp_e73135_5qk02acolor_laserjet_managed_mfp_e87760_3sj35acolor_laserjet_managed_flow_mfp_e78625_3sj11acolor_laserjet_managed_mfp_e786_3sj32acolor_laserjet_managed_flow_e87770_3sj19alaserjet_managed_e82660_3sj28acolor_laserjet_enterprise_flow_mfp_5800_6qn31alaserjet_managed_flow_mfp_e73135_6bs59acolor_laserjet_managed_flow_mfp_e78625_5qj94alaserjet_managed_flow_mfp_e73140_6bs57acolor_laserjet_managed_flow_mfp_e786_5qj94alaserjet_managed_e82650_5qk09acolor_laserjet_enterprise_6701_49l00acolor_laserjet_managed_mfp_e78523_5qk15alaserjet_managed_e82660_3sj08acolor_laserjet_managed_flow_mfp_e78635_5qj94alaserjet_managed_mfp_e73140_3sj01acolor_laserjet_managed_mfp_e87750_3sj35alaserjet_managed_flow_mfp_e73030_3sj03acolor_laserjet_managed_mfp_e87750_3sj37acolor_laserjet_managed_flow_e87770_3sj36acolor_laserjet_enterprise_flow_mfp_6800_6qn38acolor_laserjet_managed_flow_e87770_3sj20acolor_laserjet_managed_flow_e87770_3sj37acolor_laserjet_managed_mfp_e78635_3sj11acolor_laserjet_managed_mfp_e87740_3sj19acolor_laserjet_managed_flow_e87740_3sj21alaserjet_managed_mfp_e826dn_5qk09acolor_laserjet_managed_mfp_e87750_5qk20acolor_laserjet_managed_mfp_e87750_5qk08acolor_laserjet_managed_mfp_e87750_3sj38acolor_laserjet_enterprise_mfp_5800_49k96avlaserjet_managed_flow_mfp_e73130_3sj00acolor_laserjet_enterprise_5700_49k98alaserjet_managed_mfp_e826dn_3sj30acolor_laserjet_enterprise_6701_58m42acolor_laserjet_managed_flow_e87740_5qk03acolor_laserjet_managed_mfp_e78630_3sj13acolor_laserjet_managed_mfp_e87740_5qk08alaserjet_managed_mfp_e73135_3sj00alaserjet_managed_flow_mfp_e73135_6bs58afuturesmart_5color_laserjet_managed_flow_e87760_3sj22alaserjet_managed_mfp_e73135_6bs57acolor_laserjet_managed_flow_mfp_e78630_3sj33acolor_laserjet_managed_mfp_e785dn_5qk15acolor_laserjet_managed_flow_e87770_5qk20acolor_laserjet_managed_flow_e87760_5qk20acolor_laserjet_managed_mfp_e87760_3sj19acolor_laserjet_managed_mfp_e78630_5qj94acolor_laserjet_enterprise_m455_3pz95alaserjet_managed_flow_mfp_e73130_3sj01acolor_laserjet_managed_mfp_e87770_3sj22alaserjet_managed_flow_mfp_e826z_5qk13acolor_laserjet_managed_mfp_e786_5qk18acolor_laserjet_managed_mfp_e87770_3sj35alaserjet_enterprise_m406_3pz15alaserjet_managed_mfp_e73130_3sj02acolor_laserjet_managed_flow_mfp_e78630_5qj94acolor_laserjet_enterprise_mfp_m480_3qa55acolor_laserjet_managed_mfp_e785dn_5qj83acolor_laserjet_enterprise_flow_mfp_6800_49k84acolor_laserjet_managed_flow_mfp_e786_3sj13acolor_laserjet_managed_flow_mfp_e78635_3sj11acolor_laserjet_managed_mfp_e87760_3sj38alaserjet_managed_flow_mfp_e826z_3sj08alaserjet_managed_e82660_3sj30acolor_laserjet_managed_flow_mfp_e78625_3sj33alaserjet_managed_mfp_e826dn_3sj07acolor_laserjet_managed_flow_mfp_e78635_3sj33acolor_laserjet_managed_mfp_e78630_3sj32acolor_laserjet_enterprise_mfp_x57945_6qp99alaserjet_managed_mfp_e73025_5qj87acolor_laserjet_managed_mfp_e786_3sj11alaserjet_managed_flow_mfp_e73140_3sj02acolor_laserjet_enterprise_mfp_5800_58r10alaserjet_managed_mfp_e73025_3sj04acolor_laserjet_managed_e45028_3qa35alaserjet_managed_flow_mfp_e73130_6bs58alaserjet_managed_e82660_5qk09alaserjet_managed_mfp_e73130_6bs59acolor_laserjet_enterprise_mfp_6800_49k84acolor_laserjet_managed_flow_mfp_e786_3sj33acolor_laserjet_managed_mfp_e78635_3sj12alaserjet_managed_flow_mfp_e73140_5qk02alaserjet_managed_mfp_e73130_3sj00acolor_laserjet_managed_mfp_e78635_3sj34alaserjet_managed_flow_mfp_e826z_3sj28alaserjet_managed_e82670_3sj30alaserjet_managed_e82650_3sj07alaserjet_managed_flow_mfp_e73030_5qj87acolor_laserjet_managed_mfp_e78528_5qj83acolor_laserjet_managed_flow_e87760_3sj36alaserjet_managed_flow_mfp_e73140_5qj98acolor_laserjet_managed_flow_e87760_5qk03acolor_laserjet_managed_flow_mfp_e78625_3sj34acolor_laserjet_managed_mfp_e87760_5qk08alaserjet_managed_flow_mfp_e73130_5qj98acolor_laserjet_managed_flow_mfp_e78630_3sj13acolor_laserjet_managed_flow_mfp_e78630_3sj11alaserjet_managed_mfp_e73140_6bs58acolor_laserjet_managed_flow_e87740_3sj20acolor_laserjet_managed_flow_e87750_3sj19acolor_laserjet_enterprise_x55745_49k99acolor_laserjet_managed_mfp_e87760_3sj36acolor_laserjet_managed_flow_e87750_3sj22acolor_laserjet_managed_mfp_e78630_3sj12acolor_laserjet_managed_flow_mfp_e78625_5qk18acolor_laserjet_managed_flow_mfp_e78635_3sj34alaserjet_managed_flow_mfp_e73140_3sj00acolor_laserjet_managed_flow_e87750_3sj38acolor_laserjet_managed_flow_e87740_5qk08acolor_laserjet_managed_mfp_e785dn_5qj81alaserjet_managed_e82650_3sj29acolor_laserjet_managed_mfp_e87770_3sj20acolor_laserjet_managed_flow_e87750_3sj35acolor_laserjet_managed_mfp_e87750_3sj19alaserjet_managed_e82650_5qk13acolor_laserjet_managed_mfp_e87770_5qk08alaserjet_managed_flow_mfp_e73135_6bs57acolor_laserjet_managed_mfp_e78635_5qj94acolor_laserjet_managed_flow_mfp_e786_3sj34acolor_laserjet_managed_mfp_e87740_5qk20alaserjet_managed_mfp_e73140_3sj02acolor_laserjet_managed_mfp_e87750_3sj20acolor_laserjet_managed_mfp_e47528_3qa75alaserjet_managed_e82670_5qk09acolor_laserjet_managed_mfp_e78630_3sj34alaserjet_managed_mfp_e73140_5qk02acolor_laserjet_managed_flow_mfp_e78625_3sj13alaserjet_managed_mfp_e826dn_3sj28alaserjet_managed_e82660_3sj07acolor_laserjet_managed_mfp_e87770_5qk03acolor_laserjet_managed_mfp_e87760_5qk03acolor_laserjet_managed_flow_e87770_5qk08alaserjet_managed_flow_mfp_e73140_3sj01alaserjet_managed_flow_mfp_e73030_3sj04acolor_laserjet_managed_flow_mfp_e78630_5qj90acolor_laserjet_enterprise_mfp_6800_6qn37acolor_laserjet_managed_flow_e87760_5qk08alaserjet_managed_mfp_e73135_6bs59alaserjet_managed_mfp_e73030_5qj87alaserjet_managed_mfp_e73130_6bs58acolor_laserjet_managed_mfp_e786_3sj34acolor_laserjet_enterprise_6700_58m42acolor_laserjet_managed_mfp_e87740_3sj20acolor_laserjet_managed_flow_e87750_5qk08acolor_laserjet_enterprise_mfp_5800_6qn31aHP Enterprise LaserJet and HP LaserJet Managed Printers
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-34580
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.48%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 10:25
Updated-17 Sep, 2024 | 01:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote user enumeration in mymbCONNECT24, mbCONNECT24 <= 2.9.0

In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.

Action-Not Available
Vendor-mbconnectlineMB connect line
Product-mymbconnect24mbconnect24mymbCONNECT24mbCONNECT24
CWE ID-CWE-204
Observable Response Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-11287
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.27% / 49.97%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 06:26
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Allowing RTT frames to be linked with non randomized MAC address by comparing the sequence numbers can lead to information disclosure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qpm5579qfs2580qcs610qcn5550qca8337qdm2307qfs2530qpa8802qln1030qpa8688pm6125qat3519qcn5124pm8150asc8180x\+sdx55ipq8078aqdm5670qtc800hqcs2290sa6155qca6335pm7150lqpa8821qcn5064qln1020qdm5671pmc1000hqat3518sa415mwcn3998wcn3950sm4125sd720gipq8076aqpa5460qca6428qdm5652ipq8071qpm8870qpm5679qbt2000pm855pqca6420wcd9360pm6150asdr735gwcn3999pm8150bqsm7250qcs6125ipq6010qcs405qca6430qat3522pmr735awcd9340sd765gsdr660qca6436wcn6851sa6155pqpa6560sdr865wcd9341qca6431qln5020wcd9371sd750gqca1062sd_8cxsa8150pqpm5657pm6350qdm5621qtc800ssd660qdm5650wcn3988qca6438wtr3925sdr052smb1390pm6150lqet4100qpm6585qtc410swcn3991smb1355ipq8072aqln4650qpa8801wgr7640qet5100ipq8078qca6564auipq8173qcn5164pm6150qca6574pm7250bqpa8842wcd9380qln4640qcs410smb1381qcn5024sdr735pm7250smb1395pm660lqpa8803smr526wtr5975wcn3980pmk8003qdm2301qsw8573qcs605wsa8815wcn6850sd7cwcn3910qpm6375qca9984ipq6028pmp8074pm8009qpa8675sd730sdx55mpm8008qsw8574pmi8998qcn5054pm855lrsw8577ipq8070qpm5621qpm6582sd670pm670pm8150lqdm5677pm8005sa6145pipq6018pm4250qdm2302pmm6155ausdxr1ar8031qpm5577wtr2965pm8150qca4024sdx55sa8155pcsra6640sd675qet4101qat3516pm670lqpm5658pm855bsmb2351qln1031qcn7606qcm2290wsa8830sdr051pm660qln5030qpm6325pm4125qbt1500qpa5581pmi632pm456csrb31024sd_636csra6620qcs4290qet6100pmm855ausdr660gqpa8686sd690_5gsmb1396pm7150aipq6000wcd9370ipq8072sdr425qca6426whs9410qcn7605qpm5541qat5516qdm5620qln1021aqipq8074asmb1380sd662qca1064pm3003asa8155qat5533qca6595ausmb1354qca6584auqdm2305qca6310qpm8820qpm2630ipq8174pm855sdxr2_5gpm8250qcn5052sdm630pmx55qcn9074sdr675qca6421sm6250qdm3301sa8195pqpm5677qat5515qat3514wcd9326wcd9335qet4200aqqca8081ipq8071awcd9385qpm5620pmm8155auqca6390wcd9375ar8035aqt1000csr8811qpa8673qdm2310pmm8195auqln4642pm8998qca6564apmx24qet6110qln5040qca8072qpm8895sdr845qpm5670wcn3990qcn9000sd_675qtm527sd865_5gqca6595qpm8830qat5522wsa8835pm8150cpmr735bsm6250pqpa4360pm855aqpa4361qca6574aqca9889smr525ipq8074pmr525qpm4650qtm525sa515mwtr6955sd855sd665ipq8076qca6175asd765pm640pqcn5152qat3555sd460qca6391smb1351pm660aqpa4340qcm4290sdx50mpm640asdr8150qln1036aqqtc801ssd_455pmd9655qca6574ausd710qcn5122qsw6310qcm6125wsa8810qdm2308qat3550pmx50qdm5679sd_8cqcn5022sdr8250sd768gqca6696sm4350pm8004pm640lpmk8002qca8075qpa2625sa6150psd845ipq8070asm7250psdm830pm6250qpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-0159
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-91.46% / 99.65%
||
7 Day CHG~0.00%
Published-13 Feb, 2023 | 14:32
Updated-02 Aug, 2024 | 05:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Extensive VC Addons for WPBakery page builder < 1.9.1 - Unauthenticated RCE

The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.

Action-Not Available
Vendor-wprealizeUnknown
Product-extensive_vc_addons_for_wpbakery_page_builderExtensive VC Addons for WPBakery page builder
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
  • Previous
  • 1
  • 2
  • Next
Details not found