Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:OWASP Top Ten 2004 Category A7 - Improper Error Handling
Category ID:728
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
1460Vulnerabilities found

CVE-2025-44203
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 9.62%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 00:00
Updated-24 Jun, 2025 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-22854
Assigner-Ping Identity Corporation
ShareView Details
Assigner-Ping Identity Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 20.57%
||
7 Day CHG+0.01%
Published-15 Jun, 2025 | 15:00
Updated-16 Jun, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Possible thread exhaustion from processing http responses in PingFederate Google Adapter

Improper handling of non-200 http responses in the PingFederate Google Adapter leads to thread exhaustion under normal usage conditions.

Action-Not Available
Vendor-Ping Identity Corp.
Product-PingFederate
CWE ID-CWE-394
Unexpected Status Code or Return Value
CVE-2025-49128
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4||MEDIUM
EPSS-0.01% / 0.59%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 21:18
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Jackson-core Vulnerable to Memory Disclosure via Source Snippet in JsonLocation

Jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage.

Action-Not Available
Vendor-FasterXML, LLC.
Product-jackson-core
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2024-56342
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 16.86%
||
7 Day CHG+0.01%
Published-06 Jun, 2025 | 01:27
Updated-24 Aug, 2025 | 11:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Verify Identity Access Digital Credentials information disclosure

IBM Verify Identity Access Digital Credentials 24.06 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

Action-Not Available
Vendor-IBM Corporation
Product-verify_identity_access_digital_credentialsVerify Identity Access Digital Credentials
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2024-47057
Assigner-Mautic
ShareView Details
Assigner-Mautic
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.77%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 17:23
Updated-29 May, 2025 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User name enumeration possible due to response time difference on password reset form

SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack. MitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence.

Action-Not Available
Vendor-Mautic
Product-Mautic
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-25025
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 16.86%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 01:10
Updated-26 Aug, 2025 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Guardium information disclosure

IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

Action-Not Available
Vendor-IBM Corporation
Product-Security Guardium
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-46804
Assigner-SUSE
ShareView Details
Assigner-SUSE
CVSS Score-2||LOW
EPSS-0.03% / 7.64%
||
7 Day CHG~0.00%
Published-26 May, 2025 | 13:31
Updated-28 May, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Screen 5.0.0 and older versions allow file existence tests when installed setuid-root

A minor information leak when running Screen with setuid-root privileges allows unprivileged users to deduce information about a path that would otherwise not be available. Affected are older Screen versions, as well as version 5.0.0.

Action-Not Available
Vendor-
Product-
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-40653
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 22.59%
||
7 Day CHG+0.01%
Published-26 May, 2025 | 12:54
Updated-28 May, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User enumeration in M3M Printer Server Web

User enumeration vulnerability in M3M Printer Server Web. This issue occurs during user authentication, where a difference in error messages could allow an attacker to determine whether a username is valid or not, allowing a brute force attack on valid usernames.

Action-Not Available
Vendor-M3M
Product-M3M Printer Server Web
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-41441
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 17.65%
||
7 Day CHG~0.00%
Published-26 May, 2025 | 06:27
Updated-03 Jun, 2025 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mailform Pro CGI prior to 4.3.4 generates error messages containing sensitive information, which may allow a remote unauthenticated attacker to obtain coupon codes. This vulnerability only affects products that use the coupon feature.

Action-Not Available
Vendor-synckSYNCK GRAPHICA
Product-mailform_pro_cgiMailform Pro CGI
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-23182
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-4.3||MEDIUM
EPSS-0.07% / 20.27%
||
7 Day CHG+0.01%
Published-22 May, 2025 | 15:30
Updated-23 May, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UBtech – CWE-203: Observable Discrepancy

CWE-203: Observable Discrepancy

Action-Not Available
Vendor-UBtech
Product-Freepass
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-3939
Assigner-Honeywell International Inc.
ShareView Details
Assigner-Honeywell International Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 21.92%
||
7 Day CHG+0.01%
Published-22 May, 2025 | 12:33
Updated-04 Jun, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Observable Response Discrepancy

Observable Response Discrepancy vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.

Action-Not Available
Vendor-tridiumTridiumMicrosoft CorporationBlackBerry LimitedLinux Kernel Organization, Inc
Product-niagara_enterprise_securityqnxwindowslinux_kernelniagaraNiagara FrameworkNiagara Enterprise Security
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-46746
Assigner-Schweitzer Engineering Laboratories, Inc.
ShareView Details
Assigner-Schweitzer Engineering Laboratories, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.05% / 14.86%
||
7 Day CHG~0.00%
Published-12 May, 2025 | 16:11
Updated-12 May, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Error Message Contains Sensitive Information

An administrator could discover another account's credentials.

Action-Not Available
Vendor-Schweitzer Engineering Laboratories, Inc. (SEL)
Product-SEL Blueframe OS
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-47736
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2.9||LOW
EPSS-0.03% / 6.87%
||
7 Day CHG~0.00%
Published-09 May, 2025 | 00:00
Updated-12 May, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dialect/mod.rs in the libsql-sqlite3-parser crate through 0.13.0 before 14f422a for Rust can crash if the input is not valid UTF-8.

Action-Not Available
Vendor-gwenn
Product-libsql-sqlite3-parser
CWE ID-CWE-228
Improper Handling of Syntactically Invalid Structure
CVE-2024-49841
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.87%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-19 Dec, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Detection of Error Condition Without Action in Hypervisor

Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_8cxqamsrv1m_firmwaresa6155p_firmwarewcn3950_firmwareqam8775p_firmwarear8035_firmwareqamsrv1mqcs9100_firmwaresxr2330p_firmwaresnapdragon_x72_5g_modem-rf_firmwareqca8081_firmwaresnapdragon_x24_lte_modem_firmwareqca8337_firmwareqca6430snapdragon_670_mobilewcd9326qca6698aq_firmwareqcm5430sa8650p_firmwaresa8650psdx57m_firmwaresnapdragon_ar1_gen_1_firmwareqca6678aq_firmwareqca6431qmp1000_firmwaresa8770pqdu1010sa8775pfastconnect_7800snapdragon_xr2_5g_firmwarerobotics_rb3_firmwaresnapdragon_675_mobileqca6564a_firmwareqep8111_firmwareqcm6490snapdragon_x72_5g_modem-rfwcd9340snapdragon_x55_5g_modem-rf_firmwaresa6145pqca6436_firmwareqcs5430_firmwarewcd9380_firmwareqfw7124snapdragon_850_mobile_computeqam8255pwcn3990sxr1230psrv1lwcn7881_firmwaresa8770p_firmwaresa7255p_firmwaresd670_firmwareqca6426_firmwarewsa8815_firmwareqdx1010sa8540p_firmwareqsm8350qru1052_firmwareqamsrv1h_firmwarewcd9385_firmwarewcn7861_firmwaresdx55srv1h_firmwareqmp1000wsa8835wcd9395qca6678aqvision_intelligence_400_firmwaresd670snapdragon_765_5g_mobile_firmwaresa8255pqru1062_firmwaresnapdragon_855\+_mobilefastconnect_6900wcd9378wcd9380wsa8810_firmwaresm7250p_firmwaresm7250psc8180x-acaf_firmwareqru1032sxr2130_firmwaresd_675_firmwareqca6574_firmwarewsa8810qca6431_firmwareqca6574a_firmwareqcm8550_firmwarewcn3990_firmwareqca6391_firmwareqcn6224snapdragon_x32_5g_modem-rfwsa8840snapdragon_auto_5g_modem-rf_gen_2_firmwarefastconnect_6800sd865_5g_firmwaresc8180xp-acaf_firmwaresa8155p_firmwareqamsrv1hqcn6274_firmwareqca6696_firmwaresnapdragon_765g_5g_mobilesnapdragon_860_mobile_firmwareqfw7114_firmwaresnapdragon_8_gen_3_mobilesnapdragon_x24_lte_modemwsa8845h_firmwaresdx55_firmwaresnapdragon_x32_5g_modem-rf_firmwaresnapdragon_855_mobilewcd9370qdx1011wcn7880qca6595au_firmwareqca6595wcd9375qcs5430snapdragon_865_5g_mobilevision_intelligence_300sm8750_firmwaresa8775p_firmwaresm8750qca6595_firmwaresdx80mwcd9326_firmwaresc8380xpwsa8845snapdragon_x75_5g_modem-rf_firmwareqca6421ssg2125p_firmwareqcs8550qru1032_firmwaresm8735_firmwareqcn9274_firmwareqcm8550qcs6490_firmwarewsa8832_firmwaresc8180x-acafqca9377qca6797aq_firmwareqdu1210sa9000p_firmwaresa8295psrv1m_firmwareqep8111sd855_firmwaresc8280xp-abbb_firmwaresnapdragon_860_mobilesnapdragon_ar1_gen_1sa8155qdu1210_firmwareqca6688aqsnapdragon_768g_5g_mobile_firmwareqcm6490_firmwareqam8650psrv1mfastconnect_6200snapdragon_x35_5g_modem-rfsa6145p_firmwaresa8150psdx57msnapdragon_8_gen_1_mobileqam8295p_firmwareqdu1000wcd9340_firmwarewsa8845hsnapdragon_x65_5g_modem-rf_system_firmwaresd855sc8180x-ad_firmwaresnapdragon_ar2_gen_1sa8540psa8155_firmwaresrv1hfastconnect_6800_firmwareqca6595ausnapdragon_x75_5g_modem-rfvideo_collaboration_vc3_platformvision_intelligence_300_firmwaresnapdragon_870_5g_mobilesnapdragon_auto_5g_modem-rf_gen_2sxr2130qca6696ssg2125pqca6310_firmwaresnapdragon_855\+_mobile_firmwarewsa8830qdu1110sxr2330pqca6430_firmwaresnapdragon_x65_5g_modem-rf_systemqca6335sa8155pqdu1010_firmwaresm8735wcn3980_firmwarewsa8815sa9000psnapdragon_765_5g_mobileqam8295psd_675wcd9378_firmwaresdx80m_firmwaresc8180xp-adqca6698aqqcs8300sa8150p_firmwaresd865_5gqca6335_firmwaresnapdragon_x62_5g_modem-rf_system_firmwareqcm5430_firmwaresnapdragon_865\+_5g_mobilewcd9390_firmwareqca6174aqam8255p_firmwaresnapdragon_x50_5g_modem-rfsnapdragon_865_5g_mobile_firmwaresd_8cx_firmwareqcc710qcs8300_firmwarewcd9370_firmwareaqt1000_firmwaresa7775psnapdragon_x50_5g_modem-rf_firmwareqca6584auqca6584au_firmwarevideo_collaboration_vc3_platform_firmwarewcn7860_firmwaresnapdragon_888\+_5g_mobilesa7775p_firmwareqca6564asnapdragon_8_gen_3_mobile_firmwareqca6574au_firmwarefastconnect_6200_firmwareqfw7124_firmwaresnapdragon_670_mobile_firmwaresnapdragon_678_mobile_firmwaresnapdragon_870_5g_mobile_firmwaresc8180xp-aaabsm8750psa6155qcn9274snapdragon_888_5g_mobilewcd9395_firmwareqcs9100snapdragon_x62_5g_modem-rf_systemqca6420sc8180xp-aaab_firmwaresnapdragon_845_mobileqam8620psd_8_gen1_5gsnapdragon_888_5g_mobile_firmwarerobotics_rb3qca6574ssg2115psnapdragon_ar2_gen_1_firmwaresrv1l_firmwaresnapdragon_850_mobile_compute_firmwareqam8775pqca6310wsa8835_firmwaresc8280xp-abbbqru1062qca6391qfw7114qca6574asa8255p_firmwarewcn7860qcs8550_firmwarear8035sa8620pwcn7881wcn7861sc8180x-adsa8620p_firmwaresd_8_gen1_5g_firmwarefastconnect_6900_firmwaresnapdragon_xr2_5gsnapdragon_765g_5g_mobile_firmwarewcn3980qdx1010_firmwareqca6420_firmwareqca8337sa6155_firmwaresnapdragon_8_gen_1_mobile_firmwareqdx1011_firmwarewcd9341_firmwareqsm8350_firmwaresd675qcs6490qca6426sc8380xp_firmwareqcc710_firmwareqca9377_firmwareaqt1000sa7255psnapdragon_888\+_5g_mobile_firmwareqdu1110_firmwaresa6155pwsa8832qcn6274snapdragon_845_mobile_firmwareqdu1000_firmwarewcn7880_firmwareqru1052wcd9341sm8750p_firmwareqca6421_firmwarewsa8840_firmwaresa8295p_firmwaresnapdragon_678_mobilesnapdragon_855_mobile_firmwareqcn6224_firmwaresc8180xp-ad_firmwaresc8180x-aaabsnapdragon_865\+_5g_mobile_firmwaresxr1230p_firmwareqca6564au_firmwareqca6797aqsnapdragon_675_mobile_firmwareqca6688aq_firmwaresnapdragon_768g_5g_mobilesnapdragon_x35_5g_modem-rf_firmwarewsa8830_firmwaresc8180x-aaab_firmwaresd675_firmwareqca6564auqam8650p_firmwaressg2115p_firmwarewcd9390wcd9375_firmwarewcn3950qca8081wsa8845_firmwareqca6574auwcd9385wcn7750fastconnect_6700_firmwareqca6436sc8180xp-acafwcn7750_firmwaresnapdragon_x55_5g_modem-rfqam8620p_firmwareqca6174a_firmwarevision_intelligence_400fastconnect_6700fastconnect_7800_firmwareSnapdragon
CWE ID-CWE-390
Detection of Error Condition Without Action
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2025-46720
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-3.1||LOW
EPSS-0.07% / 22.25%
||
7 Day CHG+0.01%
Published-05 May, 2025 | 18:53
Updated-19 Sep, 2025 | 19:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keystone has an unintended `isFilterable` bypass that can be used as an oracle to match hidden fields

Keystone is a content management system for Node.js. Prior to version 6.5.0, `{field}.isFilterable` access control can be bypassed in `update` and `delete` mutations by adding additional unique filters. These filters can be used as an oracle to probe the existence or value of otherwise unreadable fields. Specifically, when a mutation includes a `where` clause with multiple unique filters (e.g. `id` and `email`), Keystone will attempt to match records even if filtering by the latter fields would normally be rejected by `field.isFilterable` or `list.defaultIsFilterable`. This can allow malicious actors to infer the presence of a particular field value when a filter is successful in returning a result. This affects any project relying on the default or dynamic `isFilterable` behavior (at the list or field level) to prevent external users from using the filtering of fields as a discovery mechanism. While this access control is respected during `findMany` operations, it was not completely enforced during `update` and `delete` mutations when accepting more than one unique `where` values in filters. This has no impact on projects using `isFilterable: false` or `defaultIsFilterable: false` for sensitive fields, or for those who have otherwise omitted filtering by these fields from their GraphQL schema. This issue has been patched in `@keystone-6/core` version 6.5.0. To mitigate this issue in older versions where patching is not a viable pathway, set `isFilterable: false` statically for relevant fields to prevent filtering by them earlier in the access control pipeline (that is, don't use functions); set `{field}.graphql.omit.read: true` for relevant fields, which implicitly removes filtering by these fields from the GraphQL schema; and/or deny `update` and `delete` operations for the relevant lists completely.

Action-Not Available
Vendor-keystonejskeystonejs
Product-keystonekeystone
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-53070
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.44%
||
7 Day CHG~0.00%
Published-02 May, 2025 | 15:55
Updated-12 Nov, 2025 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent

In the Linux kernel, the following vulnerability has been resolved: ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent Commit 0c80f9e165f8 ("ACPI: PPTT: Leave the table mapped for the runtime usage") enabled to map PPTT once on the first invocation of acpi_get_pptt() and never unmapped the same allowing it to be used at runtime with out the hassle of mapping and unmapping the table. This was needed to fetch LLC information from the PPTT in the cpuhotplug path which is executed in the atomic context as the acpi_get_table() might sleep waiting for a mutex. However it missed to handle the case when there is no PPTT on the system which results in acpi_get_pptt() being called from all the secondary CPUs attempting to fetch the LLC information in the atomic context without knowing the absence of PPTT resulting in the splat like below: | BUG: sleeping function called from invalid context at kernel/locking/semaphore.c:164 | in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1 | preempt_count: 1, expected: 0 | RCU nest depth: 0, expected: 0 | no locks held by swapper/1/0. | irq event stamp: 0 | hardirqs last enabled at (0): 0x0 | hardirqs last disabled at (0): copy_process+0x61c/0x1b40 | softirqs last enabled at (0): copy_process+0x61c/0x1b40 | softirqs last disabled at (0): 0x0 | CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.3.0-rc1 #1 | Call trace: | dump_backtrace+0xac/0x138 | show_stack+0x30/0x48 | dump_stack_lvl+0x60/0xb0 | dump_stack+0x18/0x28 | __might_resched+0x160/0x270 | __might_sleep+0x58/0xb0 | down_timeout+0x34/0x98 | acpi_os_wait_semaphore+0x7c/0xc0 | acpi_ut_acquire_mutex+0x58/0x108 | acpi_get_table+0x40/0xe8 | acpi_get_pptt+0x48/0xa0 | acpi_get_cache_info+0x38/0x140 | init_cache_level+0xf4/0x118 | detect_cache_attributes+0x2e4/0x640 | update_siblings_masks+0x3c/0x330 | store_cpu_topology+0x88/0xf0 | secondary_start_kernel+0xd0/0x168 | __secondary_switched+0xb8/0xc0 Update acpi_get_pptt() to consider the fact that PPTT is once checked and is not available on the system and return NULL avoiding any attempts to fetch PPTT and thereby avoiding any possible sleep waiting for a mutex in the atomic context.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-252
Unchecked Return Value
CVE-2025-4166
Assigner-HashiCorp Inc.
ShareView Details
Assigner-HashiCorp Inc.
CVSS Score-4.5||MEDIUM
EPSS-0.04% / 12.28%
||
7 Day CHG~0.00%
Published-02 May, 2025 | 14:57
Updated-31 Dec, 2025 | 00:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vault May Include Sensitive Data in Error Logs When Using the KV v2 Plugin

Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.

Action-Not Available
Vendor-openbaoHashiCorp, Inc.
Product-openbaovaultVaultVault Enterprise
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-0049
Assigner-Fortra, LLC
ShareView Details
Assigner-Fortra, LLC
CVSS Score-3.5||LOW
EPSS-0.06% / 18.17%
||
7 Day CHG~0.00%
Published-28 Apr, 2025 | 20:55
Updated-10 May, 2025 | 00:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Disclosure of sensitive information in an error message in GoAnywhere prior to version 7.8.0

When a Web User without Create permission on subfolders attempts to upload a file to a non-existent directory, the error message includes the absolute server path which may allow Fuzzing for application mapping. This issue affects GoAnywhere: before 7.8.0.

Action-Not Available
Vendor-Fortra LLC
Product-goanywhere_managed_file_transferGoAnywhere
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-46575
Assigner-ZTE Corporation
ShareView Details
Assigner-ZTE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.08% / 24.57%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 01:12
Updated-12 May, 2025 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZTE GoldenDB Database product has an information disclosure vulnerability

There is an information disclosure vulnerability in the GoldenDB database product. Attackers can exploit error messages to obtain the system's sensitive information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcloud_goldendbGoldenDB
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-46672
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.5||LOW
EPSS-0.07% / 21.18%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 00:00
Updated-29 May, 2025 | 15:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NASA CryptoLib before 1.3.2 does not check the OTAR crypto function returned status, potentially leading to spacecraft hijacking.

Action-Not Available
Vendor-nasaNASA
Product-cryptolibCryptoLib
CWE ID-CWE-252
Unchecked Return Value
CVE-2021-47664
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.97%
||
7 Day CHG+0.05%
Published-24 Apr, 2025 | 09:25
Updated-29 Apr, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Enumeration of valid user names

Due to improper authentication mechanism an unauthenticated remote attacker can enumerate valid usernames.

Action-Not Available
Vendor-Franka Robotics
Product-Franka Emika Robot
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-25045
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.17% / 38.55%
||
7 Day CHG+0.11%
Published-23 Apr, 2025 | 22:23
Updated-28 Aug, 2025 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server information disclosure

IBM InfoSphere Information 11.7 Server authenticated user to obtain sensitive information when a detailed technical error message is returned in a request. This information could be used in further attacks against the system.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsinfosphere_information_serverlinux_kernelaixInfoSphere Information Server
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-32789
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-3.1||LOW
EPSS-0.18% / 39.21%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 21:45
Updated-18 Jun, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EspoCRM Allows Potential Disclosure of Sensitive Information in the User Sorting Function

EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7.

Action-Not Available
Vendor-espocrmespocrm
Product-espocrmespocrm
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-20150
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.13%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 16:07
Updated-07 Aug, 2025 | 00:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus Dashboard Username Enumeration Vulnerability

A vulnerability in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to enumerate LDAP user accounts. This vulnerability is due to the improper handling of LDAP authentication requests. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow an attacker to determine which usernames are valid LDAP user accounts.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_dashboardCisco Nexus Dashboard
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-22026
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.22%
||
7 Day CHG+0.02%
Published-16 Apr, 2025 | 14:11
Updated-19 Feb, 2026 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
nfsd: don't ignore the return code of svc_proc_register()

In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently, nfsd_proc_stat_init() ignores the return value of svc_proc_register(). If the procfile creation fails, then the kernel will WARN when it tries to remove the entry later. Fix nfsd_proc_stat_init() to return the same type of pointer as svc_proc_register(), and fix up nfsd_net_init() to check that and fail the nfsd_net construction if it occurs. svc_proc_register() can fail if the dentry can't be allocated, or if an identical dentry already exists. The second case is pretty unlikely in the nfsd_net construction codepath, so if this happens, return -ENOMEM.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-252
Unchecked Return Value
CVE-2024-11084
Assigner-Perforce
ShareView Details
Assigner-Perforce
CVSS Score-6.3||MEDIUM
EPSS-0.19% / 40.32%
||
7 Day CHG~0.00%
Published-15 Apr, 2025 | 15:34
Updated-15 Apr, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential Username Enumeration in Helix ALM

Helix ALM prior to 2025.1 returns distinct error responses during authentication, allowing an attacker to determine whether a username exists.

Action-Not Available
Vendor-Perforce Software, Inc.
Product-Helix ALM
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-11129
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 16.32%
||
7 Day CHG~0.00%
Published-10 Apr, 2025 | 13:02
Updated-07 Aug, 2025 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Generation of Error Message Containing Sensitive Information in GitLab

An issue has been discovered in GitLab EE affecting all versions from 17.1 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. This allows attackers to perform targeted searches with sensitive keywords to get the count of issues containing the searched term."

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-0361
Assigner-Axis Communications AB
ShareView Details
Assigner-Axis Communications AB
CVSS Score-4.3||MEDIUM
EPSS-0.20% / 42.25%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 05:38
Updated-14 Jan, 2026 | 14:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API.

Action-Not Available
Vendor-axisAxis Communications AB
Product-axis_osaxis_os_2024AXIS OS
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-32414
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.18% / 39.35%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 00:00
Updated-03 Nov, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.

Action-Not Available
Vendor-libxml2 (XMLSoft)
Product-libxml2libxml2
CWE ID-CWE-252
Unchecked Return Value
CWE ID-CWE-393
Return of Wrong Status Code
CVE-2025-32238
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-4.3||MEDIUM
EPSS-0.20% / 42.10%
||
7 Day CHG~0.00%
Published-04 Apr, 2025 | 15:59
Updated-20 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Online Booking & Scheduling Calendar for WordPress by vcita plugin <= 4.5.2 - Sensitive Data Exposure vulnerability

Generation of Error Message Containing Sensitive Information vulnerability in vcita Online Booking & Scheduling Calendar for WordPress by vcita allows Retrieve Embedded Sensitive Data. This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5.2.

Action-Not Available
Vendor-vcitavcita
Product-online_booking_\&_scheduling_calendarOnline Booking & Scheduling Calendar for WordPress by vcita
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-0279
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-4.3||MEDIUM
EPSS-0.22% / 44.35%
||
7 Day CHG~0.00%
Published-03 Apr, 2025 | 21:48
Updated-10 Oct, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Traveler is affected by generation of error messages containing sensitive information

HCL Traveler generates some error messages that provide detailed information about errors and failures, such as internal paths, file names, sensitive tokens, credentials, error codes, or stack traces. Attackers could exploit this information to gain insights into the system's architecture and potentially launch targeted attacks.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-travelerHCL Traveler
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2023-47639
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.28% / 50.98%
||
7 Day CHG~0.00%
Published-03 Apr, 2025 | 16:46
Updated-07 Apr, 2025 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
API Platform Core can leak exceptions message that may contain sensitive information

API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. From 3.2.0 until 3.2.4, exception messages, that are not HTTP exceptions, are visible in the JSON error response. This vulnerability is fixed in 3.2.5.

Action-Not Available
Vendor-api-platform
Product-core
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-31124
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.60% / 68.86%
||
7 Day CHG~0.00%
Published-31 Mar, 2025 | 19:38
Updated-26 Aug, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Zitadel allows User Enumeration by loginname attribute normalization

Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report "Username or Password invalid". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9.

Action-Not Available
Vendor-zitadelzitadel
Product-zitadelzitadel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2024-55895
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-2.7||LOW
EPSS-0.17% / 38.58%
||
7 Day CHG~0.00%
Published-29 Mar, 2025 | 12:22
Updated-01 Sep, 2025 | 00:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server information disclosure

IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

Action-Not Available
Vendor-Microsoft CorporationIBM CorporationLinux Kernel Organization, Inc
Product-windowsinfosphere_information_serverlinux_kernelaixInfoSphere Information Server
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2024-51477
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 41.24%
||
7 Day CHG~0.00%
Published-28 Mar, 2025 | 23:51
Updated-01 Sep, 2025 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server information disclosure

IBM InfoSphere Information Server 11.7 could allow an authenticated to obtain sensitive username information due to an observable response discrepancy.

Action-Not Available
Vendor-Microsoft CorporationIBM CorporationLinux Kernel Organization, Inc
Product-aixinfosphere_information_serverwindowslinux_kernelInfoSphere Information Server
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-13939
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
ShareView Details
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.51%
||
7 Day CHG~0.00%
Published-28 Mar, 2025 | 02:05
Updated-11 Apr, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string

String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)." This is similar to CVE-2020-36829

Action-Not Available
Vendor-fractalFRACTAL
Product-string\String::Compare::ConstantTime
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2025-31141
Assigner-JetBrains s.r.o.
ShareView Details
Assigner-JetBrains s.r.o.
CVSS Score-2.7||LOW
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-27 Mar, 2025 | 11:24
Updated-27 Mar, 2025 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2025.03 exception could lead to credential leakage on Cloud Profiles page

Action-Not Available
Vendor-JetBrains s.r.o.
Product-TeamCity
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-30344
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.63%
||
7 Day CHG~0.00%
Published-21 Mar, 2025 | 00:00
Updated-27 Mar, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in OpenSlides before 4.2.5. During login at the /system/auth/login/ endpoint, the system's response times differ depending on whether a user exists in the system. The timing discrepancy stems from the omitted hashing of the password (e.g., more than 100 milliseconds).

Action-Not Available
Vendor-openslidesIntevation
Product-openslidesOpenSlides
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2025-1468
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.91%
||
7 Day CHG~0.00%
Published-18 Mar, 2025 | 11:03
Updated-18 Mar, 2025 | 13:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CODESYS Control V3 - OPC UA Server Authentication bypass

An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.

Action-Not Available
Vendor-CODESYS GmbH
Product-CODESYS Runtime Toolkit
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-29780
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.34% / 56.34%
||
7 Day CHG~0.00%
Published-14 Mar, 2025 | 17:26
Updated-19 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Post-Quantum Secure Feldman's Verifiable Secret Sharing has Timing Side-Channels in Matrix Operations

Post-Quantum Secure Feldman's Verifiable Secret Sharing provides a Python implementation of Feldman's Verifiable Secret Sharing (VSS) scheme. In versions 0.8.0b2 and prior, the `feldman_vss` library contains timing side-channel vulnerabilities in its matrix operations, specifically within the `_find_secure_pivot` function and potentially other parts of `_secure_matrix_solve`. These vulnerabilities are due to Python's execution model, which does not guarantee constant-time execution. An attacker with the ability to measure the execution time of these functions (e.g., through repeated calls with carefully crafted inputs) could potentially recover secret information used in the Verifiable Secret Sharing (VSS) scheme. The `_find_secure_pivot` function, used during Gaussian elimination in `_secure_matrix_solve`, attempts to find a non-zero pivot element. However, the conditional statement `if matrix[row][col] != 0 and row_random < min_value:` has execution time that depends on the value of `matrix[row][col]`. This timing difference can be exploited by an attacker. The `constant_time_compare` function in this file also does not provide a constant-time guarantee. The Python implementation of matrix operations in the _find_secure_pivot and _secure_matrix_solve functions cannot guarantee constant-time execution, potentially leaking information about secret polynomial coefficients. An attacker with the ability to make precise timing measurements of these operations could potentially extract secret information through statistical analysis of execution times, though practical exploitation would require significant expertise and controlled execution environments. Successful exploitation of these timing side-channels could allow an attacker to recover secret keys or other sensitive information protected by the VSS scheme. This could lead to a complete compromise of the shared secret. As of time of publication, no patched versions of Post-Quantum Secure Feldman's Verifiable Secret Sharing exist, but other mitigations are available. As acknowledged in the library's documentation, these vulnerabilities cannot be adequately addressed in pure Python. In the short term, consider using this library only in environments where timing measurements by attackers are infeasible. In the medium term, implement your own wrappers around critical operations using constant-time libraries in languages like Rust, Go, or C. In the long term, wait for the planned Rust implementation mentioned in the library documentation that will properly address these issues.

Action-Not Available
Vendor-DavidOsipov
Product-PostQuantum-Feldman-VSS
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-385
Covert Timing Channel
CVE-2024-55594
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.91%
||
7 Day CHG~0.00%
Published-14 Mar, 2025 | 16:25
Updated-14 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper handling of syntactically invalid structure in Fortinet FortiWeb at least vesrions 7.4.0 through 7.4.6 and 7.2.0 through 7.2.10 and 7.0.0 through 7.0.10 allows attacker to execute unauthorized code or commands via HTTP/S crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-FortiWeb
CWE ID-CWE-228
Improper Handling of Syntactically Invalid Structure
CVE-2024-12380
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 5.75%
||
7 Day CHG~0.00%
Published-13 Mar, 2025 | 05:56
Updated-06 Aug, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Generation of Error Message Containing Sensitive Information in GitLab

An issue was discovered in GitLab EE/CE affecting all versions starting from 11.5 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2. Certain user inputs in repository mirroring settings could potentially expose sensitive authentication information.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-2239
Assigner-Hillstone Networks Inc.
ShareView Details
Assigner-Hillstone Networks Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.70%
||
7 Day CHG~0.00%
Published-12 Mar, 2025 | 09:53
Updated-12 Mar, 2025 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Absolute Path Disclosure Vulnerability in Hillstone Next Generation FireWall

Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23.

Action-Not Available
Vendor-Hillstone Networks
Product-Hillstone Next Generation FireWall
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2023-42784
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.91%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 14:54
Updated-22 Jul, 2025 | 21:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper handling of syntactically invalid structure in Fortinet FortiWeb at least verions 7.4.0 through 7.4.6 and 7.2.0 through 7.2.10 and 7.0.0 through 7.0.10 allows attacker to execute unauthorized code or commands via HTTP/S crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortiWeb
CWE ID-CWE-228
Improper Handling of Syntactically Invalid Structure
CVE-2024-41760
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.07% / 21.74%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 00:49
Updated-01 Sep, 2025 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Common Cryptographic Architecture information disclosure

IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.

Action-Not Available
Vendor-IBM Corporation
Product-4769 Developers ToolkitCommon Cryptographic Architecture
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-23185
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.1||MEDIUM
EPSS-0.12% / 30.62%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 00:31
Updated-11 Mar, 2025 | 02:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure in SAP Business Objects Business Intelligence Platform

Due to improper error handling in SAP Business Objects Business Intelligence Platform, technical details of the application are revealed in exceptions thrown to the user and in stack traces. Only an attacker with administrator level privileges has access to this disclosed information, and they could use it to craft further exploits. There is no impact on the integrity and availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP Business Objects Business Intelligence Platform
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2024-12650
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.4||MEDIUM
EPSS-0.17% / 38.75%
||
7 Day CHG~0.00%
Published-05 Mar, 2025 | 11:46
Updated-05 Mar, 2025 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wago: Vulnerability in libwagosnmp

An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications.

Action-Not Available
Vendor-WAGO
Product-PFC200 G1 750-820x-xxx-xxxTP600 0762-620x/8000-000xTP600 0762-630x/8000-000xTP600 0762-520x/8000-000xPFC200 G2 750-821x-xxx-xxxTP600 0762-420x/8000-000xEdge Controller 0752-8303/8000-0002PFC100 G1 0750-810x/xxxx-xxxxPFC100 G2 0750-811x-xxxx-xxxxTP600 0762-530x/8000-000xTP600 0762-430x/8000-000xCC100 0751-9x01
CWE ID-CWE-252
Unchecked Return Value
CVE-2025-20002
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.9||MEDIUM
EPSS-0.14% / 34.40%
||
7 Day CHG~0.00%
Published-05 Mar, 2025 | 00:08
Updated-05 Mar, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GMOD Apollo Generation of Error Message Containing Sensitive Information

After attempting to upload a file that does not meet prerequisites, GMOD Apollo will respond with local path information disclosure

Action-Not Available
Vendor-GMOD
Product-Apollo
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-27667
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.51%
||
7 Day CHG~0.00%
Published-05 Mar, 2025 | 00:00
Updated-01 Apr, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011.

Action-Not Available
Vendor-printerlogicn/a
Product-vasion_printvirtual_appliancen/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-25724
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4||MEDIUM
EPSS-0.01% / 2.08%
||
7 Day CHG~0.00%
Published-02 Mar, 2025 | 00:00
Updated-17 Jul, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.

Action-Not Available
Vendor-libarchive
Product-libarchivelibarchive
CWE ID-CWE-252
Unchecked Return Value
CVE-2024-56810
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 5.58%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 14:48
Updated-07 Jul, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM EntireX information disclosure

IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system.

Action-Not Available
Vendor-Linux Kernel Organization, IncMicrosoft CorporationIBM Corporation
Product-entirexwindowslinux_kernelEntireX
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 29
  • 30
  • Next