Filtered by CWE-203
Total 626 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-1707 1 Hp 317 Color Laserjet Enterprise 5700 49k98a, Color Laserjet Enterprise 5700 6qn28a, Color Laserjet Enterprise 6700 49l00a and 314 more 2025-01-03 7.5 High
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
CVE-2023-34878 1 Ujcms 1 Ujcms 2025-01-02 7.5 High
An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensitive information via the dir parameter to /api/backend/core/web-file-html/download-zip.
CVE-2022-34704 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-01-02 4.7 Medium
Windows Defender Credential Guard Information Disclosure Vulnerability
CVE-2024-43546 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 5 more 2024-12-31 5.6 Medium
Windows Cryptographic Information Disclosure Vulnerability
CVE-2024-54454 2024-12-31 5.3 Medium
An issue was discovered in Kurmi Provisioning Suite before 7.9.0.35, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15. An Observable Response Discrepancy vulnerability in the sendPasswordReinitLink action of the unlogged.do page allows remote attackers to test whether a username is valid or not. This allows confirmation of valid usernames.
CVE-2024-13028 2024-12-30 3.7 Low
A vulnerability, which was classified as problematic, has been found in Antabot White-Jotter up to 0.2.2. This issue affects some unknown processing of the file /login. The manipulation of the argument username leads to observable response discrepancy. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
CVE-2024-47155 2024-12-27 5.5 Medium
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-47154 2024-12-27 5.5 Medium
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-47153 2024-12-27 6.2 Medium
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-8994 2024-12-26 6.2 Medium
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-8993 2024-12-26 6.2 Medium
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-8992 2024-12-26 4 Medium
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-47156 2024-12-26 3.3 Low
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-47150 2024-12-26 3.3 Low
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
CVE-2024-47149 2024-12-26 3.3 Low
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.
CVE-2024-39891 1 Twilio 2 Authy, Authy Authenticator 2024-12-20 5.3 Medium
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information about whether each phone number was registered with Authy. (Authy accounts were not compromised, however.)
CVE-2024-11297 2024-12-20 5.3 Medium
The Page Restriction WordPress (WP) – Protect WP Pages/Post plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
CVE-2024-54476 1 Apple 1 Macos 2024-12-19 5.5 Medium
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access user-sensitive data.
CVE-2024-50102 1 Linux 1 Linux Kernel 2024-12-19 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: x86: fix user address masking non-canonical speculation issue It turns out that AMD has a "Meltdown Lite(tm)" issue with non-canonical accesses in kernel space. And so using just the high bit to decide whether an access is in user space or kernel space ends up with the good old "leak speculative data" if you have the right gadget using the result: CVE-2020-12965 “Transient Execution of Non-Canonical Accesses“ Now, the kernel surrounds the access with a STAC/CLAC pair, and those instructions end up serializing execution on older Zen architectures, which closes the speculation window. But that was true only up until Zen 5, which renames the AC bit [1]. That improves performance of STAC/CLAC a lot, but also means that the speculation window is now open. Note that this affects not just the new address masking, but also the regular valid_user_address() check used by access_ok(), and the asm version of the sign bit check in the get_user() helpers. It does not affect put_user() or clear_user() variants, since there's no speculative result to be used in a gadget for those operations.
CVE-2024-47678 1 Linux 1 Linux Kernel 2024-12-19 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: icmp: change the order of rate limits ICMP messages are ratelimited : After the blamed commits, the two rate limiters are applied in this order: 1) host wide ratelimit (icmp_global_allow()) 2) Per destination ratelimit (inetpeer based) In order to avoid side-channels attacks, we need to apply the per destination check first. This patch makes the following change : 1) icmp_global_allow() checks if the host wide limit is reached. But credits are not yet consumed. This is deferred to 3) 2) The per destination limit is checked/updated. This might add a new node in inetpeer tree. 3) icmp_global_consume() consumes tokens if prior operations succeeded. This means that host wide ratelimit is still effective in keeping inetpeer tree small even under DDOS. As a bonus, I removed icmp_global.lock as the fast path can use a lock-free operation.