Show filters
91 Total Results
Displaying 1-10 of 91
Sort by:
Attacker Value
Low
CVE-2020-14145
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
5
Attacker Value
Moderate
CVE-2020-5929
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellman key exchange and Single DH use option not enabled in the options list may be vulnerable to crafted SSL/TLS Handshakes that may result with a PMS (Pre-Master Secret) that starts in a 0 byte and may lead to a recovery of plaintext messages as BIG-IP TLS/SSL ADH/DHE sends different error messages acting as an oracle. Similar error messages when PMS starts with 0 byte coupled with very precise timing measurement observation may also expose this vulnerability.
3
Attacker Value
Unknown
CVE-2021-27583
Disclosure Date: February 23, 2021 (last updated February 22, 2025)
In Directus 8.x through 8.8.1, an attacker can discover whether a user is present in the database through the password reset feature. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2020-11287
Disclosure Date: February 22, 2021 (last updated February 22, 2025)
Allowing RTT frames to be linked with non randomized MAC address by comparing the sequence numbers can lead to information disclosure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
0
Attacker Value
Unknown
CVE-2020-9389
Disclosure Date: February 03, 2021 (last updated February 22, 2025)
A username enumeration issue was discovered in SquaredUp before version 4.6.0. The login functionality was implemented in a way that would enable a malicious user to guess valid username due to a different response time from invalid usernames.
0
Attacker Value
Unknown
CVE-2021-0321
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
In enforceDumpPermissionForPackage of ActivityManagerService.java, there is a possible way to determine if a package is installed due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-166667403.
0
Attacker Value
Unknown
CVE-2020-28208
Disclosure Date: January 08, 2021 (last updated February 22, 2025)
An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
0
Attacker Value
Unknown
CVE-2019-12953
Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
0
Attacker Value
Unknown
CVE-2020-35624
Disclosure Date: December 21, 2020 (last updated February 22, 2025)
An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded.
0
Attacker Value
Unknown
CVE-2020-35480
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don't exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing sensitive information about the hidden status to unprivileged viewers. This exists on various code paths.
0