CWE-203: CWE-203
Yearly Trend
Top Affected Vendors
All CWE-203 CVEs (94)
This vulnerability in Bouncy Castle's Java TLS implementation allows timing-based side-channel attacks during RSA handshakes. Attackers can potentiall...
May 14, 2024This Windows cryptographic vulnerability allows attackers to disclose sensitive information from memory. It affects Windows systems with cryptographic...
Jan 14, 2025This Windows vulnerability allows attackers to obtain cryptographic information that could help them decrypt protected data or bypass security mechani...
Oct 8, 2024This CVE describes a side-channel information disclosure vulnerability in Android that allows local attackers to access screen-displayed data without ...
Sep 4, 2025This CVE describes an information leak vulnerability affecting certain Honor products. Successful exploitation could allow unauthorized access to sens...
Dec 26, 2024This macOS vulnerability allows applications to access sensitive user data they shouldn't have permission to view. It affects users running vulnerable...
Dec 12, 2024CVE-2020-10369 is a side-channel vulnerability in certain Cypress/Broadcom wireless chips that allows attackers to infer memory content via a 'Spectra...
Nov 10, 2024This CVE addresses a side-channel vulnerability in the Linux kernel's ICMP rate limiting implementation. The vulnerability could allow attackers to in...
Oct 21, 2024This CVE-2022-48730 is a Spectre v1 vulnerability in the Linux kernel's DMA-BUF heaps subsystem where user-supplied input could be used as an array in...
Jun 20, 2024CVE-2024-32926 is a side-channel information disclosure vulnerability in Android Pixel devices that could allow local attackers to access sensitive in...
Jun 13, 2024This timing-based user enumeration vulnerability in Directus allows attackers to determine whether specific usernames/emails exist in the system by me...
Feb 12, 2026This vulnerability in AnythingLLM allows attackers to determine whether specific usernames exist in the system by observing different error messages f...
Jan 3, 2026REDCap 14.3.13 has a username enumeration vulnerability where attackers can distinguish between valid and invalid usernames based on response time dif...
Jan 2, 2026CVE-2023-53943 is a username enumeration vulnerability in GLPI's password recovery mechanism that allows attackers to determine valid user email addre...
Dec 18, 2025CVE-2025-39665 is an information disclosure vulnerability in Nagvis' Checkmk MultisiteAuth plugin that allows unauthenticated attackers to enumerate v...
Dec 3, 2025This vulnerability in OpenAtlas v8.12.0 allows remote attackers to enumerate valid usernames through login error messages. Attackers can determine whi...
Nov 24, 2025This vulnerability allows attackers to enumerate valid usernames in Joomla's passkey authentication system by observing differences in authentication ...
Sep 30, 2025This vulnerability allows remote attackers to determine if user accounts exist in Liferay Portal/DXP by exploiting the create account page. Attackers ...
Aug 22, 2025This CVE describes a user enumeration vulnerability in eGroupWare's calendar/freebusy.php endpoint. Unauthenticated remote attackers can determine val...
Jul 11, 2025This vulnerability in Kanboard allows attackers to enumerate valid usernames and bypass IP-based brute-force protection mechanisms. By analyzing login...
Jun 25, 2025CVE-2021-47664 allows unauthenticated remote attackers to enumerate valid usernames due to improper authentication mechanisms. This affects systems wi...
Apr 24, 2025This vulnerability allows unauthenticated remote attackers to determine valid usernames on affected Siemens devices by analyzing login response time d...
Feb 11, 2025This vulnerability allows attackers to enumerate valid usernames in Dependency-Track by measuring response time differences during login attempts. Onl...
Dec 4, 2024This vulnerability in Cisco Integrated Management Controller (IMC) allows unauthenticated remote attackers to enumerate valid usernames by analyzing d...
Nov 18, 2024This vulnerability allows attackers to detect whether specific protocol handler applications are installed on a user's system by exploiting how Firefo...
Oct 1, 2024This vulnerability in Intel processors' RAPL (Running Average Power Limit) interface allows a privileged user to potentially disclose information thro...
Sep 16, 2024This vulnerability allows attackers to determine whether specific user accounts exist in ORDAT FOSS-Online by analyzing differences in server response...
Sep 12, 2024This vulnerability in Zitadel identity management system allows attackers to enumerate valid usernames when the 'Ignoring unknown usernames' security ...
Jul 31, 2024This vulnerability in Veilid's veilid-core allows attackers to misuse the ping function to degrade the effectiveness of safety and private routes. Thi...
Jul 22, 2024IBM i Service Tools Server (SST) versions 7.2 through 7.5 are vulnerable to user enumeration by remote attackers. This allows malicious actors to iden...
Jun 7, 2024CVE-2024-7881 is a speculative execution vulnerability in certain Arm CPUs where unprivileged code can trigger the data memory-dependent prefetcher to...
Jan 28, 2025GFI MailEssentials AI versions before 22.4 contain an authenticated file enumeration vulnerability. An authenticated attacker can check whether arbitr...
Feb 19, 2026This CVE describes an information disclosure vulnerability in Directus where unauthorized users can determine whether specific database collections ex...
Nov 13, 2025IBM Aspera versions 5.0.0 through 5.0.13.1 contain an information disclosure vulnerability where authenticated users can access sensitive system infor...
Oct 9, 2025This CVE describes an Observable Timing Discrepancy vulnerability in DivvyDrive Web that allows attackers to perform cross-domain search timing attack...
Sep 24, 2025This vulnerability in Liferay Portal and DXP allows any authenticated user to enumerate other users' names by viewing their calendars. This informatio...
Aug 19, 2025This vulnerability allows any authenticated user in Liferay Portal/DXP to modify email content sent through the calendar portlet, enabling phishing at...
Aug 19, 2025CVE-2025-23182 is an observable discrepancy vulnerability (CWE-203) that allows attackers to infer sensitive information through timing differences or...
May 22, 2025This vulnerability allows low-privileged attackers with network access and Create Session privilege to modify data in Oracle Database Core. It affects...
Oct 15, 2024This vulnerability allows attackers with physical access and specialized electromagnetic equipment to extract ECDSA secret keys from YubiKey 5 Series ...
Sep 3, 2024This CVE describes an information leak vulnerability affecting certain Honor products. Successful exploitation could allow unauthorized access to sens...
Dec 26, 2024This vulnerability in Entrinsik Informer v5.10.1 allows attackers to enumerate valid usernames by analyzing application responses during OTP and passw...
Dec 17, 2025This vulnerability in JetBrains TeamCity allows attackers to enumerate open ports on the server when testing Perforce connections. It affects organiza...
Dec 16, 2025WeKan versions before 8.19 have an information disclosure vulnerability where attachment metadata can be accessed by unauthorized users. This occurs b...
Feb 7, 2026About CWE-203 (CWE-203)
Our database tracks 94 CVEs classified as CWE-203, with 9 rated critical and 38 rated high severity. The average CVSS score for CWE-203 vulnerabilities is 6.5.
External reference: View CWE-203 on MITRE CWE →
Monitor CWE-203 Vulnerabilities
Get alerted when new CWE-203 CVEs affect your infrastructure.
Start Monitoring Free