icon

We found results for “

CVE-2024-0436

Good to know:

icon

Date: February 26, 2024

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute

Language: JS

Severity Score

Severity Score

Weakness Type (CWE)

Multiple Locks of a Critical Resource

CWE-764

Top Fix

icon

Upgrade Version

Upgrade to version 3c859ba3038121b67fb98e87dc52617fa27cbef0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us