Observable timing discrepancy vulnerability in Apache Pulsar SASL Authentication Provider. Upgrade to versions 2.11.3, 3.0.2, or 3.1.1. Consider updating configured secret in 'saslJaasServerRoleTokenSignerSecretPath' file
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | Apache Pulsar SASL Authentication Provider observable timing discrepancy vulnerability | 7 Feb 202412:30 | – | osv |
![]() | CVE-2023-51437 | 7 Feb 202410:15 | – | osv |
![]() | CVE-2023-51437 | 7 Feb 202410:15 | – | cve |
![]() | Apache Pulsar SASL Authentication Provider observable timing discrepancy vulnerability | 7 Feb 202412:30 | – | github |
![]() | Buffer overflow | 7 Feb 202410:15 | – | prion |
![]() | Timing Attack | 8 Feb 202405:44 | – | veracode |
![]() | CVE-2023-51437 Apache Pulsar: Timing attack in SASL token signature verification | 7 Feb 202409:18 | – | cvelist |
![]() | Security Bulletin: Due to use of Apache Pulsar, IBM Tivoli Netcool/OMNIbus Transport Module Common Integration Library is vulnerable to security restrictions bypass | 29 Mar 202401:37 | – | ibm |
![]() | CVE-2023-51437 Apache Pulsar: Timing attack in SASL token signature verification | 7 Feb 202409:18 | – | vulnrichment |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo