CVE-2024-47404 – Liteos_a has a double free vulnerability
https://notcve.org/view.php?id=CVE-2024-47404
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md • CWE-415: Double Free •
CVE-2024-47797 – Liteos_a has an out-of-bounds Write vulnerability
https://notcve.org/view.php?id=CVE-2024-47797
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-11.md • CWE-787: Out-of-bounds Write •
CVE-2024-51362
https://notcve.org/view.php?id=CVE-2024-51362
The LSC Smart Connect Indoor IP Camera V7.6.32 is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. • https://shinxyy.github.io/blogs/CVE_2024_51362.html • CWE-306: Missing Authentication for Critical Function •
CVE-2024-32870 – iTop hub connector Information disclosure
https://notcve.org/view.php?id=CVE-2024-32870
Combodo iTop is a simple, web based IT Service Management tool. Server, OS, DBMS, PHP, and iTop info (name, version and parameters) can be read by anyone having access to iTop URI. This issue has been patched in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/Combodo/iTop/security/advisories/GHSA-rfjh-2f5x-qxmx • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-51556 – Sensitive Information Disclosure Vulnerability in Wave 2.0
https://notcve.org/view.php?id=CVE-2024-51556
An authenticated remote attacker could exploit this vulnerability by manipulating a parameter “user_id” through API request URLs leading to unauthorized access to sensitive information belonging to other users. ... An authenticated remote attacker could exploit this vulnerability by manipulating API input parameters through API request URL/payload leading to unauthorized access to sensitive information belonging to other users. • https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0332 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •