
CVE-2025-1115 – RT-Thread lwp_syscall.c sys_timer_settime information disclosure
https://notcve.org/view.php?id=CVE-2025-1115
08 Feb 2025 — The manipulation of the argument arg[0] leads to information disclosure. ... The manipulation of the argument arg[0] leads to information disclosure. ... Dank Manipulation des Arguments arg[0] mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/RT-Thread/rt-thread/issues/9877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVE-2025-0304 – Liteos_a has an use after free vulnerability
https://notcve.org/view.php?id=CVE-2025-0304
07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-416: Use After Free •

CVE-2025-0303 – Liteos_a has a buffer overflow vulnerability
https://notcve.org/view.php?id=CVE-2025-0303
07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-56467 – IBM EntireX information disclosure
https://notcve.org/view.php?id=CVE-2024-56467
06 Feb 2025 — IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. • https://www.ibm.com/support/pages/node/7182693 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2024-43779
https://notcve.org/view.php?id=CVE-2024-43779
06 Feb 2025 — An information disclosure vulnerability exists in the Vault API functionality of ClearML Enterprise Server 3.22.5-1533. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-57248 – Gleamtech FileVista 9.2.0.0 Directory Traversal
https://notcve.org/view.php?id=CVE-2024-57248
06 Feb 2025 — Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files. • https://packetstorm.news/files/id/189021 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2024-57430
https://notcve.org/view.php?id=CVE-2024-57430
06 Feb 2025 — Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation. • https://github.com/ahrixia/CVE-2024-57430 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-49800 – IBM ApplinX Information Disclosure
https://notcve.org/view.php?id=CVE-2024-49800
05 Feb 2025 — IBM ApplinX 11.1 stores sensitive information in cleartext in memory that could be obtained by an authenticated user. • https://www.ibm.com/support/pages/node/7182522 • CWE-316: Cleartext Storage of Sensitive Information in Memory •

CVE-2024-49798 – IBM ApplinX Information Disclosure
https://notcve.org/view.php?id=CVE-2024-49798
05 Feb 2025 — IBM ApplinX 11.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. • https://www.ibm.com/support/pages/node/7182522 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2024-49797 – IBM ApplinX Information Disclosure
https://notcve.org/view.php?id=CVE-2024-49797
05 Feb 2025 — IBM ApplinX 11.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. • https://www.ibm.com/support/pages/node/7182522 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •