![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-24869 – Information Disclosure vulnerability in SAP NetWeaver Application Server Java
https://notcve.org/view.php?id=CVE-2025-24869
11 Feb 2025 — SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, even though they may not need it. These XML files are not entirely SAP-internal as they are deployed with the server. In such a scenario, sensitive information could be exposed without compromising its integrity or availability. • https://me.sap.com/notes/3550027 • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-23193 – Information Disclosure vulnerability in SAP NetWeaver Application Server ABAP
https://notcve.org/view.php?id=CVE-2025-23193
11 Feb 2025 — This issue does not enable data modification and has no impact on server availability. • https://me.sap.com/notes/3561264 • CWE-204: Observable Response Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-12315 – Export All Posts, Products, Orders, Refunds & Users <= 2.9.3 - Information Disclosure Through Unprotected Directory
https://notcve.org/view.php?id=CVE-2024-12315
11 Feb 2025 — This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data. • https://plugins.trac.wordpress.org/browser/wp-ultimate-exporter/trunk/exportExtensions/ExportExtension.php#L1678 • CWE-922: Insecure Storage of Sensitive Information •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-0900 – PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2025-0900
11 Feb 2025 — The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-10649 – Unauthenticated File Upload in wandb/openui
https://notcve.org/view.php?id=CVE-2024-10649
10 Feb 2025 — This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. • https://huntr.com/bounties/1025793a-3c19-4148-a26e-80cd84d4822d • CWE-306: Missing Authentication for Critical Function •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-1099 – Information Disclosure Vulnerability in TP-Link Tapo C500 Wi-Fi Camera
https://notcve.org/view.php?id=CVE-2025-1099
10 Feb 2025 — An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device. ... An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device. • https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0017 • CWE-321: Use of Hard-coded Cryptographic Key •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-46437
https://notcve.org/view.php?id=CVE-2024-46437
10 Feb 2025 — A sensitive information disclosure vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an unauthenticated remote attacker to retrieve sensitive configuration information, including WiFi SSID, WiFi password, and base64-encoded administrator credentials, by sending a specially crafted HTTP POST request to the getQuickCfgWifiAndLogin function, bypassing authentication checks. • https://reddassolutions.com/blog/tenda_w18e_security_research • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-1115 – RT-Thread lwp_syscall.c sys_timer_settime information disclosure
https://notcve.org/view.php?id=CVE-2025-1115
08 Feb 2025 — The manipulation of the argument arg[0] leads to information disclosure. ... The manipulation of the argument arg[0] leads to information disclosure. ... Dank Manipulation des Arguments arg[0] mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/RT-Thread/rt-thread/issues/9877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-0304 – Liteos_a has an use after free vulnerability
https://notcve.org/view.php?id=CVE-2025-0304
07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2025-0303 – Liteos_a has a buffer overflow vulnerability
https://notcve.org/view.php?id=CVE-2025-0303
07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •