Page 5 of 12662 results (0.022 seconds)

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

10 Feb 2025 — The TP-Link Tapo C500 V1 and V2 are a pan-and-tilt outdoor Wi-Fi security cameras designed for comprehensive surveillance. This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device. This vulnerability exists in Tapo C500 Wi-Fi... • https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0017 • CWE-321: Use of Hard-coded Cryptographic Key •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

10 Feb 2025 — A sensitive information disclosure vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an unauthenticated remote attacker to retrieve sensitive configuration information, including WiFi SSID, WiFi password, and base64-encoded administrator credentials, by sending a specially crafted HTTP POST request to the getQuickCfgWifiAndLogin function, bypassing authentication checks. • https://reddassolutions.com/blog/tenda_w18e_security_research • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.8EPSS: 0%CPEs: -EXPL: 0

08 Feb 2025 — The manipulation of the argument arg[0] leads to information disclosure. ... The manipulation of the argument arg[0] leads to information disclosure. ... Dank Manipulation des Arguments arg[0] mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/RT-Thread/rt-thread/issues/9877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

06 Feb 2025 — IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. • https://www.ibm.com/support/pages/node/7182693 • CWE-209: Generation of Error Message Containing Sensitive Information

CVSS: 7.7EPSS: 0%CPEs: -EXPL: 0

06 Feb 2025 — An information disclosure vulnerability exists in the Vault API functionality of ClearML Enterprise Server 3.22.5-1533. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 1

06 Feb 2025 — Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation. • https://github.com/ahrixia/CVE-2024-57430 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 1

06 Feb 2025 — Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files. • https://packetstorm.news/files/id/189021 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

05 Feb 2025 — IBM ApplinX 11.1 stores sensitive information in cleartext in memory that could be obtained by an authenticated user. • https://www.ibm.com/support/pages/node/7182522 • CWE-316: Cleartext Storage of Sensitive Information in Memory •