
CVE-2025-1099 – Information Disclosure Vulnerability in TP-Link Tapo C500 Wi-Fi Camera
https://notcve.org/view.php?id=CVE-2025-1099
10 Feb 2025 — The TP-Link Tapo C500 V1 and V2 are a pan-and-tilt outdoor Wi-Fi security cameras designed for comprehensive surveillance. This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device. This vulnerability exists in Tapo C500 Wi-Fi... • https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0017 • CWE-321: Use of Hard-coded Cryptographic Key •

CVE-2024-46437
https://notcve.org/view.php?id=CVE-2024-46437
10 Feb 2025 — A sensitive information disclosure vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an unauthenticated remote attacker to retrieve sensitive configuration information, including WiFi SSID, WiFi password, and base64-encoded administrator credentials, by sending a specially crafted HTTP POST request to the getQuickCfgWifiAndLogin function, bypassing authentication checks. • https://reddassolutions.com/blog/tenda_w18e_security_research • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2025-1115 – RT-Thread lwp_syscall.c sys_timer_settime information disclosure
https://notcve.org/view.php?id=CVE-2025-1115
08 Feb 2025 — The manipulation of the argument arg[0] leads to information disclosure. ... The manipulation of the argument arg[0] leads to information disclosure. ... Dank Manipulation des Arguments arg[0] mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/RT-Thread/rt-thread/issues/9877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVE-2025-0304 – Liteos_a has an use after free vulnerability
https://notcve.org/view.php?id=CVE-2025-0304
07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-416: Use After Free •

CVE-2025-0303 – Liteos_a has a buffer overflow vulnerability
https://notcve.org/view.php?id=CVE-2025-0303
07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-56467 – IBM EntireX information disclosure
https://notcve.org/view.php?id=CVE-2024-56467
06 Feb 2025 — IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. • https://www.ibm.com/support/pages/node/7182693 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2024-43779
https://notcve.org/view.php?id=CVE-2024-43779
06 Feb 2025 — An information disclosure vulnerability exists in the Vault API functionality of ClearML Enterprise Server 3.22.5-1533. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-57430
https://notcve.org/view.php?id=CVE-2024-57430
06 Feb 2025 — Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation. • https://github.com/ahrixia/CVE-2024-57430 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-57248 – Gleamtech FileVista 9.2.0.0 Directory Traversal
https://notcve.org/view.php?id=CVE-2024-57248
06 Feb 2025 — Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files. • https://packetstorm.news/files/id/189021 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2024-49800 – IBM ApplinX Information Disclosure
https://notcve.org/view.php?id=CVE-2024-49800
05 Feb 2025 — IBM ApplinX 11.1 stores sensitive information in cleartext in memory that could be obtained by an authenticated user. • https://www.ibm.com/support/pages/node/7182522 • CWE-316: Cleartext Storage of Sensitive Information in Memory •