CVE-2024-7842 – SourceCodester Online Graduate Tracer System export_it.php information disclosure
https://notcve.org/view.php?id=CVE-2024-7842
The manipulation leads to information disclosure. ... Durch das Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/Wsstiger/cve/blob/main/Tracer_info.md https://vuldb.com/?ctiid.274745 https://vuldb.com/?id.274745 https://vuldb.com/?submit.391562 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-31905 – IBM QRadar Network Packet Capture information disclosure
https://notcve.org/view.php?id=CVE-2024-31905
IBM QRadar Network Packet Capture 7.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. • https://www.ibm.com/support/pages/node/7160961 https://exchange.xforce.ibmcloud.com/vulnerabilities/289858 • CWE-311: Missing Encryption of Sensitive Data •
CVE-2024-40704 – IBM InfoSphere Information Server information disclosure
https://notcve.org/view.php?id=CVE-2024-40704
IBM InfoSphere Information Server 11.7 could allow a privileged user to obtain sensitive information from authentication request headers. • https://www.ibm.com/support/pages/node/7160853 https://exchange.xforce.ibmcloud.com/vulnerabilities/298277 • CWE-522: Insufficiently Protected Credentials •
CVE-2024-25024 – IBM QRadar Suite Software information disclosure
https://notcve.org/view.php?id=CVE-2024-25024
IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 281430. • https://exchange.xforce.ibmcloud.com/vulnerabilities/281430 https://www.ibm.com/support/pages/node/7165488 •
CVE-2024-31799
https://notcve.org/view.php?id=CVE-2024-31799
Information Disclosure in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to read the WiFi passphrase via the UART Debugging Port. • https://gncchome.com/collections/indoor-camera/products/c2-indoor-security-camera-1080p https://www.nsideattacklogic.de/advisories/NSIDE-SA-2024-001 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •