Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Debug and Test Problems
Category ID:1207
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
806Vulnerabilities found

CVE-2024-47577
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-2.7||LOW
EPSS-0.05% / 13.43%
||
7 Day CHG+0.01%
Published-10 Dec, 2024 | 00:11
Updated-10 Dec, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure vulnerability in SAP Commerce Cloud

Webservice API endpoints for Assisted Service Module within SAP Commerce Cloud has information disclosure vulnerability. When an authorized agent searches for customer to manage their accounts, the request url includes customer data and it is recorded in server logs. If an attacker impersonating as authorized admin visits such server logs, then they get access to the customer data. The amount of leaked confidential data however is extremely limited, and the attacker has no control over what data is leaked.

Action-Not Available
Vendor-SAP SE
Product-SAP Commerce Cloud
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-6515
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-8.7||HIGH
EPSS-0.07% / 21.54%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 12:22
Updated-05 Dec, 2024 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
unauthorized file access

Web browser interface may manipulate application username/password in clear text or Base64 encoding providing a higher probability of unintended credentails exposure.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Action-Not Available
Vendor-ABB
Product-MATRIX SeriesNEXUS SeriesASPECT-Enterpriseaspect_enterprisenexus_seriesmatrix_series
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-29892
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 6.82%
||
7 Day CHG~0.00%
Published-03 Dec, 2024 | 16:27
Updated-11 Dec, 2024 | 03:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Cognos Controller information disclosure

IBM Cognos Controller 11.0.0 and 11.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.

Action-Not Available
Vendor-IBM Corporation
Product-cognos_controllerCognos Controller
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-11217
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.12% / 32.08%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 20:48
Updated-08 May, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Oauth-server-container: oauth-server-container logs client secret in debug level

A vulnerability was found in the OAuth-server. OAuth-server logs the OAuth2 client secret when the logLevel is Debug higher for OIDC/GitHub/GitLab/Google IDPs login options.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4
CWE ID-CWE-1295
Debug Messages Revealing Unnecessary Information
CVE-2024-45784
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-1.64% / 81.17%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 08:20
Updated-03 Jun, 2025 | 21:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Airflow: Sensitive configuration values are not masked in the logs by default

Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized users could access these logs, potentially exposing critical data that could be exploited to compromise the security of the Airflow deployment. In version 2.10.3, secrets are now masked in task logs to prevent sensitive configuration variables from being exposed in the logging output. Users should upgrade to Airflow 2.10.3 or the latest version to eliminate this vulnerability. If you suspect that DAG authors could have logged the secret values to the logs and that your logs are not additionally protected, it is also recommended that you update those secrets.

Action-Not Available
Vendor-The Apache Software Foundation
Product-airflowApache Airflowairflow
CWE ID-CWE-1295
Debug Messages Revealing Unnecessary Information
CVE-2024-48970
Assigner-Baxter Healthcare
ShareView Details
Assigner-Baxter Healthcare
CVSS Score-9.3||CRITICAL
EPSS-0.03% / 8.24%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 21:31
Updated-18 Nov, 2024 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Life2000 Ventilator microcontroller lacks memory protection

The ventilator's microcontroller lacks memory protection. An attacker could connect to the internal JTAG interface and read or write to flash memory using an off-the-shelf debugging tool, which could disrupt the function of the device and/or cause unauthorized information disclosure.

Action-Not Available
Vendor-Baxter International, Inc.
Product-Life2000 Ventilation Systemlife2000_ventilator_firmware
CWE ID-CWE-1191
On-Chip Debug and Test Interface With Improper Access Control
CVE-2024-9834
Assigner-Baxter Healthcare
ShareView Details
Assigner-Baxter Healthcare
CVSS Score-9.3||CRITICAL
EPSS-0.02% / 3.83%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 20:57
Updated-15 Nov, 2024 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper data protection on Life2000 ventilator serial interface

Improper data protection on the ventilator's serial interface could allow an attacker to send and receive messages that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance.

Action-Not Available
Vendor-Baxter International, Inc.
Product-Life2000 Ventilation Systemlife2000_ventilator_firmware
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-28169
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 3.88%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:08
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information for some BigDL software maintained by Intel(R) before version 2.5.0 may allow an authenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/a
Product-BigDL software maintained by Intel(R)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-43432
Assigner-Fedora Project
ShareView Details
Assigner-Fedora Project
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.72%
||
7 Day CHG+0.01%
Published-11 Nov, 2024 | 12:16
Updated-01 May, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moodle: authorization headers preserved between "emulated redirects"

A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.

Action-Not Available
Vendor-Moodle Pty Ltd
Product-moodlemoodle
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-50634
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.15% / 35.80%
||
7 Day CHG+0.01%
Published-08 Nov, 2024 | 00:00
Updated-14 Nov, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in a weak JWT token in Watcharr v1.43.0 and below allows attackers to perform privilege escalation using a crafted JWT token. This vulnerability is not limited to privilege escalation but also affects all functions that require authentication.

Action-Not Available
Vendor-sbondn/asbondco
Product-watcharrn/awatcharr
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-32946
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-5.9||MEDIUM
EPSS-0.08% / 25.24%
||
7 Day CHG+0.01%
Published-30 Oct, 2024 | 13:35
Updated-13 Nov, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the LevelOne WBR-6012 router's firmware version R0.40e6 allows sensitive information to be transmitted in cleartext via Web and FTP services, exposing it to network sniffing attacks.

Action-Not Available
Vendor-level1LevelOne
Product-wbr-6012_firmwarewbr-6012WBR-6012
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-8013
Assigner-MongoDB, Inc.
ShareView Details
Assigner-MongoDB, Inc.
CVSS Score-2.2||LOW
EPSS-0.02% / 2.28%
||
7 Day CHG~0.00%
Published-28 Oct, 2024 | 12:58
Updated-31 Oct, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CSFLE and Queryable Encryption self-lookup may fail to encrypt values in subpipelines

A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions.

Action-Not Available
Vendor-MongoDB, Inc.
Product-mongocryptdmongo_crypt_v1.somongocryptdMongo_crypt_v1.so
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-50624
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 5.21%
||
7 Day CHG~0.00%
Published-27 Oct, 2024 | 00:00
Updated-31 May, 2025 | 08:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.

Action-Not Available
Vendor-n/aKDE
Product-n/akmail
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-40595
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 3.44%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 00:00
Updated-25 Oct, 2024 | 12:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication-bypass issue in the RDP component of One Identity Safeguard for Privileged Sessions (SPS) On Premise before 7.5.1 (and LTS before 7.0.5.1) allows man-in-the-middle attackers to obtain access to privileged sessions on target resources by intercepting cleartext RDP protocol information.

Action-Not Available
Vendor-n/aoneidentity
Product-n/asafeguard_for_privileged_sessions
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-40090
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.11% / 29.49%
||
7 Day CHG~0.00%
Published-21 Oct, 2024 | 00:00
Updated-07 Jul, 2025 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Information Disclosure. An information leak in the Boa webserver allows remote, unauthenticated attackers to leak memory addresses of uClibc and the stack via sending a GET request to the index page.

Action-Not Available
Vendor-vilolivingn/aviloliving
Product-vilo_5_firmwarevilo_5n/avilo_5_mesh_wifi_system_firmware
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-49387
Assigner-Acronis International GmbH
ShareView Details
Assigner-Acronis International GmbH
CVSS Score-5.4||MEDIUM
EPSS-0.06% / 17.80%
||
7 Day CHG~0.00%
Published-15 Oct, 2024 | 10:34
Updated-04 Feb, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.

Action-Not Available
Vendor-Microsoft CorporationAcronis (Acronis International GmbH)Linux Kernel Organization, Inc
Product-linux_kernelcyber_protectwindowsAcronis Cyber Protect 16
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-48788
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 00:00
Updated-15 Oct, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in YESCAM (com.yescom.YesCam.zwave) 1.0.2 allows a remote attacker to obtain sensitive information via the firmware update process.

Action-Not Available
Vendor-n/ayescam
Product-n/ayescam_firmware
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-47833
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.03% / 8.49%
||
7 Day CHG~0.00%
Published-09 Oct, 2024 | 18:25
Updated-16 Oct, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session Cookie without Secure and HTTPOnly flags in taipy

Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-avaigaAvaigaavaiga
Product-taipytaipytaipy
CWE ID-CWE-1004
Sensitive Cookie Without 'HttpOnly' Flag
CWE ID-CWE-614
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-9620
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 5.46%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 16:25
Updated-12 Feb, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Event-driven automation in ansible automation platform (aap): ansible event-driven automation (eda) lacks encryption

A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. An attacker with network access could exploit this vulnerability by sniffing the plaintext data transmitted between the EDA and AAP. An attacker with system access could exploit this vulnerability by reading the plaintext data stored in EDA and AAP databases.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Ansible Automation Platform 2
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-47789
Assigner-Indian Computer Emergency Response Team (CERT-In)
ShareView Details
Assigner-Indian Computer Emergency Response Team (CERT-In)
CVSS Score-8.7||HIGH
EPSS-0.20% / 41.78%
||
7 Day CHG~0.00%
Published-04 Oct, 2024 | 12:43
Updated-14 Oct, 2024 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Credential Leakage Vulnerability

** UNSUPPORTED WHEN ASSIGNED ** This vulnerability exists in D3D Security IP Camera D8801 due to usage of weak authentication scheme of the HTTP header protocol where authorization tag contain a Base-64 encoded username and password. A remote attacker could exploit this vulnerability by crafting a HTTP packet leading to exposure of user credentials of the targeted device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-D3D Securityd3dsecurity
Product-IP Camera D8801d8801
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-35495
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.06% / 18.12%
||
7 Day CHG~0.00%
Published-30 Sep, 2024 | 00:00
Updated-30 Oct, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Information Disclosure vulnerability in the Telemetry component in TP-Link Kasa KP125M V1.0.0 and Tapo P125M 1.0.0 Build 220930 Rel.143947 allows attackers to observe device state via observing network traffic.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-7713
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.30% / 52.86%
||
7 Day CHG+0.07%
Published-27 Sep, 2024 | 06:00
Updated-27 Aug, 2025 | 12:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AI Chatbot with ChatGPT by AYS <= 2.0.9 - Unauthenticated OpenAI Key Disclosure

The AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0 discloses the Open AI API Key, allowing unauthenticated users to obtain it

Action-Not Available
Vendor-UnknownAYS Pro Extensions
Product-chatgpt_assistantAI ChatBot with ChatGPT and Content Generator by AYSai_chatbot_with_chatgpt
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-45838
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-2.3||LOW
EPSS-0.01% / 1.94%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 17:31
Updated-17 Oct, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
goTenna Pro ATAK Plugin Cleartext Transmission of Sensitive Information

The goTenna Pro ATAK Plugin does not encrypt callsigns in messages. It is advised to not use sensitive information in callsigns when using this and previous versions of the plugin. Update to current plugin version which uses AES-256 encryption for callsigns in encrypted operation

Action-Not Available
Vendor-gotennagoTennagotenna
Product-gotennaPro ATAK Pluginpro_atak_plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-47124
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-2.3||LOW
EPSS-0.02% / 2.50%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 17:21
Updated-17 Oct, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cleartext Transmission of Sensitive Information in goTenna Pro

The goTenna Pro App does not encrypt callsigns in messages. It is recommended to not use sensitive information in callsigns when using this and previous versions of the app and update your app to the current app version which uses AES-256 encryption for callsigns in encrypted operation.

Action-Not Available
Vendor-gotennagoTenna
Product-gotenna_proPro
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-45101
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 22.71%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-14 Sep, 2024 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was discovered when Single Sign On (SSO) is enabled that could allow an attacker to intercept a valid, authenticated LXCA user’s XCC session if they can convince the user to click on a specially crafted URL.

Action-Not Available
Vendor-Lenovo Group Limited
Product-XClarity Administratorxclarity_administrator
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-8059
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-4.3||MEDIUM
EPSS-0.07% / 20.36%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:27
Updated-14 Sep, 2024 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IPMI credentials may be captured in XCC audit log entries when the account username length is 16 characters.

Action-Not Available
Vendor-Lenovo Group Limited
Product-VX7531 Certified Node (ThinkAgile) XCCHX7820 Appliance (ThinkAgile) XCCSR250 V2 (ThinkSystem) XCCVX5530 Appliance (ThinkAgile) XCCHX2331 Certified Node (ThinkAgile) XCCSR650 (ThinkSystem) XCCVX3530-G Appliance (ThinkAgile) XCCHX5531 Certified Node (ThinkAgile) XCCHX5530 Appliance (ThinkAgile) XCCVX7320 N (ThinkAgile) XCCHX1321 Certified Node (ThinkAgile) XCCVX635 V3 Integrated System (ThinkAgile) XCCVX7330 Appliance (Thinkagile) XCCST250 V3 (ThinkSystem) XCCSR258 V2 (ThinkSystem) XCCSE455 V3 (ThinkEdge) XCCSR150 (ThinkSystem) XCCHX Enclosure Certified Node (ThinkAgile) XCCSR630 V3 (ThinkSystem) XCCSR665 V3 (ThinkSystem) XCCVX 1SE Certified Node (ThinkAgile) XCCSE360 V2 (ThinkEdge) XCCHX7530 Appl for SAP HANA (ThinkAgile) XCCSR250 V3 (ThinkSystem) XCCSD650-N V2 (ThinkSystem) XCCHX1521-R Certified Node (ThinkAgile) XCCSR650 V3 (ThinkSystem) XCCSR860 V3 (ThinkSystem) XCCVX3320 (ThinkAgile) XCCHX5520-C Appliance (ThinkAgile) XCCSN850 (ThinkSystem) XCCSR655 V3 (ThinkSystem) XCCSR850P (ThinkSystem) XCCSD665 V3 (ThinkSystem) XCCST550 (ThinkSystem) XCCHX5521 Certified Node (ThinkAgile) XCCST250 V2 (ThinkSystem) XCCSR570 (ThinkSystem) XCCHX3331 Node SAP HANA (ThinkAgile) XCCSR630 V2 (ThinkSystem) XCCHX3330 Appliance (ThinkAgile) XCCHX3376 Certified Node (ThinkAgile) XCCSD550 V3 (ThinkSystem) XCCSR850 V2 (ThinkSystem) XCCST258 V2 (ThinkSystem) XCCSR850 (ThinkSystem) XCCSR675 V3 (ThinkSystem) XCCMX3331-F All-flash Certified node (ThinkAgile) XCCHX7531 Certified Node (ThinkAgile) XCCVX 2U4N Certified Node (ThinkAgile) XCCVX645 V3 Certified Node (ThinkAgile) XCCSR258 V3 (ThinkSystem) XCCHX1021 Edge Certified Node 3yr (ThinkAgile) XCCSR650 V2 (ThinkSystem) XCCVX3520-G (ThinkAgile) XCCVX7820 (ThinkAgile) XCCHX7530 Appliance (ThinkAgile) XCCST250 (ThinkSystem) XCCSE450 (ThinkEdge) XCCSD650 V3 (ThinkSystem) XCCSD650 DWC Dual Node Tray (ThinkSystem) XCCP920 Rack Workstation (ThinkStation) XCCVX5520 (ThinkAgile) XCCSN550 (ThinkSystem) XCCSR645 V3 (ThinkSystem) XCCVX655 V3 Integrated System (ThinkAgile) XCCMX3330-H Hybrid Appliance (ThinkAgile) XCCHX3321 Certified Node (ThinkAgile) XCCHX5520 Appliance (ThinkAgile) XCCHX7531 Node SAP HANA (ThinkAgile) XCCVX645 V3 Integrated System (ThinkAgile) XCCHX5521-C Certified Node (ThinkAgile) XCCSR860 (ThinkSystem) XCCSE350 V2 (ThinkEdge) XCCVX665 V3 Certified Node (ThinkAgile) XCCSR665 (ThinkSystem) XCCVX655 V3 Certified Node (ThinkAgile) XCCST658 V3 (ThinkSystem) XCCHX1320 Appliance (ThinkAgile) XCCVX2320 (ThinkAgile) XCCMX3530 F All flash Appliance (ThinkAgile) XCCST258 (ThinkSystem) XCCSE350 (ThinkSystem) XCCST658 V2 (ThinkSystem) XCCSR530 (ThinkSystem) XCCHX7520 Appliance (ThinkAgile) XCCSD530 V3 (ThinkSystem) XCCVX3330 Appliance (ThinkAgile) XCCSR670 V2 (ThinkSystem) XCCSR860 V2 (ThinkSystem) XCCHX2720-E Appliance (ThinkAgile) XCCHX2330 Appliance (ThinkAgile) XCCMX Edge Appliance - MX1020 (ThinkAgile) XCCSD650 V2 (ThinkSystem) XCCSR850 V3 (ThinkSystem) XCCHX3375 Appliance (ThinkAgile) XCCST650 V2 (ThinkSystem) XCCST258 V3 (ThinkSystem) XCCSR670 (ThinkSystem) XCCHX1331 Certified Node (ThinkAgile) XCCVX2330 Appliance (ThinkAgile) XCCVX3720 (ThinkAgile) XCCSR158 (ThinkSystem) XCCHX3331 Certified Node (ThinkAgile) XCCSD530 (ThinkSystem) XCCMX3330-F All-flash Appliance (ThinkAgile) XCCHX1520-R Appliance (ThinkAgile) XCCSR950 V3 (ThinkSystem) XCCHX3320 Appliance (ThinkAgile) XCCSR550 (ThinkSystem) XCCSR950 (ThinkSystem) XCCSR635 V3 (ThinkSystem) XCCThinkAgile MX1021 on SE350 XCCSR250 (ThinkSystem) XCCVX665 V3 Integrated System (ThinkAgile) XCCHX2321 Certified Node (ThinkAgile) XCCHX3521-G Certified Node (ThinkAgile) XCCHX3520-G Appliance (ThinkAgile) XCCHX3720 Appliance (ThinkAgile) XCCHX3721 Certified Node (ThinkAgile) XCCVX 4U Certified Node (ThinkAgile) XCCSN550 V2 (ThinkSystem) XCCHX7521 Certified Node (ThinkAgile) XCCSR645 (ThinkSystem) XCCST650 V3 (ThinkSystem) XCCMX3331-H Hybrid Certified node (ThinkAgile) XCCMX3530-H Hybrid Appliance (ThinkAgile) XCCVX3331 Certified Node (ThinkAgile) XCCMX3531 H Hybrid Certified node (ThinkAgile) XCCSR590 (ThinkSystem) XCCHX2320-E Appliance (ThinkAgile) XCCVX1320 (ThinkAgile) XCCVX7530 Appliance (ThinkAgile) XCCMX3531-F All-flash Certified node (ThinkAgile) XCCVX7520 (ThinkAgile) XCCHX7821 Certified Node (ThinkAgile) XCCVX7520 N (ThinkAgile) XCCSR258 (ThinkSystem) XCCSR630 (ThinkSystem) XCCSD630 V2 (ThinkSystem) XCC
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-43180
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 9.85%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 01:24
Updated-20 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Concert information disclosure

IBM Concert 1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.

Action-Not Available
Vendor-IBM Corporation
Product-concertConcert
CWE ID-CWE-614
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-44105
Assigner-Ivanti
ShareView Details
Assigner-Ivanti
CVSS Score-8.2||HIGH
EPSS-0.03% / 5.22%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:43
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information in the management console of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to obtain OS credentials.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlautomation
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-41927
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 7.61%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 00:43
Updated-02 Jul, 2025 | 02:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.

Action-Not Available
Vendor-idecIDEC Corporation
Product-kit-fc6a-40-kd_firmwarekit-fc6a-c16r-hg5g-vhp_firmwarekit-fc6a-16-ra_firmwarekit-smart-40-bdc-rs_firmwarekit-fc6a-d16r-hg3g-vahpkit-smart-12-hacft1a-h24rakit-fc6a-40-kdkit-fc6a-16-ra-hg2g-5ttkit-fc6a-40-rd_firmwarekit-fc6a-16-rc-hg1g_firmwareft1a-b24ra_firmwarekit-smart-40-bdc-rskit-fc6a-24-kckit-smart-40-bdc-rkkit-smart-40-hac-r_firmwarekit-fc6a-d32p-hg2g-5tn_firmwarekit-smart-40-hdc-rk_firmwarekit-smart-24-backit-fc6a-24-rc-hg2g-5tnkit-smart-12-hdckit-fc6a-24-rc_firmwarekit-fc6a-40-raft1a-pc2_firmwarekit-fc6a-d16p-hg1g_firmwarekit-fc6a-p16-k_firmwarekit-fc6a-16-pckit-fc6a-p16-skit-fc6a-d32p-hg1g_firmwarekit-fc6a-16-rc-hg1gkit-fc6a-24-kc_firmwarekit-fc6a-c24r-hg2g-vhp_firmwareft1a-pm1_firmwarekit-fc6a-24-rckit-smart-48-bac-skit-smart-40-hdc-rkft1a-pc3_firmwarekit-fc6a-c16r-hg2g-vhpkit-smart-48-bac-s_firmwarekit-fc6a-40-ra_firmwarekit-fc6a-24-pc_firmwarekit-fc6a-40-rc_firmwarekit-fc6a-p16-r_firmwarekit-fc6a-40-pd_firmwarekit-fc6a-16-ra-hg2g-5tn_firmwarekit-fc6a-p32-skit-fc6a-p16-rkit-fc6a-24-ra-hg1g_firmwarekit-fc6a-40-pdkit-fc6a-40-rdkit-fc6a-d16r-hg4g-vhp_firmwarekit-fc6a-16-ra-hg2g-5tnkit-fc6a-p16-kkit-fc6a-16-rckit-fc6a-16-rc-hg2g-5tt_firmwarekit-fc6a-16-pd_firmwarekit-fc6a-16-kc_firmwarekit-fc6a-d16r-hg2g-vhp_firmwarekit-smart-48-bdc-k_firmwarekit-smart-40-bac-r_firmwarehg9z-xcm2aft1a-pc1kit-fc6a-40-pc_firmwareft1a-b12raft1a-pc2kit-fc6a-16-rdft1a-pc3kit-fc6a-c24r-hg4g-vhpkit-smart-48-hdc-s_firmwarekit-smart-24-bdckit-fc6a-16-pc_firmwarekit-fc6a-c24r-hg2g-vhpft1a-b24rakit-smart-48-hac-s_firmwareft1a-h24rc_firmwarekit-fc6a-d16r-hg5g-vhpkit-smart-48-hac-skit-smart-40-hac-rkit-smart-12-backit-fc6a-c24r-hg3g-vahpkit-smart-40-bac-rkit-smart-24-hdckit-smart-48-hac-k_firmwarekit-smart-48-hac-kkit-fc6a-d32p-hg2g-5tnkit-fc6a-16-kdkit-fc6a-24-ra-hg2g-5ttkit-fc6a-16-rd_firmwarekit-fc6a-16-kd_firmwarekit-fc6a-16-rc_firmwarekit-fc6a-d16r-hg2g-5tt_firmwareft1a-h24ra_firmwareft1a-h24rckit-fc6a-d16r-hg5g-vhp_firmwarekit-fc6a-d16r-hg3g-v8hpkit-smart-12-bdc_firmwarekit-fc6a-16-pdkit-fc6a-c16r-hg5g-vhpkit-fc6a-d16p-hg2g-5tnkit-smart-12-bac_firmwareft1a-h12ra_firmwareft1a-pc1_firmwarekit-fc6a-p16-s_firmwarekit-fc6a-16-ra-hg2g-5tt_firmwarekit-fc6a-d16r-hg2g-vhpft9z-1a01kit-fc6a-c16r-hg3g-vahpkit-fc6a-d16r-hg4g-vhpkit-smart-12-hac_firmwarekit-fc6a-16-rc-hg2g-5tn_firmwarekit-fc6a-24-rc-hg2g-5ttkit-fc6a-16-kckit-fc6a-c24r-hg5g-vhpkit-fc6a-d16p-hg2g-5tn_firmwareft1a-h12rc_firmwarekit-fc6a-c16r-hg3g-v8hp_firmwarekit-smart-48-hdc-sft1a-pm1hg9z-xcm2a_firmwarekit-fc6a-d16r-hg2g-5tnkit-fc6a-24-rc-hg1gkit-smart-48-bdc-s_firmwarekit-smart-48-bdc-skit-fc6a-24-rc-hg2g-5tt_firmwarekit-fc6a-16-rakit-fc6a-d32p-hg1gkit-smart-24-bac_firmwarekit-smart-48-bac-kkit-fc6a-d32p-hg2g-5ttkit-fc6a-24-ra-hg1gkit-fc6a-d16r-hg2g-5tn_firmwareft1a-h12rcft9z-psp1pn05kit-smart-40-bdc-rk_firmwarekit-fc6a-40-pckit-fc6a-c24r-hg3g-v8hp_firmwarekit-fc6a-24-rc-hg1g_firmwarekit-smart-24-hackit-fc6a-16-rc-hg2g-5tnkit-fc6a-c16r-hg3g-v8hpkit-smart-40-hdc-rskit-fc6a-24-ra-hg2g-5tn_firmwarekit-fc6a-24-ra-hg2g-5tnkit-fc6a-p32-k_firmwarekit-fc6a-d16r-hg3g-vahp_firmwarekit-fc6a-d16r-hg3g-v8hp_firmwarekit-fc6a-24-ra-hg2g-5tt_firmwarekit-smart-12-hdc_firmwarekit-fc6a-16-rc-hg2g-5ttkit-smart-24-hac_firmwarekit-fc6a-24-rc-hg2g-5tn_firmwarekit-fc6a-24-pckit-fc6a-c24r-hg3g-vahp_firmwarekit-fc6a-c16r-hg2g-vhp_firmwarekit-fc6a-24-rakit-smart-12-bdckit-smart-24-hdc_firmwarekit-smart-48-bdc-kft9z-1a01_firmwarekit-fc6a-d16p-hg2g-5tt_firmwarekit-fc6a-c24r-hg5g-vhp_firmwarekit-fc6a-d16r-hg1g_firmwarekit-fc6a-16-ra-hg1gkit-fc6a-d16r-hg1gft1a-b12ra_firmwarekit-smart-40-hdc-rs_firmwarekit-fc6a-24-ra_firmwarekit-fc6a-40-rckit-fc6a-c24r-hg4g-vhp_firmwarekit-smart-48-bac-k_firmwarekit-fc6a-d32p-hg2g-5tt_firmwarekit-fc6a-p32-s_firmwarekit-fc6a-c24r-hg3g-v8hpkit-fc6a-16-ra-hg1g_firmwarekit-smart-24-bdc_firmwarekit-fc6a-c16r-hg3g-vahp_firmwarekit-fc6a-d16r-hg2g-5ttft9z-psp1pn05_firmwareft1a-h12rakit-fc6a-d16p-hg2g-5ttkit-fc6a-p32-kkit-fc6a-d16p-hg1gFT1A Series SmartAXIS Pro/LiteFC6B Series MICROSmart All-in-One CPU moduleFC6B Series MICROSmart Plus CPU moduleFC6A Series MICROSmart Plus CPU moduleFC6A Series MICROSmart All-in-One CPU module
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-31799
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.03% / 8.58%
||
7 Day CHG~0.00%
Published-15 Aug, 2024 | 00:00
Updated-16 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information Disclosure in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to read the WiFi passphrase via the UART Debugging Port.

Action-Not Available
Vendor-gncchomen/agncchome
Product-_gncc_c2gncc_c2_firmwaren/agc2
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-38167
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.92% / 75.03%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:29
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
.NET and Visual Studio Information Disclosure Vulnerability

.NET and Visual Studio Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_2022.netMicrosoft Visual Studio 2022 version 17.6Microsoft Visual Studio 2022 version 17.8.NET 8.0Microsoft Visual Studio 2022 version 17.10
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-7408
Assigner-Indian Computer Emergency Response Team (CERT-In)
ShareView Details
Assigner-Indian Computer Emergency Response Team (CERT-In)
CVSS Score-8.6||HIGH
EPSS-0.03% / 7.61%
||
7 Day CHG~0.00%
Published-09 Aug, 2024 | 10:40
Updated-13 Aug, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure Vulnerability in Airveda Air Quality Monitor

This vulnerability exists in Airveda Air Quality Monitor PM2.5 PM10 due to transmission of sensitive information in plain text during AP pairing mode. An attacker in close proximity could exploit this vulnerability by capturing Wi-Fi traffic of Airveda-AP. Successful exploitation of this vulnerability could allow the attacker to cause Evil Twin attack on the targeted system.

Action-Not Available
Vendor-Airveda (Airveda Technologies Pvt Ltd.)
Product-pm2.5_pm10_monitorpm2.5_pm10_monitor_firmwareAir Quality Monitor PM2.5 PM10
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-38891
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.09% / 27.19%
||
7 Day CHG~0.00%
Published-02 Aug, 2024 | 00:00
Updated-20 Aug, 2024 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Sniffing Network Traffic attack due to the cleartext transmission of sensitive information.

Action-Not Available
Vendor-horizoncloudn/ahorizoncloud
Product-catereasen/acaterease
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-32864
Assigner-Johnson Controls
ShareView Details
Assigner-Johnson Controls
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.63%
||
7 Day CHG~0.00%
Published-01 Aug, 2024 | 21:08
Updated-09 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
exacqVison - HTTPS Session Establishment

Under certain circumstances exacqVision Web Services will not enforce secure web communications (HTTPS)

Action-Not Available
Vendor-johnsoncontrolsJohnson Controls
Product-exacqvision_web_serviceexacqVision
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-41262
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.06% / 17.88%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 00:00
Updated-10 Jul, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mmudb v1.9.3 was discovered to use the HTTP protocol in the ShowMetricsRaw and ShowMetricsAsText functions, possibly allowing attackers to intercept communications via a man-in-the-middle attack.

Action-Not Available
Vendor-codenotaryn/acodenotary
Product-immudbn/aimmudb
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-41692
Assigner-Indian Computer Emergency Response Team (CERT-In)
ShareView Details
Assigner-Indian Computer Emergency Response Team (CERT-In)
CVSS Score-8.6||HIGH
EPSS-0.04% / 12.98%
||
7 Day CHG~0.00%
Published-26 Jul, 2024 | 12:11
Updated-02 Aug, 2024 | 04:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Access Control Vulnerability

This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the root shell on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary commands with root privileges on the targeted system.

Action-Not Available
Vendor-SyroTechsyrotech
Product-SyroTech SY-GPON-1110-WDONT routersy-gpon-1110-wdont_firmware
CWE ID-CWE-1191
On-Chip Debug and Test Interface With Improper Access Control
CVE-2024-41687
Assigner-Indian Computer Emergency Response Team (CERT-In)
ShareView Details
Assigner-Indian Computer Emergency Response Team (CERT-In)
CVSS Score-8.6||HIGH
EPSS-0.10% / 28.07%
||
7 Day CHG~0.00%
Published-26 Jul, 2024 | 11:50
Updated-07 Aug, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cleartext Transmission of Sensitive Information Vulnerability

This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to transmission of password in plain text. A remote attacker could exploit this vulnerability by intercepting transmission within an HTTP session on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.

Action-Not Available
Vendor-SyroTechsyrotech
Product-SyroTech SY-GPON-1110-WDONT routersy-gpon-1110-wdont_firmware
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-6972
Assigner-Octopus Deploy
ShareView Details
Assigner-Octopus Deploy
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.85%
||
7 Day CHG~0.00%
Published-25 Jul, 2024 | 05:16
Updated-02 Jul, 2025 | 17:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In affected versions of Octopus Server under certain circumstances it is possible for sensitive variables to be printed in the task log in clear-text.

Action-Not Available
Vendor-Octopus Deploy Pty. Ltd.Linux Kernel Organization, IncMicrosoft Corporation
Product-linux_kernelwindowsoctopus_serverOctopus Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-41124
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 3.50%
||
7 Day CHG-0.01%
Published-19 Jul, 2024 | 19:45
Updated-02 Aug, 2024 | 04:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Puncia Cleartext Transmission of Sensitive Information via HTTP urls in `API_URLS`

Puncia is the Official CLI utility for Subdomain Center & Exploit Observer. `API_URLS` is utilizing HTTP instead of HTTPS for communication that can lead to issues like Eavesdropping, Data Tampering, Unauthorized Data Access & MITM Attacks. This issue has been addressed in release version 0.21 by using https rather than http connections. All users are advised to upgrade. There is no known workarounds for this vulnerability.

Action-Not Available
Vendor-A.R.P. Syndicate
Product-punciapuncia
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2024-5631
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6||MEDIUM
EPSS-0.08% / 24.97%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 10:57
Updated-01 Aug, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Longse NVR (Network Video Recorder) model NVR3608PGE2W, as well as products based on this device, are transmitting user's login and password to a remote control service without using any encryption. This enables an on-path attacker to eavesdrop the credentials and subsequently obtain access to the video stream.  The credentials are being sent when a user decides to change his password in router's portal.

Action-Not Available
Vendor-ZamelLongse Technology
Product-NVR3608PGE2WZMB-01
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-6388
Assigner-Canonical Ltd.
ShareView Details
Assigner-Canonical Ltd.
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 8.20%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 15:39
Updated-27 Aug, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon, before version 1.12, leaks the Pro token to unprivileged users by passing the token as an argument in plaintext.

Action-Not Available
Vendor-Canonical Ltd.
Product-ubuntu_advantage_desktop_daemonUbuntu Advantage Desktop Proubuntu_advantage_desktop_pro
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2024-38516
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.22% / 44.13%
||
7 Day CHG~0.00%
Published-25 Jun, 2024 | 20:08
Updated-02 Aug, 2024 | 04:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Aimeos HTML client may potentially reveal sensitive information in error log

ai-client-html is an Aimeos e-commerce HTML client component. Debug information revealed sensitive information from environment variables in error log. This issue has been patched in versions 2024.04.7, 2023.10.15, 2022.10.13 and 2021.10.22.

Action-Not Available
Vendor-aimeos
Product-ai-client-html
CWE ID-CWE-1295
Debug Messages Revealing Unnecessary Information
CVE-2024-37183
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.9||MEDIUM
EPSS-0.07% / 23.13%
||
7 Day CHG-0.00%
Published-20 Jun, 2024 | 22:09
Updated-30 Jul, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Westermo L210-F2G Lynx Cleartext Transmission of Sensitive Information

Plain text credentials and session ID can be captured with a network sniffer.

Action-Not Available
Vendor-westermoWestermowestermo
Product-l210-f2g_firmwarel210-f2gL210-F2G Lynxl210-f2g_lynx_firmware
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-0066
Assigner-Axis Communications AB
ShareView Details
Assigner-Axis Communications AB
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.47%
||
7 Day CHG~0.00%
Published-18 Jun, 2024 | 06:10
Updated-08 Nov, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Action-Not Available
Vendor-Axis Communications ABaxis
Product-AXIS OSaxis_os_2020axis_osaxis_os_2022
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-5996
Assigner-TWCERT/CC
ShareView Details
Assigner-TWCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.04% / 12.00%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 08:22
Updated-14 Aug, 2024 | 01:39
Rejected-14 Aug, 2024 | 01:39
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Action-Not Available
Vendor-soar_cloud
Product-hr_portal
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-27179
Assigner-Toshiba Corporation
ShareView Details
Assigner-Toshiba Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 6.57%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 04:09
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session disclosure inside the log files

Admin cookies are written in clear-text in logs. An attacker can retrieve them and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-400-ace-studio-3525_ace-studio-2528-ae-studio-2520_nce-studio-9029-ae-studio-7527-ace-studio-4525_ace-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-1295
Debug Messages Revealing Unnecessary Information
CVE-2024-27166
Assigner-Toshiba Corporation
ShareView Details
Assigner-Toshiba Corporation
CVSS Score-7.4||HIGH
EPSS-0.02% / 4.71%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 03:48
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure permissions

Coredump binaries in Toshiba printers have incorrect permissions. A local attacker can steal confidential information. As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporationtoshibatec
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)e-studio-4528-age-studio-2020_ace-studio-3115-nce-studio-2110-ace-studio-2015-nce-studio-3015-nce-studio-2510-ace-studio-3028-ae-studio-5525_ace-studio-5528-ae-studio-2515-nce-studio-4515_ace-studio-2518_ae-studio-400-ace-studio-3118_ae-studio-3525_ace-studio-3118_age-studio-2528-ae-studio-4615_ace-studio-2520_nce-studio-2618_ae-studio-9029-ae-studio-3018_ae-studio-7527-ace-studio-4525_ace-studio-2018_ae-studio-2021_ace-studio-2521_ace-studio-3025_ace-studio-6525_ace-studio-3528-age-studio-6527-ace-studio-2610-ace-studio-5015_ace-studio-6529-ae-studio-3515-nce-studio-6528-ae-studio-3528-ae-studio-3615-nce-studio-7529-ae-studio-2010-ace-studio-4528-ae-studio-2615-nce-studio-6526-ace-studio-5525_acge-studio-330-ace-studio-5115_ace-studio-2525_ace-studio-6525_acge-studio-3525_acg
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-27163
Assigner-Toshiba Corporation
ShareView Details
Assigner-Toshiba Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.58%
||
7 Day CHG~0.00%
Published-14 Jun, 2024 | 03:40
Updated-13 Feb, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Leak of admin password and passwords

Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.

Action-Not Available
Vendor-Toshiba Tec Corporation
Product-Toshiba Tec e-Studio multi-function peripheral (MFP)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-35210
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-5.1||MEDIUM
EPSS-0.13% / 33.76%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 11:15
Updated-11 Feb, 2025 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is not enforcing HSTS. This could allow an attacker to perform downgrade attacks exposing confidential information.

Action-Not Available
Vendor-Siemens AG
Product-sinec_traffic_analyzerSINEC Traffic Analyzersinec_traffic_analyzer
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-37393
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-84.93% / 99.30%
||
7 Day CHG~0.00%
Published-10 Jun, 2024 | 00:00
Updated-02 Aug, 2024 | 03:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.

Action-Not Available
Vendor-securenvoyn/asecurenvoy
Product-multi-factor_authentication_solutionsn/amfa
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-37163
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.15% / 36.19%
||
7 Day CHG~0.00%
Published-07 Jun, 2024 | 16:09
Updated-13 Nov, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SkyScrape Secure API Requests

SkyScrape is a GUI Dashboard for AWS Infrastructure and Managing Resources and Usage Costs. SkyScrape's API requests are currently unsecured HTTP requests, leading to potential vulnerabilities for the user's temporary credentials and data. This affects version 1.0.0.

Action-Not Available
Vendor-opensourcelabsoslabs-beta
Product-skyscraperSkyScraper
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 16
  • 17
  • Next