Vulnerabilities > Information Exposure Through Log Files
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-19 | CVE-2023-45809 | Information Exposure Through Log Files vulnerability in Torchbox Wagtail Wagtail is an open source content management system built on Django. | 2.7 |
2023-10-19 | CVE-2023-45825 | Information Exposure Through Log Files vulnerability in YDB Ydb-Go-Sdk 3.48.6 ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. | 5.5 |
2023-10-17 | CVE-2023-5339 | Information Exposure Through Log Files vulnerability in Mattermost Desktop Mattermost Desktop fails to set an appropriate log level during initial run after fresh installation resulting in logging all keystrokes including password entry being logged. | 5.5 |
2023-10-13 | CVE-2023-40682 | Information Exposure Through Log Files vulnerability in IBM APP Connect Enterprise IBM App Connect Enterprise 12.0.1.0 through 12.0.8.0 contains an unspecified vulnerability that could allow a local privileged user to obtain sensitive information from API logs. | 4.4 |
2023-10-12 | CVE-2023-41263 | Information Exposure Through Log Files vulnerability in Plixer Scrutinizer An issue was discovered in Plixer Scrutinizer before 19.3.1. | 3.7 |
2023-10-10 | CVE-2023-25604 | Information Exposure Through Log Files vulnerability in Fortinet Fortiguest 1.0.0 An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs. | 5.5 |
2023-10-10 | CVE-2023-5499 | Information Exposure Through Log Files vulnerability in Reachfargps Reachfar GPS Firmware 28 Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. | 7.5 |
2023-10-10 | CVE-2023-39447 | Information Exposure Through Log Files vulnerability in F5 products When BIG-IP APM Guided Configurations are configured, undisclosed sensitive information may be logged in restnoded log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 4.4 |
2023-10-10 | CVE-2023-41253 | Information Exposure Through Log Files vulnerability in F5 Big-Ip Domain Name System When on BIG-IP DNS or BIG-IP LTM enabled with DNS Services License, and a TSIG key is created, it is logged in plaintext in the audit log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 5.5 |
2023-10-10 | CVE-2023-43485 | Information Exposure Through Log Files vulnerability in F5 products When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 5.5 |