Vulnerabilities > Information Exposure Through Log Files
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-08 | CVE-2022-27599 | Information Exposure Through Log Files vulnerability in Qnap QVR PRO Client An insertion of sensitive information into Log file vulnerability has been reported to affect product. | 4.4 |
2023-09-07 | CVE-2023-40029 | Information Exposure Through Log Files vulnerability in Argoproj Argo CD Argo CD is a declarative continuous deployment for Kubernetes. | 9.6 |
2023-09-06 | CVE-2023-40392 | Information Exposure Through Log Files vulnerability in Apple Ipados and Iphone OS A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |
2023-09-06 | CVE-2023-30721 | Information Exposure Through Log Files vulnerability in Samsung Android 11.0/12.0 Insertion of sensitive information into log vulnerability in Locksettings prior to SMR Sep-2023 Release 1 allows a privileged local attacker to get lock screen match information from the log. | 4.4 |
2023-08-31 | CVE-2023-4688 | Information Exposure Through Log Files vulnerability in Acronis Agent Sensitive information leak through log files. | 5.5 |
2023-08-29 | CVE-2021-32050 | Information Exposure Through Log Files vulnerability in Mongodb products Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. | 7.5 |
2023-08-28 | CVE-2023-39348 | Information Exposure Through Log Files vulnerability in Linuxfoundation Spinnaker Spinnaker is an open source, multi-cloud continuous delivery platform. | 5.3 |
2023-08-22 | CVE-2023-38733 | Information Exposure Through Log Files vulnerability in IBM Robotic Process Automation IBM Robotic Process Automation 21.0.0 through 21.0.7.1 and 23.0.0 through 23.0.1 server could allow an authenticated user to view sensitive information from installation logs. | 4.3 |
2023-08-22 | CVE-2023-38732 | Information Exposure Through Log Files vulnerability in IBM products IBM Robotic Process Automation 21.0.0 through 21.0.7 server could allow an authenticated user to view sensitive information from application logs. | 4.3 |
2023-08-18 | CVE-2023-4413 | Information Exposure Through Log Files vulnerability in Rootkit Hunter Project Rootkit Hunter 1.4.4/1.4.6 ** DISPUTED ** A vulnerability was found in rkhunter Rootkit Hunter 1.4.4/1.4.6. | 2.5 |