Vulnerabilities > Information Exposure Through Log Files

DATE CVE VULNERABILITY TITLE RISK
2021-02-08 CVE-2021-20359 Information Exposure Through Log Files vulnerability in IBM Cloud PAK for Automation 20.0.2/20.0.3
IBM Cloud Pak for Automation 20.0.3, 20.0.2-IF002 - Business Automation Application Designer Component stores potentially sensitive information in log files that could be obtained by an unauthorized user.
network
low complexity
ibm CWE-532
4.0
2021-01-14 CVE-2021-21722 Information Exposure Through Log Files vulnerability in ZTE Zxv10 B860A Firmware V2.1Tv0032.1.1.04Jiangsutelecom
A ZTE Smart STB is impacted by an information leak vulnerability.
local
low complexity
zte CWE-532
2.1
2021-01-13 CVE-2021-1226 Information Exposure Through Log Files vulnerability in Cisco products
A vulnerability in the audit logging component of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, Cisco Emergency Responder, and Cisco Prime License Manager could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.
network
low complexity
cisco CWE-532
6.5
2021-01-13 CVE-2021-3032 Information Exposure Through Log Files vulnerability in Paloaltonetworks Pan-Os
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where configuration secrets for the “http”, “email”, and “snmptrap” v3 log forwarding server profiles can be logged to the logrcvr.log system log.
local
low complexity
paloaltonetworks CWE-532
2.1
2021-01-05 CVE-2020-26199 Information Exposure Through Log Files vulnerability in Dell products
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a plain-text password storage vulnerability.
local
low complexity
dell CWE-532
2.1
2020-12-15 CVE-2020-0476 Information Exposure Through Log Files vulnerability in Google Android 11.0
In onNotificationRemoved of Assistant.java, there is a possible leak of sensitive information to logs.
local
low complexity
google CWE-532
2.1
2020-12-14 CVE-2020-35234 Information Exposure Through Log Files vulnerability in Wp-Ecommerce Easy WP Smtp
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020.
network
low complexity
wp-ecommerce CWE-532
5.0
2020-12-07 CVE-2020-8566 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs.
local
low complexity
kubernetes CWE-532
2.1
2020-12-07 CVE-2020-8565 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files.
local
low complexity
kubernetes CWE-532
2.1
2020-12-07 CVE-2020-8564 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials.
local
low complexity
kubernetes CWE-532
2.1