Vulnerabilities > Information Exposure Through Log Files

DATE CVE VULNERABILITY TITLE RISK
2020-12-14 CVE-2020-35234 Information Exposure Through Log Files vulnerability in Wp-Ecommerce Easy WP Smtp
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020.
network
low complexity
wp-ecommerce CWE-532
7.5
2020-12-11 CVE-2020-26416 Information Exposure Through Log Files vulnerability in Gitlab
Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs.
local
low complexity
gitlab CWE-532
4.4
2020-12-07 CVE-2020-8566 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs.
local
low complexity
kubernetes CWE-532
5.5
2020-12-07 CVE-2020-8565 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files.
local
low complexity
kubernetes CWE-532
5.5
2020-12-07 CVE-2020-8564 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials.
local
low complexity
kubernetes CWE-532
5.5
2020-12-07 CVE-2020-8563 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log.
local
low complexity
kubernetes CWE-532
5.5
2020-11-30 CVE-2020-6317 Information Exposure Through Log Files vulnerability in SAP Adaptive Server Enterprise 15.7/16.0
In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files.
low complexity
sap CWE-532
3.5
2020-11-30 CVE-2020-4900 Information Exposure Through Log Files vulnerability in IBM Business Automation Workflow 19.0.0.3
IBM Business Automation Workflow 19.0.0.3 stores potentially sensitive information in log files that could be read by a local user.
local
low complexity
ibm CWE-532
5.5
2020-11-24 CVE-2020-25640 Information Exposure Through Log Files vulnerability in Redhat Wildfly
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.
network
high complexity
redhat CWE-532
5.3
2020-11-24 CVE-2020-10763 Information Exposure Through Log Files vulnerability in multiple products
An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive information.
local
low complexity
heketi-project redhat CWE-532
5.5