Vulnerabilities > Information Exposure Through Log Files
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-14 | CVE-2021-21722 | Information Exposure Through Log Files vulnerability in ZTE Zxv10 B860A Firmware V2.1Tv0032.1.1.04Jiangsutelecom A ZTE Smart STB is impacted by an information leak vulnerability. | 4.4 |
2021-01-13 | CVE-2021-1226 | Information Exposure Through Log Files vulnerability in Cisco products A vulnerability in the audit logging component of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, Cisco Emergency Responder, and Cisco Prime License Manager could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. | 6.5 |
2021-01-05 | CVE-2020-26199 | Information Exposure Through Log Files vulnerability in Dell products Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a plain-text password storage vulnerability. | 6.7 |
2020-12-15 | CVE-2020-0476 | Information Exposure Through Log Files vulnerability in Google Android 11.0 In onNotificationRemoved of Assistant.java, there is a possible leak of sensitive information to logs. | 4.4 |
2020-12-14 | CVE-2020-35234 | Information Exposure Through Log Files vulnerability in Wp-Ecommerce Easy WP Smtp The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. | 7.5 |
2020-12-11 | CVE-2020-26416 | Information Exposure Through Log Files vulnerability in Gitlab Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. | 4.4 |
2020-12-07 | CVE-2020-8566 | Information Exposure Through Log Files vulnerability in Kubernetes In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. | 5.5 |
2020-12-07 | CVE-2020-8565 | Information Exposure Through Log Files vulnerability in Kubernetes In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. | 5.5 |
2020-12-07 | CVE-2020-8564 | Information Exposure Through Log Files vulnerability in Kubernetes In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. | 5.5 |
2020-12-07 | CVE-2020-8563 | Information Exposure Through Log Files vulnerability in Kubernetes In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. | 5.5 |