Vulnerabilities > Information Exposure Through Log Files

DATE CVE VULNERABILITY TITLE RISK
2020-12-07 CVE-2020-8565 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files.
local
low complexity
kubernetes CWE-532
5.5
2020-12-07 CVE-2020-8564 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials.
local
low complexity
kubernetes CWE-532
5.5
2020-12-07 CVE-2020-8563 Information Exposure Through Log Files vulnerability in Kubernetes
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log.
local
low complexity
kubernetes CWE-532
5.5
2020-11-30 CVE-2020-6317 Information Exposure Through Log Files vulnerability in SAP Adaptive Server Enterprise 15.7/16.0
In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files.
low complexity
sap CWE-532
3.5
2020-11-30 CVE-2020-4900 Information Exposure Through Log Files vulnerability in IBM Business Automation Workflow 19.0.0.3
IBM Business Automation Workflow 19.0.0.3 stores potentially sensitive information in log files that could be read by a local user.
local
low complexity
ibm CWE-532
5.5
2020-11-24 CVE-2020-25640 Information Exposure Through Log Files vulnerability in Redhat Wildfly
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.
network
high complexity
redhat CWE-532
5.3
2020-11-24 CVE-2020-10763 Information Exposure Through Log Files vulnerability in multiple products
An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive information.
local
low complexity
heketi-project redhat CWE-532
5.5
2020-11-24 CVE-2020-10762 Information Exposure Through Log Files vulnerability in Redhat Gluster-Block
An information-disclosure flaw was found in the way that gluster-block before 0.5.1 logs the output from gluster-block CLI operations.
local
low complexity
redhat CWE-532
5.5
2020-11-16 CVE-2020-4671 Information Exposure Through Log Files vulnerability in IBM Sterling B2B Integrator
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.2 and 5.2.0.0 through 5.2.6.5 stores potentially sensitive information in log files that could be read by an authenticatedl user.
network
low complexity
ibm CWE-532
6.5
2020-11-12 CVE-2020-2048 Information Exposure Through Log Files vulnerability in Paloaltonetworks Pan-Os
An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software.
local
low complexity
paloaltonetworks CWE-532
3.3