Vulnerabilities > Information Exposure Through Log Files

DATE CVE VULNERABILITY TITLE RISK
2019-07-22 CVE-2019-13098 Information Exposure Through Log Files vulnerability in Tronlink Wallet 2.2.0
The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called.
network
low complexity
tronlink CWE-532
6.5
2019-07-18 CVE-2019-13509 Information Exposure Through Log Files vulnerability in Docker
In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log.
network
low complexity
docker CWE-532
7.5
2019-07-10 CVE-2018-19583 Information Exposure Through Log Files vulnerability in Gitlab
GitLab CE/EE, versions 8.0 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, would log access tokens in the Workhorse logs, permitting administrators with access to the logs to see another user's token.
network
low complexity
gitlab CWE-532
6.5
2019-07-01 CVE-2019-4299 Information Exposure Through Log Files vulnerability in IBM Robotic Process Automation With Automation Anywhere
IBM Robotic Process Automation with Automation Anywhere 11 could allow a local user to obtain highly sensitive information from log files when debugging is enabled.
local
low complexity
ibm CWE-532
5.5
2019-07-01 CVE-2019-4296 Information Exposure Through Log Files vulnerability in IBM Robotic Process Automation With Automation Anywhere 11.0.0.0/11.0.0.1/11.0.0.2
IBM Robotic Process Automation with Automation Anywhere 11 information disclosure could allow a local user to obtain e-mail contents from the client debug log file.
local
low complexity
ibm CWE-532
3.3
2019-06-27 CVE-2019-1622 Information Exposure Through Log Files vulnerability in Cisco Data Center Network Manager 11.0(1)
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device.
network
low complexity
cisco CWE-532
5.3
2019-06-26 CVE-2019-4225 Information Exposure Through Log Files vulnerability in IBM Pureapplication System
IBM PureApplication System 2.2.3.0 through 2.2.5.3 stores potentially sensitive information in log files that could be read by a local user.
local
low complexity
ibm CWE-532
4.4
2019-06-12 CVE-2019-3888 Information Exposure Through Log Files vulnerability in multiple products
A vulnerability was found in Undertow web server before 2.0.21.
network
low complexity
redhat netapp CWE-532
critical
9.8
2019-06-06 CVE-2019-9929 Information Exposure Through Log Files vulnerability in Northern Cfengine 3.12.1
Northern.tech CFEngine Enterprise 3.12.1 has Insecure Permissions.
network
low complexity
northern CWE-532
8.8
2019-05-14 CVE-2019-11336 Information Exposure Through Log Files vulnerability in Sony Photo Sharing Plus 6.5830
Sony Bravia Smart TV devices allow remote attackers to retrieve the static Wi-Fi password (used when the TV is acting as an access point) by using the Photo Sharing Plus application to execute a backdoor API command, a different vulnerability than CVE-2019-10886.
network
high complexity
sony CWE-532
8.1