Vulnerabilities > Information Exposure Through Log Files
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-07-22 | CVE-2019-13098 | Information Exposure Through Log Files vulnerability in Tronlink Wallet 2.2.0 The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. | 6.5 |
2019-07-18 | CVE-2019-13509 | Information Exposure Through Log Files vulnerability in Docker In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. | 7.5 |
2019-07-10 | CVE-2018-19583 | Information Exposure Through Log Files vulnerability in Gitlab GitLab CE/EE, versions 8.0 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, would log access tokens in the Workhorse logs, permitting administrators with access to the logs to see another user's token. | 6.5 |
2019-07-01 | CVE-2019-4299 | Information Exposure Through Log Files vulnerability in IBM Robotic Process Automation With Automation Anywhere IBM Robotic Process Automation with Automation Anywhere 11 could allow a local user to obtain highly sensitive information from log files when debugging is enabled. | 5.5 |
2019-07-01 | CVE-2019-4296 | Information Exposure Through Log Files vulnerability in IBM Robotic Process Automation With Automation Anywhere 11.0.0.0/11.0.0.1/11.0.0.2 IBM Robotic Process Automation with Automation Anywhere 11 information disclosure could allow a local user to obtain e-mail contents from the client debug log file. | 3.3 |
2019-06-27 | CVE-2019-1622 | Information Exposure Through Log Files vulnerability in Cisco Data Center Network Manager 11.0(1) A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. | 5.3 |
2019-06-26 | CVE-2019-4225 | Information Exposure Through Log Files vulnerability in IBM Pureapplication System IBM PureApplication System 2.2.3.0 through 2.2.5.3 stores potentially sensitive information in log files that could be read by a local user. | 4.4 |
2019-06-12 | CVE-2019-3888 | Information Exposure Through Log Files vulnerability in multiple products A vulnerability was found in Undertow web server before 2.0.21. | 9.8 |
2019-06-06 | CVE-2019-9929 | Information Exposure Through Log Files vulnerability in Northern Cfengine 3.12.1 Northern.tech CFEngine Enterprise 3.12.1 has Insecure Permissions. | 8.8 |
2019-05-14 | CVE-2019-11336 | Information Exposure Through Log Files vulnerability in Sony Photo Sharing Plus 6.5830 Sony Bravia Smart TV devices allow remote attackers to retrieve the static Wi-Fi password (used when the TV is acting as an access point) by using the Photo Sharing Plus application to execute a backdoor API command, a different vulnerability than CVE-2019-10886. | 8.1 |