Vulnerabilities > Information Exposure Through Log Files

DATE CVE VULNERABILITY TITLE RISK
2019-07-31 CVE-2019-10343 Information Exposure Through Log Files vulnerability in Jenkins Configuration AS Code
Jenkins Configuration as Code Plugin 1.24 and earlier did not properly apply masking to values expected to be hidden when logging the configuration being applied.
local
low complexity
jenkins CWE-532
3.3
2019-07-30 CVE-2019-10165 Information Exposure Through Log Files vulnerability in Redhat Openshift Container Platform
OpenShift Container Platform before version 4.1.3 writes OAuth tokens in plaintext to the audit logs for the Kubernetes API server and OpenShift API server.
local
low complexity
redhat CWE-532
2.3
2019-07-26 CVE-2019-0202 Information Exposure Through Log Files vulnerability in Apache Storm
The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm.
network
low complexity
apache CWE-532
7.5
2019-07-25 CVE-2019-14268 Information Exposure Through Log Files vulnerability in Octopus Deploy
In Octopus Deploy versions 3.0.19 to 2019.7.2, when a web request proxy is configured, an authenticated user (in certain limited circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext.
network
low complexity
octopus CWE-532
6.5
2019-07-23 CVE-2019-11273 Information Exposure Through Log Files vulnerability in Pivotal Software Pivotal Container Service
Pivotal Container Services (PKS) versions 1.3.x prior to 1.3.7, and versions 1.4.x prior to 1.4.1, contains a vulnerable component which logs the username and password to the billing database.
network
low complexity
pivotal-software CWE-532
4.3
2019-07-22 CVE-2019-13098 Information Exposure Through Log Files vulnerability in Tronlink Wallet 2.2.0
The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called.
network
low complexity
tronlink CWE-532
6.5
2019-07-18 CVE-2019-13509 Information Exposure Through Log Files vulnerability in Docker
In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log.
network
low complexity
docker CWE-532
7.5
2019-07-11 CVE-2019-10194 Information Exposure Through Log Files vulnerability in multiple products
Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions.
local
low complexity
ovirt redhat CWE-532
5.5
2019-07-10 CVE-2018-19583 Information Exposure Through Log Files vulnerability in Gitlab
GitLab CE/EE, versions 8.0 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, would log access tokens in the Workhorse logs, permitting administrators with access to the logs to see another user's token.
network
low complexity
gitlab CWE-532
6.5
2019-07-01 CVE-2019-4299 Information Exposure Through Log Files vulnerability in IBM Robotic Process Automation With Automation Anywhere
IBM Robotic Process Automation with Automation Anywhere 11 could allow a local user to obtain highly sensitive information from log files when debugging is enabled.
local
low complexity
ibm CWE-532
5.5