Vulnerabilities > Information Exposure Through Log Files

DATE CVE VULNERABILITY TITLE RISK
2018-07-10 CVE-2018-10889 Information Exposure Through Log Files vulnerability in Moodle
A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7.
network
low complexity
moodle CWE-532
5.3
2018-07-06 CVE-2017-1795 Information Exposure Through Log Files vulnerability in IBM Websphere MQ Managed File Transfer
IBM WebSphere MQ 7.5, 8.0, and 9.0 through 9.0.4 could allow a local user to obtain highly sensitive information via trace logs in IBM WebSphere MQ Managed File Transfer.
local
low complexity
ibm CWE-532
4.4
2018-07-03 CVE-2018-10855 Information Exposure Through Log Files vulnerability in multiple products
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks.
network
high complexity
redhat debian canonical CWE-532
5.9
2018-06-26 CVE-2018-1072 Information Exposure Through Log Files vulnerability in multiple products
ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files.
network
low complexity
ovirt redhat CWE-532
critical
9.8
2018-06-22 CVE-2018-7682 Information Exposure Through Log Files vulnerability in Microfocus Solutions Business Manager
Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.
network
low complexity
microfocus CWE-532
6.5
2018-06-21 CVE-2018-7683 Information Exposure Through Log Files vulnerability in Microfocus Solutions Business Manager
Micro Focus Solutions Business Manager versions prior to 11.4 might reveal certain sensitive information in server log files.
network
low complexity
microfocus CWE-532
7.5
2018-06-20 CVE-2018-12604 Information Exposure Through Log Files vulnerability in Njtech Greencms 2.3.0603
GreenCMS 2.3.0603 allows remote attackers to obtain sensitive information via a direct request for Data/Log/year_month_day.log.
network
low complexity
njtech CWE-532
7.5
2018-06-06 CVE-2017-1480 Information Exposure Through Log Files vulnerability in IBM products
IBM Security Access Manager Appliance 8.0.0 through 8.0.1.6, and 9.0.0 through 9.0.3.1 stores potentially sensitive information in log files that could be read by a remote user.
network
low complexity
ibm CWE-532
4.3
2018-05-31 CVE-2016-10526 Information Exposure Through Log Files vulnerability in Grunt-Gh-Pages Project Grunt-Gh-Pages
A common setup to deploy to gh-pages on every commit via a CI system is to expose a github token to ENV and to use it directly in the auth part of the url.
network
low complexity
grunt-gh-pages-project CWE-532
8.6
2018-05-29 CVE-2018-1241 Information Exposure Through Log Files vulnerability in EMC Recoverpoint and Recoverpoint for Virtual Machines
Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, under certain conditions, may leak LDAP password in plain-text into the RecoverPoint log file.
network
low complexity
emc CWE-532
8.8