Vulnerabilities > Information Exposure Through Log Files
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-03-13 | CVE-2019-3716 | Information Exposure Through Log Files vulnerability in RSA Archer GRC Platform RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. | 7.8 |
2019-03-13 | CVE-2019-3715 | Information Exposure Through Log Files vulnerability in RSA Archer GRC Platform RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. | 5.5 |
2019-03-05 | CVE-2019-0741 | Information Exposure Through Log Files vulnerability in Microsoft Java Software Development KIT An information disclosure vulnerability exists in the way Azure IoT Java SDK logs sensitive information, aka 'Azure IoT Java SDK Information Disclosure Vulnerability'. | 7.5 |
2019-02-20 | CVE-2019-8944 | Information Exposure Through Log Files vulnerability in Octopus Deploy An Information Exposure issue in the Terraform deployment step in Octopus Deploy before 2019.1.8 (and before 2018.10.4 LTS) allows remote authenticated users to view sensitive Terraform output variables via log files. | 6.5 |
2019-02-15 | CVE-2019-0266 | Information Exposure Through Log Files vulnerability in SAP Hana Extended Application Services 1.0 Under certain conditions SAP HANA Extended Application Services, version 1.0, advanced model (XS advanced) writes credentials of platform users to a trace file of the SAP HANA system. | 7.5 |
2019-02-07 | CVE-2019-4008 | Information Exposure Through Log Files vulnerability in IBM API Connect API Connect V2018.1 through 2018.4.1.1 is impacted by access token leak. | 9.8 |
2019-02-05 | CVE-2017-1198 | Information Exposure Through Log Files vulnerability in IBM Bigfix Compliance 1.7/1.8/1.9.91 IBM BigFix Compliance 1.7 through 1.9.91 (TEMA SUAv1 SCA SCM) stores sensitive information in URL parameters. | 5.3 |
2019-01-28 | CVE-2018-19014 | Information Exposure Through Log Files vulnerability in Draeger products Drager Infinity Delta, Infinity Delta, all versions, Delta XL, all versions, Kappa, all version, and Infinity Explorer C700, all versions. | 6.5 |
2019-01-28 | CVE-2018-16889 | Information Exposure Through Log Files vulnerability in Redhat Ceph Ceph does not properly sanitize encryption keys in debug logging for v4 auth. | 7.5 |
2019-01-15 | CVE-2019-0029 | Information Exposure Through Log Files vulnerability in Juniper Advanced Threat Prevention Juniper ATP Series Splunk credentials are logged in a file readable by authenticated local users. | 7.8 |