Vulnerabilities > Information Exposure Through Log Files
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-25 | CVE-2015-3243 | Information Exposure Through Log Files vulnerability in Rsyslog rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron. | 5.5 |
2017-06-20 | CVE-2017-3744 | Information Exposure Through Log Files vulnerability in multiple products In the IMM2 firmware of Lenovo System x servers, remote commands issued by LXCA or other utilities may be captured in the First Failure Data Capture (FFDC) service log if the service log is generated when that remote command is running. | 6.5 |
2017-06-13 | CVE-2017-4955 | Information Exposure Through Log Files vulnerability in Pivotal Software Cloud Foundry Elastic Runtime An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.65, 1.7.x versions prior to 1.7.48, 1.8.x versions prior to 1.8.28, and 1.9.x versions prior to 1.9.5. | 9.8 |
2017-05-09 | CVE-2016-6799 | Information Exposure Through Log Files vulnerability in Apache Cordova Product: Apache Cordova Android 5.2.2 and earlier. | 7.5 |
2017-04-23 | CVE-2017-8075 | Information Exposure Through Log Files vulnerability in Tp-Link Tl-Sg108E Firmware 1.1.2 On the TP-Link TL-SG108E 1.0, a remote attacker could retrieve credentials from "Switch Info" log lines where passwords are in cleartext. | 9.8 |
2017-04-23 | CVE-2017-8074 | Information Exposure Through Log Files vulnerability in Tp-Link Tl-Sg108E Firmware 1.1.2 On the TP-Link TL-SG108E 1.0, a remote attacker could retrieve credentials from "SEND data" log lines where passwords are encoded in hexadecimal. | 9.8 |
2017-03-21 | CVE-2017-7214 | Information Exposure Through Log Files vulnerability in Openstack Nova An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. | 9.8 |
2017-03-08 | CVE-2016-9985 | Information Exposure Through Log Files vulnerability in IBM Cognos Business Intelligence 10.1.1/10.2 IBM Cognos Server 10.1.1 and 10.2 stores highly sensitive information in log files that could be read by a local user. | 5.5 |
2017-03-01 | CVE-2016-8233 | Information Exposure Through Log Files vulnerability in Lenovo Xclarity Administrator Log files generated by Lenovo XClarity Administrator (LXCA) versions earlier than 1.2.2 may contain user credentials in a non-secure, clear text form that could be viewed by a non-privileged user. | 9.8 |
2017-02-13 | CVE-2017-5153 | Information Exposure Through Log Files vulnerability in Osisoft PI Coresight and PI web API An issue was discovered in OSIsoft PI Coresight 2016 R2 and earlier versions, and PI Web API 2016 R2 when deployed using the PI AF Services 2016 R2 integrated install kit. | 7.8 |