VMware vRealize Log Insight 2.5

CPE Details

VMware vRealize Log Insight 2.5
2.5
2019-09-30
14h35 +00:00
2019-09-30
14h35 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:vmware:vrealize_log_insight:2.5:*:*:*:*:*:*:*

Informations

Vendor

vmware

Product

vrealize_log_insight

Version

2.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-31703 2022-12-13 23h00 +00:00 The vRealize Log Insight contains a Directory Traversal Vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.
7.5
High
CVE-2022-31655 2022-07-12 18h44 +00:00 VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in alerts.
5.4
Medium
CVE-2022-31654 2022-07-12 18h43 +00:00 VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in configurations.
5.4
Medium
CVE-2020-3953 2020-04-15 15h20 +00:00 Cross Site Scripting (XSS) vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation.
4.8
Medium
CVE-2020-3954 2020-04-15 15h17 +00:00 Open Redirect vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation.
6.1
Medium
CVE-2016-5332 2016-08-30 23h00 +00:00 Directory traversal vulnerability in VMware vRealize Log Insight 2.x and 3.x before 3.6.0 allows remote attackers to read arbitrary files via unspecified vectors.
5.3
Medium
CVE-2016-2081 2016-07-02 23h00 +00:00 Cross-site scripting (XSS) vulnerability in VMware vRealize Log Insight 2.x and 3.x before 3.3.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
6.1
Medium
CVE-2016-2082 2016-07-02 23h00 +00:00 Cross-site request forgery (CSRF) vulnerability in VMware vRealize Log Insight 2.x and 3.x before 3.3.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
8.8
High