Filtered by vendor Gigamon
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-0746 | 1 Gigamon | 1 Gigavue-os | 2024-02-04 | N/A | 6.1 MEDIUM |
The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting. | |||||
CVE-2020-23249 | 1 Gigamon | 1 Gigavue-os | 2024-02-04 | 4.0 MEDIUM | 4.7 MEDIUM |
GigaVUE-OS (GVOS) 5.4 - 5.9 stores a Redis database password in plaintext. | |||||
CVE-2020-23250 | 1 Gigamon | 1 Gigavue-os | 2024-02-04 | 2.1 LOW | 2.3 LOW |
GigaVUE-OS (GVOS) 5.4 - 5.9 uses a weak algorithm for a hash stored in internal database. | |||||
CVE-2020-12251 | 1 Gigamon | 1 Gigavue | 2024-02-04 | 3.5 LOW | 2.2 LOW |
An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an authenticated user to change the filename value (in the POST method) from the original filename to achieve directory traversal via a ../ sequence and, for example, obtain a complete directory listing of the machine. | |||||
CVE-2020-12252 | 1 Gigamon | 1 Gigavue | 2024-02-04 | 6.0 MEDIUM | 6.2 MEDIUM |
An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an arbitrary file upload for an authenticated user. If an executable file is uploaded into the www-root directory, then it could yield remote code execution via the filename parameter. |