Cpe Name:
cpe:2.3:a:vmware:vrealize_log_insight:*:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-22035 |
74 |
|
|
2021-10-13 |
2021-10-20 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
VMware vRealize Log Insight (8.x prior to 8.6) contains a CSV(Comma Separated Value) injection vulnerability in interactive analytics export function. An authenticated malicious actor with non-administrative privileges may be able to embed untrusted data prior to exporting a CSV sheet through Log Insight which could be executed in user's environment. |
2 |
CVE-2021-22021 |
79 |
|
XSS |
2021-08-30 |
2021-09-02 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
VMware vRealize Log Insight (8.x prior to 8.4) contains a Cross Site Scripting (XSS) vulnerability due to improper user input validation. An attacker with user privileges may be able to inject a malicious payload via the Log Insight UI which would be executed when the victim accesses the shared dashboard link. |
3 |
CVE-2020-3954 |
601 |
|
|
2020-04-15 |
2021-07-21 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
Open Redirect vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation. |
4 |
CVE-2020-3953 |
79 |
|
XSS |
2020-04-15 |
2021-07-21 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Cross Site Scripting (XSS) vulnerability exists in VMware vRealize Log Insight prior to 8.1.0 due to improper Input validation. |
5 |
CVE-2018-6980 |
863 |
|
|
2018-11-13 |
2019-10-03 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
VMware vRealize Log Insight (4.7.x before 4.7.1 and 4.6.x before 4.6.2) contains a vulnerability due to improper authorization in the user registration method. Successful exploitation of this issue may allow Admin users with view only permission to perform certain administrative functions which they are not allowed to perform. |
Total number of vulnerabilities :
5
Page :
1
(This Page)