Vulnerabilities (CVE)

Filtered by vendor Gigamon Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-0746 1 Gigamon 1 Gigavue-os 2024-11-21 N/A 6.3 MEDIUM
The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting.
CVE-2020-23250 1 Gigamon 1 Gigavue-os 2024-11-21 2.1 LOW 2.3 LOW
GigaVUE-OS (GVOS) 5.4 - 5.9 uses a weak algorithm for a hash stored in internal database.
CVE-2020-23249 1 Gigamon 1 Gigavue-os 2024-11-21 4.0 MEDIUM 4.7 MEDIUM
GigaVUE-OS (GVOS) 5.4 - 5.9 stores a Redis database password in plaintext.
CVE-2020-12252 1 Gigamon 1 Gigavue 2024-11-21 6.0 MEDIUM 6.2 MEDIUM
An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an arbitrary file upload for an authenticated user. If an executable file is uploaded into the www-root directory, then it could yield remote code execution via the filename parameter.
CVE-2020-12251 1 Gigamon 1 Gigavue 2024-11-21 3.5 LOW 2.2 LOW
An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an authenticated user to change the filename value (in the POST method) from the original filename to achieve directory traversal via a ../ sequence and, for example, obtain a complete directory listing of the machine.