CVE-2016-5332

Directory traversal vulnerability in VMware vRealize Log Insight 2.x and 3.x before 3.6.0 allows remote attackers to read arbitrary files via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:vrealize_log_insight:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_log_insight:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_log_insight:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_log_insight:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_log_insight:3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/92448 - () http://www.securityfocus.com/bid/92448 -
References () http://www.securitytracker.com/id/1036619 - () http://www.securitytracker.com/id/1036619 -
References () http://www.vmware.com/security/advisories/VMSA-2016-0011.html - Patch, Vendor Advisory () http://www.vmware.com/security/advisories/VMSA-2016-0011.html - Patch, Vendor Advisory

Information

Published : 2016-08-31 01:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-5332

Mitre link : CVE-2016-5332

CVE.ORG link : CVE-2016-5332


JSON object : View

Products Affected

vmware

  • vrealize_log_insight
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')