Show filters
121 Total Results
Displaying 51-60 of 121
Sort by:
Attacker Value
Unknown

CVE-2021-22010

Disclosure Date: September 23, 2021 (last updated October 07, 2023)
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.
Attacker Value
Unknown

CVE-2021-21993

Disclosure Date: September 23, 2021 (last updated October 07, 2023)
The vCenter Server contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in vCenter Server Content Library. An authorised user with access to content library may exploit this issue by sending a POST request to vCenter Server leading to information disclosure.
Attacker Value
Unknown

CVE-2021-22012

Disclosure Date: September 23, 2021 (last updated October 07, 2023)
The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
Attacker Value
Unknown

CVE-2021-21992

Disclosure Date: September 22, 2021 (last updated October 07, 2023)
The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service condition on the vCenter Server host.
Attacker Value
Unknown

CVE-2021-21991

Disclosure Date: September 22, 2021 (last updated October 07, 2023)
The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).
Attacker Value
Unknown

CVE-2021-26584

Disclosure Date: June 03, 2021 (last updated October 07, 2023)
A security vulnerability in HPE OneView for VMware vCenter (OV4VC) could be exploited remotely to allow Cross-Site Scripting. HPE has released the following software update to resolve the vulnerability in HPE OneView for VMware vCenter (OV4VC).
Attacker Value
Unknown

CVE-2021-26987

Disclosure Date: March 15, 2021 (last updated October 07, 2023)
Element Plug-in for vCenter Server incorporates SpringBoot Framework. SpringBoot Framework versions prior to 1.3.2 are susceptible to a vulnerability which when successfully exploited could lead to Remote Code Execution. All versions of Element Plug-in for vCenter Server, Management Services versions prior to 2.17.56 and Management Node versions through 12.2 contain vulnerable versions of SpringBoot Framework.
Attacker Value
Unknown

CVE-2020-28972

Disclosure Date: February 27, 2021 (last updated November 01, 2023)
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
Attacker Value
Unknown

CVE-2021-21973

Disclosure Date: February 24, 2021 (last updated February 16, 2024)
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
Attacker Value
Unknown

CVE-2020-3994

Disclosure Date: October 20, 2020 (last updated October 07, 2023)
VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.