Show filters
121 Total Results
Displaying 51-60 of 121
Sort by:
Attacker Value
Unknown
CVE-2021-22010
Disclosure Date: September 23, 2021 (last updated October 07, 2023)
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.
0
Attacker Value
Unknown
CVE-2021-21993
Disclosure Date: September 23, 2021 (last updated October 07, 2023)
The vCenter Server contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in vCenter Server Content Library. An authorised user with access to content library may exploit this issue by sending a POST request to vCenter Server leading to information disclosure.
0
Attacker Value
Unknown
CVE-2021-22012
Disclosure Date: September 23, 2021 (last updated October 07, 2023)
The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
0
Attacker Value
Unknown
CVE-2021-21992
Disclosure Date: September 22, 2021 (last updated October 07, 2023)
The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service condition on the vCenter Server host.
0
Attacker Value
Unknown
CVE-2021-21991
Disclosure Date: September 22, 2021 (last updated October 07, 2023)
The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).
0
Attacker Value
Unknown
CVE-2021-26584
Disclosure Date: June 03, 2021 (last updated October 07, 2023)
A security vulnerability in HPE OneView for VMware vCenter (OV4VC) could be exploited remotely to allow Cross-Site Scripting. HPE has released the following software update to resolve the vulnerability in HPE OneView for VMware vCenter (OV4VC).
0
Attacker Value
Unknown
CVE-2021-26987
Disclosure Date: March 15, 2021 (last updated October 07, 2023)
Element Plug-in for vCenter Server incorporates SpringBoot Framework. SpringBoot Framework versions prior to 1.3.2 are susceptible to a vulnerability which when successfully exploited could lead to Remote Code Execution. All versions of Element Plug-in for vCenter Server, Management Services versions prior to 2.17.56 and Management Node versions through 12.2 contain vulnerable versions of SpringBoot Framework.
0
Attacker Value
Unknown
CVE-2020-28972
Disclosure Date: February 27, 2021 (last updated November 01, 2023)
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
0
Attacker Value
Unknown
CVE-2021-21973
Disclosure Date: February 24, 2021 (last updated February 16, 2024)
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
0
Attacker Value
Unknown
CVE-2020-3994
Disclosure Date: October 20, 2020 (last updated October 07, 2023)
VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.
0