4 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

VMware Horizon DaaS (7.x and 8.x before 8.0.1 Update 1) contains a broken authentication vulnerability due to a flaw in the way it handled the first factor authentication. Successful exploitation of this issue may allow an attacker to bypass two-factor authentication process. In order to exploit this issue, an attacker must have a legitimate account on Horizon DaaS. VMware Horizon DaaS (versiones 7.x y versiones 8.x anteriores a 8.0.1 Update 1), contiene una vulnerabilidad de autenticación rota debido a un fallo en la manera en que manejaba la autenticación del primer factor. Una explotación con éxito de este problema puede permitir a un atacante omitir el proceso de autenticación de dos factores. • https://www.vmware.com/security/advisories/VMSA-2020-0021.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.8EPSS: 2%CPEs: 260EXPL: 0

OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. OpenSLP, como es usado en ESXi y los dispositivos Horizon DaaS, presenta un problema de sobrescritura de la pila. VMware ha evaluado la gravedad de este problema para estar en el rango de gravedad Crítica con una puntuación base máxima CVSSv3 de 9.8. A heap overflow vulnerability was found in OpenSLP. • http://www.openwall.com/lists/oss-security/2019/12/10/2 http://www.openwall.com/lists/oss-security/2019/12/11/2 http://www.vmware.com/security/advisories/VMSA-2019-0022.html https://access.redhat.com/errata/RHSA-2019:4240 https://access.redhat.com/errata/RHSA-2020:0199 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA3LYAJ2NRKMOZLZOQNDJ5TNQRFMWGHF https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPXXJZLPLAQU • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

VMware Horizon DaaS (7.x before 8.0.0) contains a broken authentication vulnerability that may allow an attacker to bypass two-factor authentication. Note: In order to exploit this issue, an attacker must have a legitimate account on Horizon DaaS. VMware Horizon DaaS (versiones 7.x anteriores a la 8.0.0) contiene una vulnerabilidad de autenticación rota que podría permitir que un atacante omita la autenticación de doble factor. Nota: para explotar este problema, un atacante debe tener una cuenta legítima en Horizon DaaS. • http://www.securityfocus.com/bid/103938 http://www.securitytracker.com/id/1040731 https://www.vmware.com/security/advisories/VMSA-2018-0010.html • CWE-287: Improper Authentication •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

VMware Horizon DaaS before 7.0.0 contains a vulnerability that exists due to insufficient validation of data. An attacker may exploit this issue by tricking DaaS client users into connecting to a malicious server and sharing all their drives and devices. Successful exploitation of this vulnerability requires a victim to download a specially crafted RDP file through DaaS client by clicking on a malicious link. Horizon DaaS anterior a versión 7.0.0 de VMware, contiene una vulnerabilidad que se presenta debido a la comprobación insuficiente de datos. Un atacante puede explotar este problema mediante el engaño a los usuarios del cliente DaaS para que se conecten a un servidor malicioso y compartan todas sus unidades y dispositivos. • http://www.securityfocus.com/bid/96559 http://www.securitytracker.com/id/1037951 http://www.vmware.com/security/advisories/VMSA-2017-0002.html • CWE-20: Improper Input Validation •