Page 11 of 70 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

VMware vCenter Server (6.5 prior to 6.5 U1) contains an insecure library loading issue that occurs due to the use of LD_LIBRARY_PATH variable in an unsafe manner. Successful exploitation of this issue may allow unprivileged host users to load a shared library that may lead to privilege escalation. VMware vCenter Server en su versión 6.5 anterior a la 6.5 U1 tiene un problema de carga insegura de librerías que ocurre porque se utiliza la variable LD_LIBRARY_PATH de una manera no segura. Si se explota con éxito esta vulnerabilidad, podría permitir a los usuarios host sin privilegios cargar una librería compartida que pueda provocar un escalado de privilegios. • http://www.securityfocus.com/bid/100006 http://www.securitytracker.com/id/1039013 https://www.vmware.com/security/advisories/VMSA-2017-0013.html •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

VMware vCenter Server (6.5 prior to 6.5 U1) contains an information disclosure vulnerability. This issue may allow plaintext credentials to be obtained when using the vCenter Server Appliance file-based backup feature. VMware vCenter Server en su versión 6.5 anterior a la 6.5 U1 contiene una vulnerabilidad de fuga de información. Esta vulnerabilidad permite que se obtengan credenciales en texto plano cuando se utiliza la función de copia de seguridad de archivos de vCenter Server Appliance. • http://www.securityfocus.com/bid/99997 http://www.securitytracker.com/id/1039013 https://www.vmware.com/security/advisories/VMSA-2017-0013.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

VMware vCenter Server 5.5, 6.0, 6.5 allows vSphere users with certain, limited vSphere privileges to use the VIX API to access Guest Operating Systems without the need to authenticate. VMware vCenter Server versiones 5.5, 6.0, 6.5, permite a los usuarios de vSphere con ciertos privilegios de vSphere limitados usar la API VIX para acceder a los Sistemas Operativos Invitados sin la necesidad de autenticarse. • http://www.securityfocus.com/bid/100102 http://www.securitytracker.com/id/1039004 http://www.vmware.com/security/advisories/VMSA-2017-0012.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.7EPSS: 0%CPEs: 13EXPL: 0

VMware vCenter Server 5.5 before U3e and 6.0 before U2a allows remote authenticated users to read arbitrary files via a (1) Log Browser, (2) Distributed Switch setup, or (3) Content Library XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. VMware vCenter Server 5.5 en versiones anteriores a U3e y 6.0 en versiones anteriores a U2a permite a usuarios remotos autenticados leer archivos arbitrarios a través de un documento (1) Log Browser, (2) Distributed Switch setup, o (3) Content Library XML que contiene una declaración de entidad externa en conjunción con una referencia de entidad, relacionado con un problema XML External Entity (XXE). • http://www.securityfocus.com/bid/94486 http://www.securitytracker.com/id/1037329 http://www.vmware.com/security/advisories/VMSA-2016-0022.html • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

CRLF injection vulnerability in VMware vCenter Server 6.0 before U2 and ESXi 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Vulnerabilidad de inyección CRLF en VMware vCenter Server 6.0 en versiones anteriores a U2 y ESXi 6.0 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y llevar a cabo ataques de separación de respuestas HTTP a través de vectores no especificados. The SySS GmbH found out that the web server of VMware ESXi 6 is vulnerable to HTTP response injection attacks, as arbitrarily supplied URL parameters are copied in the HTTP header Location of the server response without sufficient input validation. Thus, an attacker can create a specially crafted URL with a specific URL parameter that injects attacker-controlled data to the response of the VMware ESXi web server. Depending on the context, this allows different attacks. • http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html http://seclists.org/fulldisclosure/2016/Aug/38 http://www.securityfocus.com/archive/1/539128/100/0/threaded http://www.securityfocus.com/bid/92324 http://www.securitytracker.com/id/1036543 http://www.securitytracker.com/id/1036544 http://www.securitytracker.com/id/1036545 http://www.vmware.com/security/advisories/VMSA-2016-0010.html • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') •