CVE-2012-6325
https://notcve.org/view.php?id=CVE-2012-6325
VMware vCenter Server Appliance (vCSA) 5.0 before Update 2 does not properly parse XML documents, which allows remote authenticated users to read arbitrary files via unspecified vectors. VMware vCenter Server Appliance (vCSA) v5.0 anteriores a Update 2 no analiza correctamente la sintaxis de los documentos XML, permitiendo que usuarios remotos autenticados accedan a ficheros de su elección mediante vectores de ataque no especificados. • http://www.vmware.com/security/advisories/VMSA-2012-0018.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2012-5978
https://notcve.org/view.php?id=CVE-2012-5978
Multiple directory traversal vulnerabilities in the (1) View Connection Server and (2) View Security Server in VMware View 4.x before 4.6.2 and 5.x before 5.1.2 allow remote attackers to read arbitrary files via unspecified vectors. Múltiples vulnerabilidades de salto de directorio en (1) View Connection Server y (2) View Security Server en VMware View v4.x antes de v4.6.2 y v5.x antes de v5.1.2 permiten a atacantes remotos leer archivos de su elección a través de vectores no especificados. • http://www.securitytracker.com/id?1027875 http://www.vmware.com/security/advisories/VMSA-2012-0017.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17049 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2012-5055 – Security: Ability to determine if username is valid via DaoAuthenticationProvider
https://notcve.org/view.php?id=CVE-2012-5055
DaoAuthenticationProvider in VMware SpringSource Spring Security before 2.0.8, 3.0.x before 3.0.8, and 3.1.x before 3.1.3 does not check the password if the user is not found, which makes the response delay shorter and might allow remote attackers to enumerate valid usernames via a series of login requests. DaoAuthenticationProvider en VMware SpringSource Spring Security antes de v2.0.8, v3.0.x antes de v3.0.8, y v3.1.x antes de v3.1.3 no comprueba la contraseña si el usuario no se encuentra, lo que hace que la respuesta de retardo sea menor y podría permitir a atacantes remotos para enumerar los nombres de usuario válidos a través de una serie de solicitudes de inicio de sesión. • http://support.springsource.com/security/CVE-2012-5055 https://access.redhat.com/security/cve/CVE-2012-5055 https://bugzilla.redhat.com/show_bug.cgi?id=886031 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2009-2899
https://notcve.org/view.php?id=CVE-2009-2899
The monitor perl script in the Sybase database plug-in in SpringSource Hyperic HQ before 4.3 allows local users to obtain the database password by listing the process and its arguments. El script en perl monitor en el plugin de base de datos Sybase en SpringSource Hyperic HQ anterior a v4.3 permite a usuarios locales obtener la contraseña de la base de datos mediante el listado de procesos y sus argumentos • http://communities.vmware.com/thread/348773 http://support.springsource.com/security/CVE-2009-2899 https://jira.hyperic.com/browse/HHQ-1031 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2012-5703
https://notcve.org/view.php?id=CVE-2012-5703
The vSphere API in VMware ESXi 4.1 and ESX 4.1 allows remote attackers to cause a denial of service (host daemon crash) via an invalid value in a (1) RetrieveProp or (2) RetrievePropEx SOAP request. La API vSphere en VMware ESXi v4.1 y ESX v4.1 permite a atacantes remotos provocar una denegación de servicio (caída de demonio de host) a través de un valor no válido en una solicitud SOAP (1) RetrieveProp o (2) RetrievePropEx. • http://www.coresecurity.com/content/vmware-esx-input-validation-error http://www.securityfocus.com/bid/56571 http://www.securitytracker.com/id?1027782 http://www.vmware.com/security/advisories/VMSA-2012-0016.html • CWE-20: Improper Input Validation •