Page 2 of 10 results (0.006 seconds)

CVSS: 7.6EPSS: 3%CPEs: 3EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 allows allows remote attackers to perform unauthorized actions as the administrator via URLs, as demonstrated using the setUsr operation to change a password. NOTE: this issue can be leveraged with CVE-2005-3619 to automatically perform the attacks. • http://kb.vmware.com/kb/2118366 http://secunia.com/advisories/21230 http://securitytracker.com/id?1016612 http://www.corsaire.com/advisories/c051114-001.txt http://www.securityfocus.com/archive/1/441726/100/100/threaded http://www.securityfocus.com/archive/1/441825/100/100/threaded http://www.vupen.com/english/advisories/2006/3075 •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 1

Cross-site scripting (XSS) vulnerability in the management interface for VMware ESX 2.5.x before 2.5.2 upgrade patch 2, 2.1.x before 2.1.2 upgrade patch 6, and 2.0.x before 2.0.1 upgrade patch 6 allows remote attackers to inject arbitrary web script or HTML via messages that are not sanitized when viewing syslog log files. • http://www.corsaire.com/advisories/c051114-002.txt http://www.securityfocus.com/archive/1/435610/100/0/threaded http://www.securityfocus.com/archive/1/435888/100/0/threaded •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

The management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges. • http://kb.vmware.com/kb/2118366 http://secunia.com/advisories/21230 http://www.corsaire.com/advisories/c051114-003.txt http://www.kb.cert.org/vuls/id/822476 http://www.securityfocus.com/archive/1/441727/100/100/threaded http://www.securityfocus.com/archive/1/441825/100/100/threaded http://www.securityfocus.com/bid/19249 http://www.vupen.com/english/advisories/2006/3075 https://exchange.xforce.ibmcloud.com/vulnerabilities/28112 •

CVSS: 4.9EPSS: 0%CPEs: 9EXPL: 0

The configuration of VMware ESX Server 2.x, 2.0.x, 2.1.x, and 2.5.x allows local users to cause a denial of service (shutdown) via the (1) halt, (2) poweroff, and (3) reboot scripts executed at the service console. • http://www.osvdb.org/21584 http://www.vmware.com/support/kb/enduser/std_adp.php?p_sid=dsxk%2ABWh&p_lva=&p_faqid=1817 •

CVSS: 4.3EPSS: 1%CPEs: 6EXPL: 1

Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x before 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS). • http://secunia.com/advisories/18250 http://securitytracker.com/id?1015422 http://www.osvdb.org/22119 http://www.securityfocus.com/bid/16086 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2001 http://www.vupen.com/english/advisories/2005/3084 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •