2 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 0

VMware vFabric tc Server (aka SpringSource tc Server) 2.0.x before 2.0.6.RELEASE and 2.1.x before 2.1.2.RELEASE accepts obfuscated passwords during JMX authentication, which makes it easier for context-dependent attackers to obtain access by leveraging an ability to read stored passwords. VMware vFabric tc Server (también conocido como SpringSource tc Server) v2.0.x anterior a v2.0.6.RELEASE y v2.1.x anterior a v2.1.2.RELEASE acepta passwords ofuscados durante la autenticación JMX, lo que hace más fácil para atacantes dependientes del contexto obtener acceso mediante la lectura contraseñas almacenadas. • http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0122.html http://securitytracker.com/id?1025923 http://www.securityfocus.com/bid/49122 http://www.springsource.com/security/cve-2011-0527 https://exchange.xforce.ibmcloud.com/vulnerabilities/69156 • CWE-287: Improper Authentication •

CVSS: 6.8EPSS: 1%CPEs: 7EXPL: 0

com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce the requirement for an encrypted (aka s2enc) password, which allows remote attackers to obtain JMX interface access via a blank password. Vulnerabilidad en el componente com.springsource.tcserver.serviceability.rmi.JmxSocketListener de VMware SpringSource tc Server Runtime v6.0.19, v6.0.20 anteriores a v6.0.20.D y v6.0.25.A anteriores a v6.0.25.A-SR01, no hace cumplir correctamente el requisito de contraseña cifrada (también conocido como s2enc), que permite a atacantes remotos obtener acceso al interfaz JMX a través de una contraseña vacía. • http://secunia.com/advisories/39778 http://www.securityfocus.com/archive/1/511307/100/0/threaded http://www.securityfocus.com/bid/40205 http://www.springsource.com/security/cve-2010-1454 https://exchange.xforce.ibmcloud.com/vulnerabilities/58684 • CWE-287: Improper Authentication •