Summary
Detail | |||
---|---|---|---|
Vendor | Vmware | First view | 2016-04-15 |
Product | Vcenter Server | Last view | 2023-10-25 |
Version | 5.5 | Type | Application |
Update | 3b | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:vmware:vcenter_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.3 | 2023-10-25 | CVE-2023-34056 | vCenter Server contains a partial information disclosure vulnerability. A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data. |
9.8 | 2023-10-25 | CVE-2023-34048 | vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution. |
7.5 | 2023-06-22 | CVE-2023-20896 | The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd). |
9.8 | 2023-06-22 | CVE-2023-20895 | The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication. |
9.8 | 2023-06-22 | CVE-2023-20894 | The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption. |
9.8 | 2023-06-22 | CVE-2023-20893 | The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server. |
9.8 | 2023-06-22 | CVE-2023-20892 | The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server. |
9.1 | 2022-10-07 | CVE-2022-31680 | The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server. |
7.5 | 2017-11-17 | CVE-2017-4928 | The flash-based vSphere Web Client (6.0 prior to 6.0 U3c and 5.5 prior to 5.5 U3f) i.e. not the new HTML5-based vSphere Client, contains SSRF and CRLF injection issues due to improper neutralization of URLs. An attacker may exploit these issues by sending a POST request with modified headers towards internal services leading to information disclosure. |
7.5 | 2017-11-17 | CVE-2017-4927 | VMware vCenter Server (6.5 prior to 6.5 U1 and 6.0 prior to 6.0 U3c) does not correctly handle specially crafted LDAP network packets which may allow for remote denial of service. |
7.7 | 2016-12-29 | CVE-2016-7459 | VMware vCenter Server 5.5 before U3e and 6.0 before U2a allows remote authenticated users to read arbitrary files via a (1) Log Browser, (2) Distributed Switch setup, or (3) Content Library XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. |
6.1 | 2016-08-07 | CVE-2016-5331 | CRLF injection vulnerability in VMware vCenter Server 6.0 before U2 and ESXi 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. |
7.6 | 2016-04-15 | CVE-2016-2076 | Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (4) | CWE-787 | Out-of-bounds Write |
8% (1) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
8% (1) | CWE-502 | Deserialization of Untrusted Data |
8% (1) | CWE-416 | Use After Free |
8% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
8% (1) | CWE-287 | Improper Authentication |
8% (1) | CWE-125 | Out-of-bounds Read |
8% (1) | CWE-93 | Failure to Sanitize CRLF Sequences ('CRLF Injection') |
8% (1) | CWE-90 | Failure to Sanitize Data into LDAP Queries ('LDAP Injection') |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-11-17 | Name: A virtualization management application installed on the remote host is affec... File: vmware_vcenter_vmsa-2017-0017.nasl - Type: ACT_GATHER_INFO |
2016-12-02 | Name: A virtualization management application installed on the remote host is affec... File: vmware_vcenter_vmsa-2016-0022.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: The remote VMware ESXi host is affected by multiple vulnerabilities. File: vmware_VMSA-2016-0010_remote.nasl - Type: ACT_GATHER_INFO |
2016-08-11 | Name: A virtualization management application installed on the remote host is affec... File: vmware_vcenter_vmsa-2016-0010.nasl - Type: ACT_GATHER_INFO |
2016-04-26 | Name: A virtualization management application installed on the remote host is affec... File: vmware_vcenter_vmsa-2016-0004.nasl - Type: ACT_GATHER_INFO |
2016-04-26 | Name: A virtualization appliance installed on the remote host is affected by a sess... File: vmware_vcloud_director_vmsa-2016-0004.nasl - Type: ACT_GATHER_INFO |