Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-2342 | First vendor Publication | 2015-10-12 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2342 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Oracle Java JMX server insecure configuration remote code execution attempt RuleID : 36532 - Revision : 2 - Type : SERVER-OTHER |
2014-01-10 | Oracle Java RMI services remote object execution attempt RuleID : 21268 - Revision : 6 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-05-25 | Name : A virtualization management application installed on the remote host is affec... File : vmware_vcenter_vmsa-2016-0005.nasl - Type : ACT_GATHER_INFO |
2015-11-19 | Name : The remote VMware ESXi host is affected by a remote code execution vulnerabil... File : vmware_esxi_5_0_build_3021432_remote.nasl - Type : ACT_GATHER_INFO |
2015-11-19 | Name : The remote VMware ESXi host is affected by a remote code execution vulnerabil... File : vmware_esxi_5_1_build_3021178_remote.nasl - Type : ACT_GATHER_INFO |
2015-11-19 | Name : The remote VMware ESXi host is affected by a remote code execution vulnerabil... File : vmware_esxi_5_5_build_3029944_remote.nasl - Type : ACT_GATHER_INFO |
2015-10-03 | Name : The remote VMware ESXi host is missing a security-related patch. File : vmware_VMSA-2015-0007.nasl - Type : ACT_GATHER_INFO |
2015-10-02 | Name : The remote host has a virtualization management application installed that is... File : vmware_vcenter_vmsa-2015-0007.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:46:18 |
|
2024-08-02 12:32:24 |
|
2024-08-02 01:09:37 |
|
2024-02-02 01:31:26 |
|
2024-02-01 12:09:13 |
|
2023-09-05 12:29:52 |
|
2023-09-05 01:09:05 |
|
2023-09-02 12:29:49 |
|
2023-09-02 01:09:14 |
|
2023-08-12 12:32:33 |
|
2023-08-12 01:08:43 |
|
2023-08-11 12:27:54 |
|
2023-08-11 01:08:57 |
|
2023-08-06 12:27:06 |
|
2023-08-06 01:08:42 |
|
2023-08-04 12:27:11 |
|
2023-08-04 01:08:46 |
|
2023-07-14 12:27:11 |
|
2023-07-14 01:08:44 |
|
2023-03-29 01:28:56 |
|
2023-03-28 12:09:04 |
|
2022-10-11 12:24:29 |
|
2022-10-11 01:08:52 |
|
2021-05-04 12:38:55 |
|
2021-04-22 01:47:41 |
|
2020-07-14 12:11:46 |
|
2020-05-23 13:17:07 |
|
2020-05-23 00:44:43 |
|
2018-08-12 09:19:01 |
|
2016-12-08 09:23:41 |
|
2015-10-20 21:22:06 |
|
2015-10-20 16:20:12 |
|
2015-10-13 21:23:43 |
|
2015-10-12 17:22:56 |
|