CVE-2022-22966
- EPSS 8.49%
- Veröffentlicht 14.04.2022 21:15:08
- Zuletzt bearbeitet 21.11.2024 06:47:42
An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server.
CVE-2020-3956
- EPSS 69.57%
- Veröffentlicht 20.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:32:02
VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traf...
CVE-2019-5523
- EPSS 0.69%
- Veröffentlicht 01.04.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:45:06
VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Pr...
CVE-2016-2076
- EPSS 0.44%
- Veröffentlicht 15.04.2016 14:59:10
- Zuletzt bearbeitet 12.04.2025 10:46:40
Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hija...
CVE-2014-1211
- EPSS 0.3%
- Veröffentlicht 17.01.2014 21:55:19
- Zuletzt bearbeitet 11.04.2025 00:51:21
Cross-site request forgery (CSRF) vulnerability in VMware vCloud Director 5.1.x before 5.1.3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout.