VMware

Vcenter Server

81 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 47.06%
  • Veröffentlicht 23.09.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:25

The vCenter Server contains a reverse proxy bypass vulnerability due to the way the endpoints handle the URI. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.

  • EPSS 0.14%
  • Veröffentlicht 23.09.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:24

The vCenter Server contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in vCenter Server Content Library. An authorised user with access to content library may exploit this issue by sending a POST request t...

  • EPSS 0.32%
  • Veröffentlicht 22.09.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:23

The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may...

  • EPSS 0.03%
  • Veröffentlicht 22.09.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:23

The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrat...

  • EPSS 1.49%
  • Veröffentlicht 26.05.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:49:22

The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins. A malicious actor with network acce...

Warnung Exploit
  • EPSS 94.41%
  • Veröffentlicht 26.05.2021 15:15:07
  • Zuletzt bearbeitet 30.10.2025 20:05:29

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exp...

Warnung
  • EPSS 90.34%
  • Veröffentlicht 24.02.2021 17:15:15
  • Zuletzt bearbeitet 30.10.2025 20:06:18

The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request ...

Warnung Exploit
  • EPSS 93.8%
  • Veröffentlicht 24.02.2021 17:15:15
  • Zuletzt bearbeitet 30.10.2025 20:06:27

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operatin...

  • EPSS 0.13%
  • Veröffentlicht 20.10.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:32:07

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioni...

  • EPSS 2.5%
  • Veröffentlicht 21.08.2020 13:15:14
  • Zuletzt bearbeitet 21.11.2024 05:32:05

VMware ESXi and vCenter Server contain a partial denial of service vulnerability in their respective authentication services. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3...