Download
| Alert*
oval:org.secpod.oval:def:36766
VMware vSphere Client is installed oval:org.secpod.oval:def:36769 The host is installed with VMware vSphere Client 5.0 before Update 3 or 5.1 before Update 2 and is prone to a SSL servers spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL ... oval:org.secpod.oval:def:36765 The host is installed with VMware vSphere Client 4.1 before Update 2 or 5.0 before Update 1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted log-file entry. Successful exploitation allows remote attackers to inject arbitrary ... oval:org.secpod.oval:def:36768 The host is installed with VMware vSphere Client 5.0 before Update 3 or 5.1 before Update 2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to trigger the downl ... oval:org.secpod.oval:def:36767 The host is installed with VMware vSphere Client 4.0 before Update 4b or 4.1 before Update 3a and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to trigger the dow ... oval:org.secpod.oval:def:38127 The host is installed with VMware vSphere Client 5.5 before Update 3e or 6.0 before Update 2a and is prone to a XML External Entity vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation can lead to information disclosure. |