[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:36766
VMware vSphere Client is installed

oval:org.secpod.oval:def:36769
The host is installed with VMware vSphere Client 5.0 before Update 3 or 5.1 before Update 2 and is prone to a SSL servers spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL ...

oval:org.secpod.oval:def:36765
The host is installed with VMware vSphere Client 4.1 before Update 2 or 5.0 before Update 1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted log-file entry. Successful exploitation allows remote attackers to inject arbitrary ...

oval:org.secpod.oval:def:36768
The host is installed with VMware vSphere Client 5.0 before Update 3 or 5.1 before Update 2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to trigger the downl ...

oval:org.secpod.oval:def:36767
The host is installed with VMware vSphere Client 4.0 before Update 4b or 4.1 before Update 3a and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to trigger the dow ...

oval:org.secpod.oval:def:38127
The host is installed with VMware vSphere Client 5.5 before Update 3e or 6.0 before Update 2a and is prone to a XML External Entity vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation can lead to information disclosure.

*CPE
cpe:/a:vmware:vsphere_client

© SecPod Technologies