Lucene search

K
VmwareVcloud Director

5 matches found

CVE
CVE
added 2020/05/20 2:15 p.m.186 views

CVE-2020-3956

VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to ar...

8.8CVSS8.8AI score0.69565EPSS
CVE
CVE
added 2022/04/14 9:15 p.m.115 views

CVE-2022-22966

An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server.

7.2CVSS7.4AI score0.05483EPSS
CVE
CVE
added 2016/04/15 2:59 p.m.49 views

CVE-2016-2076

Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.

7.6CVSS7.2AI score0.0044EPSS
CVE
CVE
added 2019/04/01 6:29 p.m.42 views

CVE-2019-5523

VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logge...

9.8CVSS9.4AI score0.00685EPSS
CVE
CVE
added 2014/01/17 9:55 p.m.39 views

CVE-2014-1211

Cross-site request forgery (CSRF) vulnerability in VMware vCloud Director 5.1.x before 5.1.3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout.

6.8CVSS7.2AI score0.00297EPSS