Описание
VI Client in VMware VirtualCenter before 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_virtualcenter:1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_virtualcenter:1.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_virtualcenter:1.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_virtualcenter:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_virtualcenter:1.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_virtualcenter:1.4.1:*:*:*:*:*:*:*
EPSS
Процентиль: 17%
0.00054
Низкий
2.1 Low
CVSS2
Дефекты
CWE-200
Связанные уязвимости
github
больше 3 лет назад
VI Client in VMware VirtualCenter before 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
EPSS
Процентиль: 17%
0.00054
Низкий
2.1 Low
CVSS2
Дефекты
CWE-200