Логотип exploitDog
bind:CVE-2021-21978
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-21978

Количество 3

Количество 3

nvd логотип

CVE-2021-21978

почти 5 лет назад

VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-cmcw-cw5c-rg22

больше 3 лет назад

VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2021-01600

почти 5 лет назад

Уязвимость веб-приложения logupload программного средства моделирования нагрузочного тестирования инфраструктуры виртуальных ПК VMware View Planner, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-21978

VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.

CVSS3: 9.8
91%
Критический
почти 5 лет назад
github логотип
GHSA-cmcw-cw5c-rg22

VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.

CVSS3: 9.8
91%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-01600

Уязвимость веб-приложения logupload программного средства моделирования нагрузочного тестирования инфраструктуры виртуальных ПК VMware View Planner, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
91%
Критический
почти 5 лет назад

Уязвимостей на страницу