Логотип exploitDog
bind:CVE-2021-21985
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-21985

Количество 3

Количество 3

nvd логотип

CVE-2021-21985

больше 4 лет назад

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-rg6m-2r9v-c5fj

больше 3 лет назад

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2021-02848

больше 4 лет назад

Уязвимость модуля Virtual SAN Health Check программного обеспечения для управления гипервизором VMware vSphere Client (HTML5) позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-21985

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

CVSS3: 9.8
94%
Критический
больше 4 лет назад
github логотип
GHSA-rg6m-2r9v-c5fj

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

CVSS3: 9.8
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-02848

Уязвимость модуля Virtual SAN Health Check программного обеспечения для управления гипервизором VMware vSphere Client (HTML5) позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
94%
Критический
больше 4 лет назад

Уязвимостей на страницу