How to remediate – VMware ESX / ESXi Remotely Accessible Method Object Browser API 1. Introduction The VMware ESX / ESXi Remotely Accessible Method Object Browser API vulnerability allows unauthenticated remote attackers with valid...
How to remediate – VMware ESX / ESXi host Directory Configuration Files Informati… 1. Introduction The VMware ESX / ESXi host Directory Configuration Files Information Disclosure vulnerability allows unauthenticated access to sensitive configuration...
How to remediate – VMware Cloud Director Authentication Bypass (VMSA-2023-0026) 1. Introduction VMware Cloud Director Authentication Bypass (VMSA-2023-0026) is a security flaw in VMware’s cloud management platform. It allows an...
How to remediate – VMware Tools Detection (Mac OS X) 1. Introduction VMware Tools is a suite of utilities installed on virtual machines running Mac OS X. Its presence indicates...
How to remediate – VMware Tools Detection 1. Introduction VMware Tools Detection indicates that the VMware Tools application is installed on a Windows host. This suite improves...
How to remediate – VMWare STARTTLS Support 1. Introduction 2. Technical Explanation Scope: VMWare products supporting STARTTLS are affected. Specific versions depend on the product; check vendor...
How to remediate – VMware vCenter SOAP API Settings 1. Introduction The VMware vCenter SOAP API Settings plugin configures the credentials used for VMware checks via REST and SOAP...
How to remediate – vsftpd Smiley Face Backdoor 1. Introduction vsftpd Smiley Face Backdoor is a vulnerability in versions of vsftpd that have been compiled with a hidden...
How to remediate – VMware vCenter Legacy Data Collection 1. Introduction VMware vCenter Legacy Data Collection gathers all data from VMware vCenter using the SOAP APIs. This allows an...
How to remediate – VNC Server Unencrypted Communication Detection 1. Introduction A VNC server with unencrypted communication allows attackers to intercept sensitive data transmitted between the server and client....