Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware vrealize operations vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2020-3943
vRealize Operations for Horizon Adapter (6.7.x before 6.7.1 and 6.6.x before 6.6.1) uses a JMX RMI service which is not securely configured. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to execute ...
Vmware Vrealize Operations
5
CVSSv2
CVE-2020-3944
vRealize Operations for Horizon Adapter (6.7.x before 6.7.1 and 6.6.x before 6.6.1) has an improper trust store configuration leading to authentication bypass. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may ...
Vmware Vrealize Operations
5
CVSSv2
CVE-2020-3945
vRealize Operations for Horizon Adapter (6.7.x before 6.7.1 and 6.6.x before 6.6.1) contains an information disclosure vulnerability due to incorrect pairing implementation between the vRealize Operations for Horizon Adapter and Horizon View. An unauthenticated remote attacker wh...
Vmware Vrealize Operations
7.2
CVSSv2
CVE-2018-6978
vRealize Operations (7.x prior to 7.0.0.11287810, 6.7.x prior to 6.7.0.11286837 and 6.6.x prior to 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit...
Vmware Vrealize Operations
7.2
CVSSv2
CVE-2017-4946
The VMware V4H and V4PA desktop agents (6.x prior to 6.5.1) contain a privilege escalation vulnerability. Successful exploitation of this issue could result in a low privileged windows user escalating their privileges to SYSTEM.
Vmware Vrealize Operations For Published Applications
Vmware Vrealize Operations For Horizon
8
CVSSv2
CVE-2016-7457
VMware vRealize Operations (aka vROps) 6.x prior to 6.4.0 allows remote authenticated users to gain privileges, or halt and remove virtual machines, via unspecified vectors.
Vmware Vrealize Operations 6.2.1
Vmware Vrealize Operations 6.3.0
Vmware Vrealize Operations 6.0.0
Vmware Vrealize Operations 6.1.0
Vmware Vrealize Operations 6.2.0a
7.5
CVSSv2
CVE-2016-7462
The Suite REST API in VMware vRealize Operations (aka vROps) 6.x prior to 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
Vmware Vrealize Operations 6.2.1
Vmware Vrealize Operations 6.3.0
Vmware Vrealize Operations 6.1.0
Vmware Vrealize Operations 6.2.0a
Vmware Vrealize Operations 6.0.0
7.5
CVSSv2
CVE-2015-6934
Serialized-object interfaces in VMware vRealize Orchestrator 6.x, vCenter Orchestrator 5.x, vRealize Operations 6.x, vCenter Operations 5.x, and vCenter Application Discovery Manager (vADM) 7.x allow remote malicious users to execute arbitrary commands via a crafted serialized Ja...
Vmware Vrealize Orchestrator 6.0.2
Vmware Vcenter Orchestrator 5.5.2.1
Vmware Vcenter Orchestrator 5.5.2
Vmware Vcenter Orchestrator 5.5.1
Vmware Vcenter Orchestrator 5.5
Vmware Vrealize Orchestrator 6.0.1
Vmware Vrealize Orchestrator 6.0.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4