CVE-2024-37079
18.06.2024, 06:15
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.Enginsight
Vendor | Product | Version |
---|---|---|
vmware | vcenter_server | 8.0 |
vmware | vcenter_server | 8.0:a |
vmware | vcenter_server | 8.0:b |
vmware | vcenter_server | 8.0:c |
vmware | vcenter_server | 8.0:update1 |
vmware | vcenter_server | 8.0:update1a |
vmware | vcenter_server | 8.0:update1b |
vmware | vcenter_server | 8.0:update1c |
vmware | vcenter_server | 8.0:update1d |
vmware | vcenter_server | 8.0:update2 |
vmware | vcenter_server | 8.0:update2a |
vmware | vcenter_server | 8.0:update2b |
vmware | vcenter_server | 8.0:update2c |
vmware | vcenter_server | 7.0 |
vmware | vcenter_server | 7.0:a |
vmware | vcenter_server | 7.0:b |
vmware | vcenter_server | 7.0:c |
vmware | vcenter_server | 7.0:d |
vmware | vcenter_server | 7.0:update1 |
vmware | vcenter_server | 7.0:update1a |
vmware | vcenter_server | 7.0:update1c |
vmware | vcenter_server | 7.0:update1d |
vmware | vcenter_server | 7.0:update2 |
vmware | vcenter_server | 7.0:update2a |
vmware | vcenter_server | 7.0:update2b |
vmware | vcenter_server | 7.0:update2c |
vmware | vcenter_server | 7.0:update2d |
vmware | vcenter_server | 7.0:update3 |
vmware | vcenter_server | 7.0:update3a |
vmware | vcenter_server | 7.0:update3c |
vmware | vcenter_server | 7.0:update3d |
vmware | vcenter_server | 7.0:update3e |
vmware | vcenter_server | 7.0:update3f |
vmware | vcenter_server | 7.0:update3g |
vmware | vcenter_server | 7.0:update3h |
vmware | vcenter_server | 7.0:update3i |
vmware | vcenter_server | 7.0:update3j |
vmware | vcenter_server | 7.0:update3k |
vmware | vcenter_server | 7.0:update3l |
vmware | vcenter_server | 7.0:update3m |
vmware | vcenter_server | 7.0:update3n |
vmware | vcenter_server | 7.0:update3o |
vmware | vcenter_server | 7.0:update3p |
vmware | vcenter_server | 7.0 |
vmware | vcenter_server | 7.0:a |
vmware | vcenter_server | 7.0:b |
vmware | vcenter_server | 7.0:c |
vmware | vcenter_server | 7.0:d |
vmware | vcenter_server | 7.0:update1 |
vmware | vcenter_server | 7.0:update1a |
vmware | vcenter_server | 7.0:update1c |
vmware | vcenter_server | 7.0:update1d |
vmware | vcenter_server | 7.0:update2 |
vmware | vcenter_server | 7.0:update2a |
vmware | vcenter_server | 7.0:update2b |
vmware | vcenter_server | 7.0:update2c |
vmware | vcenter_server | 7.0:update2d |
vmware | vcenter_server | 7.0:update3 |
vmware | vcenter_server | 7.0:update3a |
vmware | vcenter_server | 7.0:update3c |
vmware | vcenter_server | 7.0:update3d |
vmware | vcenter_server | 7.0:update3e |
vmware | vcenter_server | 7.0:update3f |
vmware | vcenter_server | 7.0:update3g |
vmware | vcenter_server | 7.0:update3h |
vmware | vcenter_server | 7.0:update3i |
vmware | vcenter_server | 7.0:update3j |
vmware | vcenter_server | 7.0:update3k |
vmware | vcenter_server | 7.0:update3l |
vmware | vcenter_server | 7.0:update3m |
vmware | vcenter_server | 7.0:update3n |
vmware | vcenter_server | 7.0:update3o |
vmware | vcenter_server | 7.0:update3p |
vmware | vcenter_server | 8.0 |
vmware | vcenter_server | 8.0:a |
vmware | vcenter_server | 8.0:b |
vmware | vcenter_server | 8.0:c |
vmware | vcenter_server | 8.0:update1 |
vmware | vcenter_server | 8.0:update1a |
vmware | vcenter_server | 8.0:update1b |
vmware | vcenter_server | 8.0:update1c |
vmware | vcenter_server | 8.0:update1d |
vmware | vcenter_server | 8.0:update2 |
vmware | vcenter_server | 8.0:update2a |
vmware | vcenter_server | 8.0:update2b |
vmware | vcenter_server | 8.0:update2c |
𝑥
= Vulnerable software versions
Common Weakness Enumeration