Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
51253 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
8426 |
89105 |
CVE-2011-1494 |
9.3 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Service Console and Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0001) (remote check) |
The remote VMware ESXi / ESX host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
libraries :
- COS kernel
- cURL
- python
- rpm |
Apply the appropriate patch according to the vendor advisory. |
https://www.vmware.com/security/advisories/VMSA-2012-0001.html |
ESX version : 4.0 Installed build : 208167 Fixed build : 660575 |
|
51669 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
8426 |
89680 |
CVE-2011-1494 |
7.9 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0012) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities in several
third-party components and libraries :
- Kernel
- krb5
- glibc
- mtp2sas
- mptsas
- mptspi |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 /
4.1 / 5.0. |
https://www.vmware.com/security/advisories/VMSA-2011-0012
http://lists.vmware.com/pipermail/security-announce/2012/000164.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 480973 |
|
56834 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
8426 |
89105 |
CVE-2011-1494 |
9.3 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Service Console and Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0001) (remote check) |
The remote VMware ESXi / ESX host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
libraries :
- COS kernel
- cURL
- python
- rpm |
Apply the appropriate patch according to the vendor advisory. |
https://www.vmware.com/security/advisories/VMSA-2012-0001.html |
ESX version : 4.0 Installed build : 208167 Fixed build : 660575 |
|
57250 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
8426 |
89680 |
CVE-2011-1494 |
7.9 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0012) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities in several
third-party components and libraries :
- Kernel
- krb5
- glibc
- mtp2sas
- mptsas
- mptspi |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 /
4.1 / 5.0. |
https://www.vmware.com/security/advisories/VMSA-2011-0012
http://lists.vmware.com/pipermail/security-announce/2012/000164.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 480973 |
|