class Risu::Parsers::Nessus::PostProcess::VMwareVCenter
Public Class Methods
new()
click to toggle source
# File lib/risu/parsers/nessus/postprocess/vmware_vcenter.rb, line 29 def initialize @info = { :description => "VMware vCenter Patch Rollup", :plugin_id => -99979, :plugin_name => "Missing the latest VMware vCenter Patches", :item_name => "Update to the latest VMware vCenter", :plugin_ids => [ 79865, 66274, 66806, 70612, 77728, 65209, 65223, 76457, 83186, 81146, 79147, 86255, 66812, 87763, 90710, 91322, 87592, 92870, 91713, #VMware vCenter Server 5.0.x < 5.0u3g / 5.1.x < 5.1u3d / 5.5.x < 5.5u2d Reflected XSS (VMSA-2016- 0009) 76947, #VMware vCenter Converter Multiple Vulnerabilities (VMSA-2014-0006) 99475, #VMware vCenter Server 6.0.x < 6.0u3b / 6.5.x < 6.5c BlazeDS AMF3 RCE (VMSA-2017-0007) 104654, #VMware vCenter Server 5.5.x < 5.5u3f / 6.0.x < 6.0u3c / 6.5.x < 6.5u1 Multiple Vulnerabilities (VMSA- 2017-0017) 86124, #VMware vCenter 5.5 LDAP Certificate Validation MitM Spoofing (VMSA-2015-0006) 95468, #VMware vCenter Server 5.5.x < 5.5u3e / 6.0.x < 6.0u2a Multiple XXE Vulnerabilities (VMSA-2016-0022) 105784, #VMware vCenter Server 5.5.x < 5.5U3g / 6.0.x < 6.0U3d / 6.5.x < 6.5U1e Hypervisor-Assisted Guest Remediation (VMSA-2018-0004) (Spectre) 111760, #VMware vCenter Server 5.5.x / 6.0.x / 6.5.x / 6.7.x Speculative Execution Side Channel Vulnerability (Foreshadow) (VMSA-2018-0020) 79864, #VMware vCenter Update Manager Multiple Java Vulnerabilities (VMSA-2014-0012) ] } end