cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-5523,https://securityvulnerability.io/vulnerability/CVE-2019-5523,Remote Session Hijack in VMware vCloud Director Affects Tenant and Provider Portals,"VMware vCloud Director for Service Providers prior to version 9.5.0.3 is susceptible to a Remote Session Hijack vulnerability affecting both Tenant and Provider Portals. Exploitation of this flaw enables an unauthorized party to impersonate a currently logged-in user, potentially granting them access to sensitive information and functionalities within the portals. Users are advised to apply the necessary updates to mitigate risk.",Vmware,Vmware Vcloud Director For Service Providers (vcd),9.8,CRITICAL,0.010320000350475311,false,,false,false,false,,,false,false,,2019-04-01T17:11:35.000Z,0 CVE-2016-2076,https://securityvulnerability.io/vulnerability/CVE-2016-2076,,"Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.",Vmware,"Vcenter Server,Vcloud Director,Vcloud Automation Identity Appliance",7.6,HIGH,0.0037799999117851257,false,,false,false,false,,,false,false,,2016-04-15T14:00:00.000Z,0 CVE-2014-1211,https://securityvulnerability.io/vulnerability/CVE-2014-1211,,Cross-site request forgery (CSRF) vulnerability in VMware vCloud Director 5.1.x before 5.1.3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout.,Vmware,Vcloud Director,,,0.0019600000232458115,false,,false,false,false,,,false,false,,2014-01-17T19:00:00.000Z,0