cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-5523,https://securityvulnerability.io/vulnerability/CVE-2019-5523,,VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session.,Vmware,Vmware Vcloud Director For Service Providers (vcd),9.8,CRITICAL,0.010320000350475311,false,false,false,false,,false,false,2019-04-01T17:11:35.000Z,0 CVE-2016-2076,https://securityvulnerability.io/vulnerability/CVE-2016-2076,,"Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.",Vmware,"Vcenter Server,Vcloud Director,Vcloud Automation Identity Appliance",7.6,HIGH,0.0037799999117851257,false,false,false,false,,false,false,2016-04-15T14:00:00.000Z,0 CVE-2014-1211,https://securityvulnerability.io/vulnerability/CVE-2014-1211,,Cross-site request forgery (CSRF) vulnerability in VMware vCloud Director 5.1.x before 5.1.3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout.,Vmware,Vcloud Director,,,0.0019600000232458115,false,false,false,false,,false,false,2014-01-17T19:00:00.000Z,0