#Vcenter 6.5 migrate multiple vm code
An authenticated VAMI user with network access to port 5480 on vCenter Server may exploit this issue to execute code on the underlying operating system that hosts vCenter Server.A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.
A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.A malicious actor with network access to port 443 on vCenter Server may exploit this issue to perform unauthenticated VM network setting manipulation.A malicious actor with network access to port 443 on vCenter Server may exploit this issue to access restricted endpoints.A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash).A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.Details of these vulnerabilities are as follows: Multiple vulnerabilities have been discovered in VMware vCenter Server, which could result in remote code execution. Large and medium business entities: HIGH.Large and medium government entities: HIGH.