{"uuid": "349102e8-b5ba-4984-a83c-a645dc08ca39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34048", "type": "seen", "source": "https://t.me/KomunitiSiber/980", "content": "Act Now: VMware Releases Patch for Critical vCenter Server RCE Vulnerability\nhttps://thehackernews.com/2023/10/act-now-vmware-releases-patch-for.html\n\nVMware has released security updates to address a critical flaw in the vCenter Server that could result in remote code execution on affected systems.\nThe issue, tracked as\u00a0CVE-2023-34048\u00a0(CVSS score: 9.8), has been described as an out-of-bounds write vulnerability in the implementation of the\u00a0DCE/RPC protocol.\n\"A malicious actor with network access to vCenter Server may trigger an out-of-bounds", "creation_timestamp": "2023-10-25T13:14:53.000000Z"}