Last week, VMware released security updates for vCenter Server in response to a number of memory corruption vulnerabilities in the DCERPC protocol implementation. When exploited, the bugs could allow an attacker to execute code or bypass authentication, which could compromise confidential data and seriously disrupt operations. We have added a new report to Lansweeper to help you find any vulnerable installs. You can find it in the vulnerability blog post.