This is a sample report from a vulnerability scan conducted against the NSX Manager.
Threat Reported :
The scanner was able to send specially crafted input to one or more endpoints and parameters on the remote host that resulted in an injection into a SQL query, allowing arbitrary SQL statements to be executed on the remote host.
Using the GET Method, Nessus found that :
The following resources may be vulnerable to blind SQL injection :" 'j_password' parameter of the /j_spring_security_check ".
VMware NSX
NSX Managers do not utilize SQL as a backing database for user logins and are therefore not vulnerable to this Tenable scan finding.