Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware esx server 3.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2007-1270
Double free vulnerability in VMware ESX Server 3.0.0 and 3.0.1 allows malicious users to cause a denial of service (crash), obtain sensitive information, or possibly execute arbitrary code via unspecified vectors.
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Esx Server 3.0
7.2
CVSSv2
CVE-2008-2100
Multiple buffer overflows in VIX API 1.1.x prior to 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 up to and including 3.5 allow guest OS users to execute ...
Vmware Esx Server 3.5
Vmware Esxi 3.5
Vmware Fusion
Vmware Player
Vmware Esx 2.5.4
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Ace
Vmware Server
Vmware Workstation
Vmware Esx Server 3.0
Vmware Esx 2.5.5
Vmware Esx 3.5
8.5
CVSSv2
CVE-2010-1141
VMware Tools in VMware Workstation 6.5.x prior to 6.5.4 build 246459; VMware Player 2.5.x prior to 2.5.4 build 246459; VMware ACE 2.5.x prior to 2.5.4 build 246459; VMware Server 2.x prior to 2.0.2 build 203138; VMware Fusion 2.x prior to 2.0.6 build 246742; VMware ESXi 3.5 and 4...
Vmware Workstation 6.5.2
Vmware Workstation 6.5.3
Vmware Workstation 6.5.0
Vmware Workstation 6.5.1
Vmware Player 2.5.3
Vmware Player 2.5.1
Vmware Player 2.5.2
Vmware Player 2.5
Vmware Ace 2.5.2
Vmware Ace 2.5.0
Vmware Ace 2.5.1
Vmware Ace 2.5.3
Vmware Server 2.0.2
Vmware Server 2.0.1
Vmware Server 2.0.0
Vmware Fusion 3.0
Vmware Fusion 2.0.5
Vmware Fusion 2.0
Vmware Fusion 2.0.3
Vmware Fusion 2.0.4
Vmware Fusion 2.0.1
Vmware Fusion 2.0.2
8.5
CVSSv2
CVE-2010-1142
VMware Tools in VMware Workstation 6.5.x prior to 6.5.4 build 246459; VMware Player 2.5.x prior to 2.5.4 build 246459; VMware ACE 2.5.x prior to 2.5.4 build 246459; VMware Server 2.x prior to 2.0.2 build 203138; VMware Fusion 2.x prior to 2.0.6 build 246742; VMware ESXi 3.5 and 4...
Vmware Workstation 6.5.0
Vmware Workstation 6.5.3
Vmware Workstation 6.5.1
Vmware Workstation 6.5.2
Vmware Player 2.5
Vmware Player 2.5.3
Vmware Player 2.5.1
Vmware Player 2.5.2
Vmware Ace 2.5.3
Vmware Ace 2.5.0
Vmware Ace 2.5.1
Vmware Ace 2.5.2
Vmware Server 2.0.0
Vmware Server 2.0.2
Vmware Server 2.0.1
Vmware Fusion 2.0.5
Vmware Fusion 2.0
Vmware Fusion 3.0
Vmware Fusion 2.0.1
Vmware Fusion 2.0.2
Vmware Fusion 2.0.3
Vmware Fusion 2.0.4
4.3
CVSSv2
CVE-2008-3281
libxml2 2.6.32 and previous versions does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent malicious users to cause a denial of service (memory and CPU consumption) via a crafted XML document.
Xmlsoft Libxml2
Apple Safari
Apple Iphone Os
Fedoraproject Fedora 9
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 4.7
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Redhat Enterprise Linux Eus 5.2
Redhat Enterprise Linux Server 2.0
Redhat Enterprise Linux Workstation 2.0
4.3
CVSSv2
CVE-2009-2416
Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent malicious users to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, a...
Xmlsoft Libxml2 2.6.16
Xmlsoft Libxml2 2.6.32
Xmlsoft Libxml2 2.6.26
Xmlsoft Libxml2 2.6.27
Xmlsoft Libxml 1.8.17
Xmlsoft Libxml2 2.5.10
Fedoraproject Fedora 11
Fedoraproject Fedora 10
Debian Debian Linux 4.0
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 3.0
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Google Chrome
Apple Mac Os X
Apple Safari
Apple Mac Os X Server
Apple Iphone Os
Suse Linux Enterprise Server 9
4.3
CVSSv2
CVE-2009-3731
Multiple cross-site scripting (XSS) vulnerabilities in WebWorks Help 2.0 up to and including 5.0 in VMware vCenter 4.0 before Update 1 Build 208156; VMware Server 2.0.2; VMware ESX 4.0; VMware Lab Manager 2.x; VMware vCenter Lab Manager 3.x and 4.x prior to 4.0.1; VMware Stage Ma...
Webworks Epublisher 2009.2
Webworks Epublisher 2009.1
Webworks Epublisher 9.1
Webworks Epublisher 9.0
Webworks Publisher 7.0
Webworks Publisher 8.0
Webworks Epublisher 2008.4
Webworks Epublisher 2008.3
Webworks Help 2.0
Webworks Help 3.0
Webworks Epublisher 2008.2
Webworks Epublisher 2008.1
Webworks Help 4.0
Webworks Help 5.0
Webworks Epublisher 9.3
Webworks Epublisher 9.2
Webworks Publisher 2003
Webworks Publisher 6.0
Vmware Vcenter 4.0
Vmware Esx Server 4.0
Vmware Lab Manager 2.0
Vmware Stage Manager
5.9
CVSSv2
CVE-2009-2848
The execve function in the Linux kernel, possibly 2.6.30-rc6 and previous versions, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with ...
Linux Linux Kernel
Linux Linux Kernel 2.6.30
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Fedoraproject Fedora 11
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.04
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 3.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Workstation 5.0
Vmware Esx 4.0
Vmware Vma 4.0
6.9
CVSSv2
CVE-2009-3547
Multiple race conditions in fs/pipe.c in the Linux kernel prior to 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
Linux Linux Kernel 2.6.32
Linux Linux Kernel
Novell Linux Desktop 9
Opensuse Opensuse 11.0
Opensuse Opensuse 11.2
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 10
Vmware Esx 4.0
Vmware Vma 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
5 EDB exploits
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started