Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware esx server 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-5973
VMware ESXi 4.0 up to and including 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp ...
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 4.1
Vmware Esxi 5.1
NA
CVE-2013-1661
VMware ESXi 4.0 up to and including 5.1, and ESX 4.0 and 4.1, does not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle malicious users to cause a denial of service (unhandled exception and application crash) by modifying the client-server d...
Vmware Esx 4.1
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esx 4.0
Vmware Esxi 4.1
Vmware Esxi 5.1
NA
CVE-2013-1659
VMware vCenter Server 4.0 before Update 4b, 5.0 before Update 2, and 5.1 prior to 5.1.0b; VMware ESXi 3.5 up to and including 5.1; and VMware ESX 3.5 up to and including 4.1 do not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle malicious u...
Vmware Vcenter Server 4.0
Vmware Vcenter Server Appliance 5.1.0a
Vmware Vcenter Server Appliance 5.1
Vmware Vcenter Server 5.0
Vmware Esxi 5.1
Vmware Esxi 5.0
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
NA
CVE-2013-1405
VMware vCenter Server 4.0 before Update 4b and 4.1 before Update 3a, VMware VirtualCenter 2.5, VMware vSphere Client 4.0 before Update 4b and 4.1 before Update 3a, VMware VI-Client 2.5, VMware ESXi 3.5 up to and including 4.1, and VMware ESX 3.5 up to and including 4.1 do not pro...
Vmware Vcenter Server 4.1
Vmware Vcenter Server 4.0
Vmware Virtualcenter 2.5
Vmware Vsphere Client 4.0
Vmware Vsphere Client 4.1
Vmware Vi-client 2.5
Vmware Esxi 3.5
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esx 3.5
Vmware Esx 4.0
Vmware Esx 4.1
NA
CVE-2010-3609
The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote malicious users to cause a denial of service (infinite loop) via...
Vmware Esxi 4.0
Openslp Openslp 1.2.1
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esxi 4.1
1 EDB exploit
NA
CVE-2010-4297
The VMware Tools update functionality in VMware Workstation 6.5.x prior to 6.5.5 build 328052 and 7.x prior to 7.1.2 build 301548; VMware Player 2.5.x prior to 2.5.5 build 328052 and 3.1.x prior to 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x prior to 2.0.8 build 32...
Vmware Workstation 6.5.0
Vmware Workstation 7.1.2
Vmware Workstation 6.5.5
Vmware Workstation 7.1
Vmware Workstation 7.0.1
Vmware Workstation 6.5.3
Vmware Workstation 6.5.2
Vmware Workstation 6.5.1
Vmware Workstation 7.0
Vmware Workstation 7.1.1
Vmware Player 3.1
Vmware Player 2.5.5
Vmware Player 2.5.3
Vmware Player 2.5
Vmware Player 2.5.4
Vmware Player 3.1.1
Vmware Player 3.1.2
Vmware Player 2.5.1
Vmware Player 2.5.2
Vmware Fusion 2.0.6
Vmware Fusion 2.0
Vmware Fusion 2.0.1
1 EDB exploit
7.8
CVSSv3
CVE-2010-3081
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel prior to 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveragin...
Linux Linux Kernel 2.6.36
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
1 EDB exploit
1 Github repository
5.5
CVSSv3
CVE-2010-2942
The actions implementation in the network queueing functionality in the Linux kernel prior to 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory...
Linux Linux Kernel 2.6.36
Linux Linux Kernel
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Opensuse Opensuse 11.1
Opensuse Opensuse 11.3
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
Avaya Aura System Manager 6.0
Avaya Aura System Manager 5.2
Avaya Aura Communication Manager 5.2
Avaya Voice Portal 5.1
Avaya Voice Portal 5.0
Avaya Aura System Platform 1.1
Avaya Aura System Platform 6.0
Avaya Aura System Manager 6.1
5.5
CVSSv3
CVE-2010-3078
The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel prior to 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
Linux Linux Kernel 2.6.36
Linux Linux Kernel
Opensuse Opensuse 11.1
Opensuse Opensuse 11.3
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Vmware Esx 4.1
Vmware Esx 4.0
5.5
CVSSv3
CVE-2010-2066
The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel prior to 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »