Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware esxi 4.1 vulnerabilities and exploits
(subscribe to this query)
9.9
CVSSv3
CVE-2012-1516
The VMX process in VMware ESXi 3.5 up to and including 4.1 and ESX 3.5 up to and including 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS vi...
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
9.8
CVSSv3
CVE-2010-0211
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote malicious users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with a...
Openldap Openldap 2.4.22
Vmware Esxi 4.1
Vmware Esxi 4.0
Opensuse Opensuse 11.0
Apple Mac Os X Server
Apple Mac Os X
1 EDB exploit
5.6
CVSSv3
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
5.3
CVSSv3
CVE-2022-31698
The vCenter Server contains a denial-of-service vulnerability in the content library service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to trigger a denial-of-service condition by sending a specially crafted header.
Vmware Vcenter Server 6.5
Vmware Vcenter Server 6.7
Vmware Vcenter Server 7.0
Vmware Cloud Foundation 4.0
Vmware Cloud Foundation 4.0.1
Vmware Cloud Foundation 3.0
Vmware Cloud Foundation 3.0.1
Vmware Cloud Foundation 3.0.1.1
Vmware Cloud Foundation 3.5
Vmware Cloud Foundation 3.5.1
Vmware Cloud Foundation 3.7
Vmware Cloud Foundation 3.7.1
Vmware Cloud Foundation 3.7.2
Vmware Cloud Foundation 3.8
Vmware Cloud Foundation 3.8.1
Vmware Cloud Foundation 3.9
Vmware Cloud Foundation 3.9.1
Vmware Cloud Foundation 3.10
Vmware Cloud Foundation 4.1
Vmware Cloud Foundation 4.2.1
Vmware Cloud Foundation 4.1.0.1
Vmware Cloud Foundation 3.11
1 Article
3.3
CVSSv3
CVE-2022-31699
VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure.
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Esxi 7.0
Vmware Cloud Foundation 4.0.1
Vmware Cloud Foundation 3.0.1
Vmware Cloud Foundation 3.0.1.1
Vmware Cloud Foundation 3.5
Vmware Cloud Foundation 3.5.1
Vmware Cloud Foundation 3.7
Vmware Cloud Foundation 3.7.1
Vmware Cloud Foundation 3.7.2
Vmware Cloud Foundation 3.8
Vmware Cloud Foundation 3.8.1
Vmware Cloud Foundation 3.9
Vmware Cloud Foundation 3.9.1
Vmware Cloud Foundation 3.10
Vmware Cloud Foundation 4.1
Vmware Cloud Foundation 4.2.1
Vmware Cloud Foundation 4.1.0.1
Vmware Cloud Foundation 3.0
Vmware Cloud Foundation 4.0
Vmware Cloud Foundation 3.11
1 Article
NA
CVE-2014-1207
VMware ESXi 4.0 up to and including 5.1 and ESX 4.0 and 4.1 allow remote malicious users to cause a denial of service (NULL pointer dereference) by intercepting and modifying Network File Copy (NFC) traffic.
Vmware Esxi 5.1
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.0
Vmware Esx 4.0
Vmware Esx 4.1
NA
CVE-2014-1208
VMware Workstation 9.x prior to 9.0.1, VMware Player 5.x prior to 5.0.1, VMware Fusion 5.x prior to 5.0.1, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port.
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 5.1
Vmware Esxi 4.1
Vmware Fusion 5.0
Vmware Player 5.0
Vmware Workstation 9.0
Vmware Esx 4.1
Vmware Esx 4.0
NA
CVE-2013-5973
VMware ESXi 4.0 up to and including 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp ...
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 4.1
Vmware Esxi 5.1
NA
CVE-2013-3519
lgtosync.sys in VMware Workstation 9.x prior to 9.0.3, VMware Player 5.x prior to 5.0.3, VMware Fusion 5.x prior to 5.0.4, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privilege...
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.1
Vmware Esxi 5.0
Vmware Workstation 9.0
Vmware Workstation 9.0.1
Vmware Workstation 9.0.2
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Player 5.0.2
Vmware Player 5.0
Vmware Player 5.0.1
Vmware Fusion 5.0.3
Vmware Fusion 5.0
Vmware Fusion 5.0.2
Vmware Fusion 5.0.1
NA
CVE-2013-5970
hostd-vmdb in VMware ESXi 4.0 up to and including 5.0 and ESX 4.0 up to and including 4.1 allows remote malicious users to cause a denial of service (hostd-vmdb service outage) by modifying management traffic.
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »