Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware player 5.0 vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv2
CVE-2016-5330
Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 up to and including 6.0, VMware Workstation Pro 12.1.x prior to 12.1.1, VMware Workstation Player 12.1.x prior to 12.1.1, and VMware Fusion 8.1.x prior to 8.1.1 ...
Vmware Workstation Player
Vmware Workstation Pro
Vmware Esxi
Vmware Fusion
Vmware Tools
1 EDB exploit
6.5
CVSSv2
CVE-2015-6933
The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x prior to 11.1.2, VMware Player 7.x prior to 7.1.2, VMware Fusion 7.x prior to 7.1.2, and VMware ESXi 5.0 up to and including 6.0 allows Windows guest OS users to gain guest OS privileges or cause...
Vmware Player 7.1.1
Vmware Player 7.0
Vmware Player 7.1
Vmware Workstation 11.0
Vmware Workstation 11.1
Vmware Workstation 11.1.1
Vmware Esxi 5.0
Vmware Esxi 5.1
Vmware Esxi 6.0
Vmware Esxi 5.5
Vmware Fusion 7.1.1
Vmware Fusion 7.1
Vmware Fusion 7.0
1 Article
7.2
CVSSv2
CVE-2015-3650
vmware-vmx.exe in VMware Workstation 7.x up to and including 10.x prior to 10.0.7 and 11.x prior to 11.1.1, VMware Player 5.x and 6.x prior to 6.0.7 and 7.x prior to 7.1.1, and VMware Horizon Client 5.x local-mode prior to 5.4.2 on Windows does not provide a valid DACL pointer du...
Vmware Player 5.0
Vmware Player 6.0.2
Vmware Player 6.0.3
Vmware Player 5.0.1
Vmware Player 5.0.2
Vmware Player 6.0.4
Vmware Player 6.0.5
Vmware Player 6.0
Vmware Player 6.0.1
Vmware Player 7.1
Vmware Player 5.0.3
Vmware Player 5.0.4
Vmware Player 6.0.6
Vmware Player 7.0
Vmware Workstation 10.0
Vmware Workstation 10.0.1
Vmware Workstation 10.0.2
Vmware Workstation 10.0.3
Vmware Workstation 10.0.4
Vmware Workstation 11.0
Vmware Workstation 11.1
Vmware Workstation 10.0.5
3.3
CVSSv2
CVE-2015-1044
vmware-authd (aka the Authorization process) in VMware Workstation 10.x prior to 10.0.5, VMware Player 6.x prior to 6.0.5, and VMware ESXi 5.0 up to and including 5.5 allows malicious users to cause a host OS denial of service via unspecified vectors.
Vmware Workstation 10.0.3
Vmware Workstation 10.0.4
Vmware Workstation 10.0
Vmware Workstation 10.0.1
Vmware Workstation 10.0.2
Vmware Esxi 5.0
Vmware Esxi 5.5
Vmware Esxi 5.1
Vmware Player 6.0
Vmware Player 6.0.1
Vmware Player 6.0.2
Vmware Player 6.0.3
Vmware Player 6.0.4
6.4
CVSSv2
CVE-2014-8370
VMware Workstation 10.x prior to 10.0.5, VMware Player 6.x prior to 6.0.5, VMware Fusion 6.x prior to 6.0.5, and VMware ESXi 5.0 up to and including 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configur...
Vmware Player 6.0
Vmware Player 6.0.3
Vmware Player 6.0.4
Vmware Player 6.0.1
Vmware Player 6.0.2
Vmware Fusion 6.0.1
Vmware Fusion 6.0.2
Vmware Fusion 6.0
Vmware Fusion 6.0.3
Vmware Fusion 6.0.4
Vmware Workstation 10.0.4
Vmware Workstation 10.0.2
Vmware Workstation 10.0.3
Vmware Workstation 10.0
Vmware Workstation 10.0.1
Vmware Esxi 5.0
Vmware Esxi 5.1
Vmware Esxi 5.5
5.8
CVSSv2
CVE-2014-3793
VMware Tools in VMware Workstation 10.x prior to 10.0.2, VMware Player 6.x prior to 6.0.2, VMware Fusion 6.x prior to 6.0.3, and VMware ESXi 5.0 up to and including 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of se...
Vmware Esxi 5.0
Vmware Fusion 6.0.1
Vmware Fusion 6.0.2
Vmware Esxi 5.1
Vmware Workstation 10.0.1
Vmware Workstation 10.0
Vmware Esxi 5.5
Vmware Player 6.0
Vmware Player 6.0.1
Vmware Fusion 6.0
3.3
CVSSv2
CVE-2014-1208
VMware Workstation 9.x prior to 9.0.1, VMware Player 5.x prior to 5.0.1, VMware Fusion 5.x prior to 5.0.1, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port.
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 5.1
Vmware Esxi 4.1
Vmware Fusion 5.0
Vmware Player 5.0
Vmware Workstation 9.0
Vmware Esx 4.1
Vmware Esx 4.0
7.9
CVSSv2
CVE-2013-3519
lgtosync.sys in VMware Workstation 9.x prior to 9.0.3, VMware Player 5.x prior to 5.0.3, VMware Fusion 5.x prior to 5.0.4, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privilege...
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.1
Vmware Esxi 5.0
Vmware Workstation 9.0
Vmware Workstation 9.0.1
Vmware Workstation 9.0.2
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Player 5.0.2
Vmware Player 5.0
Vmware Player 5.0.1
Vmware Fusion 5.0.3
Vmware Fusion 5.0
Vmware Fusion 5.0.2
Vmware Fusion 5.0.1
7.2
CVSSv2
CVE-2013-5972
VMware Workstation 9.x prior to 9.0.3 and VMware Player 5.x prior to 5.0.3 on Linux do not properly handle shared libraries, which allows host OS users to gain host OS privileges via unspecified vectors.
Vmware Workstation 9.0.1
Vmware Workstation 9.0
Vmware Workstation 9.0.2
Vmware Player 5.0
Vmware Player 5.0.1
Vmware Player 5.0.2
6.9
CVSSv2
CVE-2013-1662
vmware-mount in VMware Workstation 8.x and 9.x and VMware Player 4.x and 5.x, on systems based on Debian GNU/Linux, allows host OS users to gain host OS privileges via a crafted lsb_release binary in a directory in the PATH, related to use of the popen library function.
Vmware Workstation 8.0.1
Vmware Workstation 8.0.1.27038
Vmware Workstation 8.0.2
Vmware Workstation 8.0.6
Vmware Workstation 8.0.4
Vmware Workstation 8.0
Vmware Workstation 9.0.2
Vmware Workstation 9.0.1
Vmware Workstation 9.0
Vmware Workstation 8.0.3
Vmware Workstation 8.0.5
Vmware Workstation 8.0.0.18997
Vmware Player 4.0
Vmware Player 4.0.1
Vmware Player 4.0.2
Vmware Player 4.0.3
Vmware Player 4.0.4
Vmware Player 4.0.5
Vmware Player 4.0.6
Vmware Player 4.0.0.18997
Vmware Player 5.0.1
Vmware Player 5.0.2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »