Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware view 4.5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2012-5978
Multiple directory traversal vulnerabilities in the (1) View Connection Server and (2) View Security Server in VMware View 4.x prior to 4.6.2 and 5.x prior to 5.1.2 allow remote malicious users to read arbitrary files via unspecified vectors.
Vmware View 4.0.0
Vmware View 5.1.0
Vmware View 4.6.1
Vmware View 5.0.0
Vmware View 4.5
Vmware View 4.6.0
Vmware View 5.0.1
6.9
CVSSv2
CVE-2017-4935
VMware Workstation (12.x prior to 12.5.8) and Horizon View Client for Windows (4.x prior to 4.6.1) contain an out-of-bounds write vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windo...
Vmware Workstation 12.5.1
Vmware Workstation 12.5
Vmware Workstation 12.1.1
Vmware Workstation 12.1
Vmware Workstation 12.5.5
Vmware Workstation 12.5.3
Vmware Workstation 12.0.0
Vmware Workstation 12.5.7
Vmware Workstation 12.5.6
Vmware Workstation 12.5.4
Vmware Workstation 12.5.2
Vmware Workstation 12.0.1
Vmware Horizon View 4.0.0
Vmware Horizon View 4.4
Vmware Horizon View 4.6
Vmware Horizon View 4.0.1
Vmware Horizon View 4.1
Vmware Horizon View 4.2
Vmware Horizon View 4.3
Vmware Horizon View 4.5
6.9
CVSSv2
CVE-2017-4937
VMware Workstation (12.x prior to 12.5.8) and Horizon View Client for Windows (4.x prior to 4.6.1) contain an out-of-bounds read vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Window...
Vmware Workstation 12.1
Vmware Workstation 12.0.1
Vmware Workstation 12.0.0
Vmware Workstation 12.5.1
Vmware Workstation 12.1.1
Vmware Workstation 12.5.6
Vmware Workstation 12.5.5
Vmware Workstation 12.5.4
Vmware Workstation 12.5.3
Vmware Workstation 12.5.7
Vmware Workstation 12.5.2
Vmware Workstation 12.5
Vmware Horizon View 4.0.0
Vmware Horizon View 4.1
Vmware Horizon View 4.3
Vmware Horizon View 4.4
Vmware Horizon View 4.5
Vmware Horizon View 4.6
Vmware Horizon View 4.0.1
Vmware Horizon View 4.2
6.9
CVSSv2
CVE-2017-4936
VMware Workstation (12.x prior to 12.5.8) and Horizon View Client for Windows (4.x prior to 4.6.1) contain an out-of-bounds read vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Window...
Vmware Workstation 12.5.3
Vmware Workstation 12.5.2
Vmware Workstation 12.5.1
Vmware Workstation 12.5
Vmware Workstation 12.5.7
Vmware Workstation 12.5.5
Vmware Workstation 12.1
Vmware Workstation 12.0.0
Vmware Workstation 12.5.6
Vmware Workstation 12.5.4
Vmware Workstation 12.1.1
Vmware Workstation 12.0.1
Vmware Horizon View 4.4
Vmware Horizon View 4.6
Vmware Horizon View 4.0.0
Vmware Horizon View 4.0.1
Vmware Horizon View 4.1
Vmware Horizon View 4.2
Vmware Horizon View 4.3
Vmware Horizon View 4.5
7.2
CVSSv2
CVE-2013-1406
The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x prior to 8.0.5 and 9.x prior to 9.0.1 on Windows, VMware Fusion 4.1 prior to 4.1.4 and 5.0 prior to 5.0.2, VMware View 4.x prior to 4.6.2 and 5.x prior to 5.1.2 on Windows, VMw...
Vmware Workstation 8.0.1.27038
Vmware Workstation 8.0.2
Vmware Workstation 8.0.3
Vmware Workstation 8.0.4
Vmware Workstation 8.0.0.18997
Vmware Workstation 8.0.1
Vmware Workstation 8.0
Vmware Workstation 9.0
Vmware Fusion 4.1
Vmware Fusion 4.1.1
Vmware Fusion 4.1.2
Vmware Fusion 4.1.3
Vmware Fusion 5.0
Vmware Fusion 5.0.1
Vmware View 4.0.0
Vmware View 5.1.0
Vmware View 5.1.1
Vmware View 5.0.0
Vmware View 5.0.1
Vmware View 4.5
Vmware View 4.6.0
Vmware View 4.6.1
1 EDB exploit
4.7
CVSSv2
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
4.7
CVSSv2
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Intel Pentium N N3700
Intel Pentium N N3710
Intel Celeron N N3000
Intel Celeron N N3010
Intel Celeron N N3050
Intel Celeron N N2930
Intel Celeron N N2920
Intel Celeron N N2808
Intel Celeron N N2807
Intel Celeron J J3060
Intel Celeron J J1900
Intel Atom X3 C3295rk
Intel Atom X3 C3235rk
Intel Atom Z Z3775d
Intel Atom Z Z3775
Intel Atom Z Z3736f
Intel Atom Z Z3735g
Intel Atom Z Z3560
Intel Atom Z Z3530
Intel Atom Z Z2480
Intel Atom Z Z2460
Intel Atom C C3308
41 Github repositories
8 Articles
1.9
CVSSv2
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
47 Github repositories
9 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started