Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware esx 3.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-2100
Multiple buffer overflows in VIX API 1.1.x prior to 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 up to and including 3.5 allow guest OS users to execute ...
Vmware Esx Server 3.5
Vmware Esxi 3.5
Vmware Fusion
Vmware Player
Vmware Esx 2.5.4
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Ace
Vmware Server
Vmware Workstation
Vmware Esx Server 3.0
Vmware Esx 2.5.5
Vmware Esx 3.5
NA
CVE-2012-1515
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
9.9
CVSSv3
CVE-2012-1516
The VMX process in VMware ESXi 3.5 up to and including 4.1 and ESX 3.5 up to and including 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS vi...
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
NA
CVE-2008-2101
The VMware Consolidated Backup (VCB) command-line utilities in VMware ESX 3.0.1 up to and including 3.0.3 and ESX 3.5 place a password on the command line, which allows local users to obtain sensitive information by listing the process.
Vmware Esx 3.5
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Esx 3.0.3
NA
CVE-2010-4263
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel prior to 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote malicious use...
Linux Linux Kernel
Vmware Esx 3.5
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 3.5
Vmware Esx 4.1
Vmware Esxi 5.0
Vmware Esx 4.0
Vmware Esx 3.0.0
Vmware Esx 3.0.2
Vmware Esx 3.0.1
Vmware Esx 3.0.3
NA
CVE-2012-2448
VMware ESXi 3.5 up to and including 5.0 and ESX 3.5 up to and including 4.1 allow remote malicious users to execute arbitrary code or cause a denial of service (memory overwrite) via NFS traffic.
Vmware Esxi 4.1
Vmware Esxi 5.0
Vmware Esxi 4.0
Vmware Esxi 3.5
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
NA
CVE-2008-4914
Unspecified vulnerability in VMware ESXi 3.5 before ESXe350-200901401-I-SG and ESX 3.5 before ESX350-200901401-SG allows local administrators to cause a denial of service (host crash) via a snapshot with a malformed VMDK delta disk.
Vmware Esx 3.5
Vmware Esxi 3.5
NA
CVE-2008-2097
Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length."
Vmware Esx 3.5
Vmware Esxi 3.5
NA
CVE-2009-2277
Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5 allows remote malicious users to inject arbitrary web script or HTML via vectors related to "context data."
Vmware Virtualcenter 2.5
Vmware Esx Server 3.0.3
Vmware Esx Server 3.5
Vmware Virtualcenter 2.0.2
NA
CVE-2010-1137
Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5, and the Server Console in VMware Server 1.0, allows remote malicious users to inject arbitrary web script or HTML via the name of a virtual machine.
Vmware Virtualcenter 2.0.2
Vmware Virtualcenter 2.5
Vmware Server 1.0
Vmware Esx Server 3.0.3
Vmware Esx Server 3.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »