Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
esx vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2009-0518
VI Client in VMware VirtualCenter prior to 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
Vmware Vmware Virtualcenter 1.4
Vmware Vmware Virtualcenter 1.4.1
Vmware Vmware Esx 3.5
Vmware Vmware Esxi 3.5
Vmware Vmware Virtualcenter 1.1
Vmware Vmware Virtualcenter 1.3
Vmware Vmware Virtualcenter 1.3.1
Vmware Vmware Virtualcenter 1.2
2.1
CVSSv2
CVE-2008-2101
The VMware Consolidated Backup (VCB) command-line utilities in VMware ESX 3.0.1 up to and including 3.0.3 and ESX 3.5 place a password on the command line, which allows local users to obtain sensitive information by listing the process.
Vmware Esx 3.5
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Esx 3.0.3
2.1
CVSSv2
CVE-2005-3620
The management interface for VMware ESX Server 2.0.x prior to 2.0.2 patch 1, 2.1.x prior to 2.1.3 patch 1, and 2.x prior to 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges.
Vmware Esx
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10