Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
workstation vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2007-1337
The virtual machine process (VMX) in VMware Workstation prior to 5.5.4 does not properly read state information when moving from the ACPI sleep state to the run state, which allows malicious users to cause a denial of service (virtual machine reboot) via unknown vectors.
Vmware Workstation
10
CVSSv2
CVE-2012-6694
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1, and Server 4.0, has a password of 2charGE for the geservice account, which has unspecified impact and attack vectors related to TimbuktuPro. NOTE: it is not clear whether this password is default, hardcoded, or dependent on...
Gehealthcare Centricity Pacs Workstation 4.0
Gehealthcare Centricity Pacs Server 4.0
Gehealthcare Centricity Pacs Workstation 4.0.1
6.9
CVSSv2
CVE-2008-0967
Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x prior to 5.5.7 build 91707 and 6.x prior to 6.0.4 build 93057, VMware Player 1.x prior to 1.0.7 build 91707 and 2.x prior to 2.0.4 build 93057, and VMware Server prior to 1.0.6 build 91891 on Linux, and...
Vmware Esx Server 2.5.5
Vmware Esx Server 3.5
Vmware Esxi 3.5
Vmware Player 2.0
Vmware Player 2.0.1
Vmware Vmware Server 1.0.4
Vmware Vmware Server 1.0.5
Vmware Vmware Workstation 6.0.3
Vmware Workstation 5.5.1
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Player 1.0.0
Vmware Player 1.0.1
Vmware Player 2.0.2
Vmware Player 2.0.3
Vmware Vmware Workstation 5.5.0
Vmware Vmware Workstation 5.5.2
Vmware Workstation 5.5.3
Vmware Workstation 5.5.4
Vmware Esx Server 3.2
Vmware Esx Server 3.3
Vmware Player 1.0.4
4
CVSSv2
CVE-2022-1691
The Realty Workstation WordPress plugin prior to 1.0.15 does not sanitise and escape the trans_edit parameter before using it in a SQL statement when an agent edit a transaction, leading to an SQL injection
Realtyworkstation Realty Workstation
NA
CVE-2023-20854
VMware Workstation contains an arbitrary file deletion vulnerability. A malicious actor with local user privileges on the victim's machine may exploit this vulnerability to delete arbitrary files from the file system of the machine on which Workstation is installed.
Vmware Workstation 17.0
1 Article
4.6
CVSSv2
CVE-2006-6410
Buffer overflow in an ActiveX control in VMWare 5.5.1 allows local users to execute arbitrary code via a long VmdbDb parameter to the Initialize function.
Vmware Workstation 5.5.1
1 EDB exploit
7.2
CVSSv2
CVE-2004-2515
Format string vulnerability in VMware Workstation 4.5.2 build-8848, if running with elevated privileges, might allow local users to execute arbitrary code via format string specifiers in command line arguments. NOTE: it is not clear if there are any default or typical circumstanc...
Vmware Workstation 4.5.2 Build 8848
7.2
CVSSv2
CVE-2007-1056
VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, accessing hardware components, and stopping the "VMware tools service" serv...
Vmware Workstation 5.5.3 Build 34685
3.6
CVSSv2
CVE-2001-1059
VMWare creates a temporary file vmware-log.USERNAME with insecure permissions, which allows local users to read or modify license information.
Vmware Workstation 2.0
7.2
CVSSv2
CVE-2005-2939
Unquoted Windows search path vulnerability in VMWare Workstation 5.0.0 build-13124 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
Vmware Workstation 5.0.0 Build 13124
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »