Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
esx vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2009-0518
VI Client in VMware VirtualCenter prior to 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
Vmware Vmware Virtualcenter 1.4
Vmware Vmware Virtualcenter 1.4.1
Vmware Vmware Esx 3.5
Vmware Vmware Esxi 3.5
Vmware Vmware Virtualcenter 1.1
Vmware Vmware Virtualcenter 1.3
Vmware Vmware Virtualcenter 1.3.1
Vmware Vmware Virtualcenter 1.2
187
VMScore
CVE-2008-2101
The VMware Consolidated Backup (VCB) command-line utilities in VMware ESX 3.0.1 up to and including 3.0.3 and ESX 3.5 place a password on the command line, which allows local users to obtain sensitive information by listing the process.
Vmware Esx 3.5
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Esx 3.0.3
187
VMScore
CVE-2005-3620
The management interface for VMware ESX Server 2.0.x prior to 2.0.2 patch 1, 2.1.x prior to 2.1.3 patch 1, and 2.x prior to 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges.
Vmware Esx
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10