Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
esx vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2012-1517
The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers.
Vmware Esxi 4.1
Vmware Esx 4.1
9
CVSSv2
CVE-2008-2097
Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length."
Vmware Esx 3.5
Vmware Esxi 3.5
8.5
CVSSv2
CVE-2010-1141
VMware Tools in VMware Workstation 6.5.x prior to 6.5.4 build 246459; VMware Player 2.5.x prior to 2.5.4 build 246459; VMware ACE 2.5.x prior to 2.5.4 build 246459; VMware Server 2.x prior to 2.0.2 build 203138; VMware Fusion 2.x prior to 2.0.6 build 246742; VMware ESXi 3.5 and 4...
Vmware Workstation 6.5.2
Vmware Workstation 6.5.3
Vmware Workstation 6.5.0
Vmware Workstation 6.5.1
Vmware Player 2.5.3
Vmware Player 2.5.1
Vmware Player 2.5.2
Vmware Player 2.5
Vmware Ace 2.5.2
Vmware Ace 2.5.0
Vmware Ace 2.5.1
Vmware Ace 2.5.3
Vmware Server 2.0.2
Vmware Server 2.0.1
Vmware Server 2.0.0
Vmware Fusion 3.0
Vmware Fusion 2.0.5
Vmware Fusion 2.0
Vmware Fusion 2.0.3
Vmware Fusion 2.0.4
Vmware Fusion 2.0.1
Vmware Fusion 2.0.2
8.5
CVSSv2
CVE-2010-1142
VMware Tools in VMware Workstation 6.5.x prior to 6.5.4 build 246459; VMware Player 2.5.x prior to 2.5.4 build 246459; VMware ACE 2.5.x prior to 2.5.4 build 246459; VMware Server 2.x prior to 2.0.2 build 203138; VMware Fusion 2.x prior to 2.0.6 build 246742; VMware ESXi 3.5 and 4...
Vmware Workstation 6.5.0
Vmware Workstation 6.5.3
Vmware Workstation 6.5.1
Vmware Workstation 6.5.2
Vmware Player 2.5
Vmware Player 2.5.3
Vmware Player 2.5.1
Vmware Player 2.5.2
Vmware Ace 2.5.3
Vmware Ace 2.5.0
Vmware Ace 2.5.1
Vmware Ace 2.5.2
Vmware Server 2.0.0
Vmware Server 2.0.2
Vmware Server 2.0.1
Vmware Fusion 2.0.5
Vmware Fusion 2.0
Vmware Fusion 3.0
Vmware Fusion 2.0.1
Vmware Fusion 2.0.2
Vmware Fusion 2.0.3
Vmware Fusion 2.0.4
8.3
CVSSv2
CVE-2012-1518
VMware Workstation 8.x prior to 8.0.2, VMware Player 4.x prior to 4.0.2, VMware Fusion 4.x prior to 4.1.2, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain gue...
Vmware Workstation 8.0
Vmware Workstation 8.0.1
Vmware Player 4.0
Vmware Player 4.0.1
Vmware Player 4.0.2
Vmware Fusion 4.1.1
Vmware Fusion 4.0
Vmware Fusion 4.0.1
Vmware Fusion 4.0.2
Vmware Fusion 4.1
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 3.5
Vmware Esx 3.5
Vmware Esx 4.0
Vmware Esx 4.1
8.3
CVSSv2
CVE-2012-1515
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 3.5
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
7.9
CVSSv2
CVE-2013-3519
lgtosync.sys in VMware Workstation 9.x prior to 9.0.3, VMware Player 5.x prior to 5.0.3, VMware Fusion 5.x prior to 5.0.4, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privilege...
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.1
Vmware Esxi 5.0
Vmware Workstation 9.0
Vmware Workstation 9.0.1
Vmware Workstation 9.0.2
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Player 5.0.2
Vmware Player 5.0
Vmware Player 5.0.1
Vmware Fusion 5.0.3
Vmware Fusion 5.0
Vmware Fusion 5.0.2
Vmware Fusion 5.0.1
7.9
CVSSv2
CVE-2010-4263
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel prior to 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote malicious use...
Linux Linux Kernel
Vmware Esx 3.5
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 3.5
Vmware Esx 4.1
Vmware Esxi 5.0
Vmware Esx 4.0
Vmware Esx 3.0.0
Vmware Esx 3.0.2
Vmware Esx 3.0.1
Vmware Esx 3.0.3
7.8
CVSSv2
CVE-2012-3289
VMware Workstation 8.x prior to 8.0.4, VMware Player 4.x prior to 4.0.4, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 allow remote malicious users to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device...
Vmware Workstation 8.0.2
Vmware Workstation 8.0
Vmware Workstation 8.0.1
Vmware Workstation 8.0.3
Vmware Player 4.0.1
Vmware Player 4.0.2
Vmware Player 4.0.3
Vmware Player 4.0
Vmware Esx 3.5
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.0
Vmware Esx 4.1
Vmware Esxi 3.5
Vmware Esx 4.0
7.8
CVSSv2
CVE-2010-4251
The socket implementation in net/core/sock.c in the Linux kernel prior to 2.6.34 does not properly manage a backlog of received packets, which allows remote malicious users to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstr...
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Redhat Enterprise Linux 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »