Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware remote console vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2021-21999
VMware Tools for Windows (11.x.y before 11.2.6), VMware Remote Console for Windows (12.x before 12.0.1) , VMware App Volumes (2.x before 2.18.10 and 4 before 2103) contain a local privilege escalation vulnerability. An attacker with normal access to a virtual machine may exploit ...
Vmware Remote Console
Vmware App Volumes
Vmware Tools
7.2
CVSSv2
CVE-2020-3974
VMware Fusion (11.x prior to 11.5.5), VMware Remote Console for Mac (11.x and prior prior to 11.2.0 ) and Horizon Client for Mac (5.x and prior prior to 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issu...
Vmware Fusion
Vmware Horizon Client
Vmware Remote Console
6.9
CVSSv2
CVE-2020-3957
VMware Fusion (11.x prior to 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitati...
Vmware Fusion
Vmware Horizon Client
Vmware Remote Console
7.2
CVSSv2
CVE-2020-3950
VMware Fusion (11.x prior to 11.5.2), VMware Remote Console for Mac (11.x and prior prior to 11.0.1) and Horizon Client for Mac (5.x and prior prior to 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issu...
Vmware Fusion
Vmware Horizon Client
Vmware Remote Console
1 EDB exploit
7.2
CVSSv2
CVE-2019-5543
For VMware Horizon Client for Windows (5.x and prior prior to 5.3.0), VMware Remote Console for Windows (10.x prior to 11.0.0), VMware Workstation for Windows (15.x prior to 15.5.2) the folder containing configuration files for the VMware USB arbitration service was found to be w...
Vmware Horizon Client
Vmware Remote Console
Vmware Workstation
1 Article
7.2
CVSSv2
CVE-2019-5527
ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.
Vmware Workstation
Vmware Horizon
Vmware Remote Console
Vmware Fusion
Vmware Esxi 6.0
Vmware Esxi 6.5
Vmware Esxi 6.7
6.8
CVSSv2
CVE-2019-3900
An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could ...
Linux Linux Kernel
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Netapp Vasa Provider For Clustered Data Ontap
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Snapprotect -
Netapp Active Iq Unified Manager For Vmware Vsphere
Netapp Virtual Storage Console For Vmware Vsphere
Netapp Storage Replication Adapter For Clustered Data Ontap For Vmware Vsphere
Netapp Cn1610 Firmware -
Oracle Sd-wan Edge 8.2
Fedoraproject Fedora 28
4.9
CVSSv2
CVE-2019-3882
A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cau...
Linux Linux Kernel 3.10
Linux Linux Kernel 4.14
Linux Linux Kernel 4.18
Fedoraproject Fedora
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Netapp Vasa Provider For Clustered Data Ontap
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Snapprotect -
Netapp Active Iq Unified Manager For Vmware Vsphere
Netapp Virtual Storage Console For Vmware Vsphere
Netapp Storage Replication Adapter For Clustered Data Ontap For Vmware Vsphere
6.8
CVSSv2
CVE-2016-5711
NetApp Virtual Storage Console for VMware vSphere prior to 6.2.1 uses a non-unique certificate, which allows remote malicious users to conduct man-in-the-middle attacks via unspecified vectors.
Netapp Virtual Storage Console For Vmware Vsphere
8.5
CVSSv2
CVE-2016-1301
The RBAC implementation in Cisco ASA-CX Content-Aware Security software prior to 9.3.1.1(112) and Cisco Prime Security Manager (PRSM) software prior to 9.3.1.1(112) allows remote authenticated users to change arbitrary passwords via a crafted HTTP request, aka Bug ID CSCuo94842.
Cisco Asa Cx Context-aware Security Software 9.1.3-10
Cisco Asa Cx Context-aware Security Software 9.1.2-42
Cisco Asa Cx Context-aware Security Software 9.1.2-29
Cisco Prime Security Manager 9.0.1-40
Cisco Prime Security Manager 9.0.2-68
Cisco Prime Security Manager 9.1.3-13
Cisco Prime Security Manager 9.2.1-1
Cisco Asa Cx Context-aware Security Software 9.1.3-8
Cisco Asa Cx Context-aware Security Software 9.1.3-13
Cisco Asa Cx Context-aware Security Software 9.0.1
Cisco Prime Security Manager 9.0.0
Cisco Prime Security Manager 9.1.3-8
Cisco Prime Security Manager 9.1.3-10
Cisco Asa Cx Context-aware Security Software 9.2.1-4
Cisco Asa Cx Context-aware Security Software 9.2.1-3
Cisco Asa Cx Context-aware Security Software 9.0 Base
Cisco Asa Cx Context-aware Security Software 9.0.2-68
Cisco Prime Security Manager 9.1.0
Cisco Prime Security Manager 9.2.0
Cisco Prime Security Manager 9.2.1-2
Cisco Asa Cx Context-aware Security Software 9.2.1-2
Cisco Asa Cx Context-aware Security Software 9.2.1-1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »