Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware esx 4.1 vulnerabilities and exploits
(subscribe to this query)
294
VMScore
CVE-2014-1208
VMware Workstation 9.x prior to 9.0.1, VMware Player 5.x prior to 5.0.1, VMware Fusion 5.x prior to 5.0.1, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port.
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 5.1
Vmware Esxi 4.1
Vmware Fusion 5.0
Vmware Player 5.0
Vmware Workstation 9.0
Vmware Esx 4.1
Vmware Esx 4.0
561
VMScore
CVE-2011-2145
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x prior to 7.1.4, VMware Player 3.1.x prior to 3.1.4, VMware Fusion 3.1.x prior to 3.1.3, VMware ESXi 3.5 up to and including 4.1, and VMware ESX 3.0.3 up to and including 4.1, when a Solaris or Fr...
Vmware Workstation 7.1.3
Vmware Workstation 7.1.2
Vmware Esx 3.5
Vmware Esx 3.0.3
Vmware Player 3.1.2
Vmware Player 3.1
Vmware Esxi 4.0
Vmware Esxi 3.5
Vmware Workstation 7.1.1
Vmware Fusion 3.1
Vmware Fusion 3.1.2
Vmware Fusion 3.1.1
Vmware Esx 4.1
Vmware Player 3.1.1
Vmware Player 3.1.3
Vmware Esxi 4.1
Vmware Esx 4.0
187
VMScore
CVE-2011-2146
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x prior to 7.1.4, VMware Player 3.1.x prior to 3.1.4, VMware Fusion 3.1.x prior to 3.1.3, VMware ESXi 3.5 up to and including 4.1, and VMware ESX 3.0.3 up to and including 4.1 allows guest OS users...
Vmware Workstation 7.1.2
Vmware Workstation 7.1.3
Vmware Workstation 7.1.1
Vmware Player 3.1
Vmware Player 3.1.3
Vmware Player 3.1.1
Vmware Player 3.1.2
Vmware Fusion 3.1
Vmware Fusion 3.1.1
Vmware Fusion 3.1.2
Vmware Esx 4.1
Vmware Esxi 3.5
Vmware Esxi 4.1
Vmware Esx 3.5
Vmware Esx 4.0
Vmware Esxi 4.0
Vmware Esx 3.0.3
614
VMScore
CVE-2011-1787
Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x prior to 7.1.4, VMware Player 3.1.x prior to 3.1.4, VMware Fusion 3.1.x prior to 3.1.3, VMware ESXi 3.5 up to and including 4.1, and VMware ESX 3.0.3 up to and including 4.1 all...
Vmware Workstation 7.1.3
Vmware Workstation 7.1.1
Vmware Workstation 7.1.2
Vmware Player 3.1.2
Vmware Player 3.1.3
Vmware Player 3.1.1
Vmware Player 3.1
Vmware Fusion 3.1.1
Vmware Fusion 3.1.2
Vmware Fusion 3.1
Vmware Esxi 4.0
Vmware Esx 3.0.3
Vmware Esxi 3.5
Vmware Esxi 4.1
Vmware Esx 4.1
Vmware Esx 3.5
Vmware Esx 4.0
739
VMScore
CVE-2012-1518
VMware Workstation 8.x prior to 8.0.2, VMware Player 4.x prior to 4.0.2, VMware Fusion 4.x prior to 4.1.2, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain gue...
Vmware Workstation 8.0
Vmware Workstation 8.0.1
Vmware Player 4.0
Vmware Player 4.0.1
Vmware Player 4.0.2
Vmware Fusion 4.1.1
Vmware Fusion 4.0
Vmware Fusion 4.0.1
Vmware Fusion 4.0.2
Vmware Fusion 4.1
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 3.5
Vmware Esx 3.5
Vmware Esx 4.0
Vmware Esx 4.1
188
VMScore
CVE-2010-4655
net/core/ethtool.c in the Linux kernel prior to 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Canonical Ubuntu Linux 8.04
695
VMScore
CVE-2010-4251
The socket implementation in net/core/sock.c in the Linux kernel prior to 2.6.34 does not properly manage a backlog of received packets, which allows remote malicious users to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstr...
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Redhat Enterprise Linux 4.0
694
VMScore
CVE-2012-3289
VMware Workstation 8.x prior to 8.0.4, VMware Player 4.x prior to 4.0.4, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 allow remote malicious users to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device...
Vmware Workstation 8.0.2
Vmware Workstation 8.0
Vmware Workstation 8.0.1
Vmware Workstation 8.0.3
Vmware Player 4.0.1
Vmware Player 4.0.2
Vmware Player 4.0.3
Vmware Player 4.0
Vmware Esx 3.5
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.0
Vmware Esx 4.1
Vmware Esxi 3.5
Vmware Esx 4.0
801
VMScore
CVE-2012-2450
VMware Workstation 8.x prior to 8.0.3, VMware Player 4.x prior to 4.0.3, VMware Fusion 4.x prior to 4.1.2, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of s...
Vmware Workstation 8.0.1
Vmware Workstation 8.0
Vmware Workstation 8.0.2
Vmware Player 4.0.1
Vmware Player 4.0
Vmware Player 4.0.2
Vmware Fusion 4.1
Vmware Fusion 4.0
Vmware Fusion 4.1.1
Vmware Fusion 4.0.1
Vmware Fusion 4.0.2
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 5.0
Vmware Esxi 3.5
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
801
VMScore
CVE-2012-2449
VMware Workstation 8.x prior to 8.0.3, VMware Player 4.x prior to 4.0.3, VMware Fusion 4.x up to and including 4.1.2, VMware ESXi 3.5 up to and including 5.0, and VMware ESX 3.5 up to and including 4.1 do not properly configure the virtual floppy device, which allows guest OS use...
Vmware Workstation 8.0
Vmware Workstation 8.0.1
Vmware Workstation 8.0.2
Vmware Player 4.0
Vmware Player 4.0.2
Vmware Player 4.0.1
Vmware Fusion 4.0.1
Vmware Fusion 4.0
Vmware Fusion 4.1.1
Vmware Fusion 4.1.2
Vmware Fusion 4.1
Vmware Fusion 4.0.2
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 3.5
Vmware Esxi 5.0
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Esx 3.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »