Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware workstation 2.0 vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2008-3761
hcmon.sys in VMware Workstation 6.5.1 and previous versions, VMware Player 2.5.1 and previous versions, VMware ACE 2.5.1 and previous versions, and VMware Server 1.0.x prior to 1.0.9 build 156507 and 2.0.x prior to 2.0.1 build 156745 uses the METHOD_NEITHER communication method f...
Vmware Vmware Workstation 6.0.0.45731
1 EDB exploit
6.8
CVSSv2
CVE-2008-4279
The CPU hardware emulation for 64-bit guest operating systems in VMware Workstation 6.0.x prior to 6.0.5 build 109488 and 5.x prior to 5.5.8 build 108000; Player 2.0.x prior to 2.0.5 build 109488 and 1.x prior to 1.0.8; Server 1.x prior to 1.0.7 build 108231; and ESX 2.5.4 up to ...
Vmware Workstation
Vmware Player
Vmware Server
Vmware Esx
6.9
CVSSv2
CVE-2008-4915
The CPU hardware emulation in VMware Workstation 6.0.5 and previous versions and 5.5.8 and previous versions; Player 2.0.x up to and including 2.0.5 and 1.0.x up to and including 1.0.8; ACE 2.0.x up to and including 2.0.5 and previous versions, and 1.0.x up to and including 1.0.7...
Vmware Workstation
Vmware Player
Vmware Esx
Vmware Esxi 3.5
Vmware Ace
Vmware Server
NA
CVE-2022-31705
VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process run...
Vmware Esxi 7.0
Vmware Workstation
Vmware Esxi 8.0
Vmware Fusion
1 Github repository
1 Article
4.4
CVSSv2
CVE-2020-3967
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x prior to 15.5.5), and Fusion (11.x prior to 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor ...
Vmware Cloud Foundation
Vmware Fusion
Vmware Workstation
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Esxi 7.0.0
3.7
CVSSv2
CVE-2020-3966
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x prior to 15.5.2), and Fusion (11.x prior to 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A ...
Vmware Cloud Foundation
Vmware Fusion
Vmware Workstation
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Esxi 7.0.0
4.3
CVSSv2
CVE-2008-3281
libxml2 2.6.32 and previous versions does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent malicious users to cause a denial of service (memory and CPU consumption) via a crafted XML document.
Xmlsoft Libxml2
Apple Safari
Apple Iphone Os
Fedoraproject Fedora 9
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 4.0
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 4.7
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Redhat Enterprise Linux Eus 5.2
Redhat Enterprise Linux Server 2.0
Redhat Enterprise Linux Workstation 2.0
10
CVSSv2
CVE-2008-1392
The default configuration of VMware Workstation 6.0.2, VMware Player 2.0.x prior to 2.0.3, and VMware ACE 2.0.x prior to 2.0.1 makes the console of the guest OS accessible through anonymous VIX API calls, which has unknown impact and attack vectors.
Vmware Vmware Workstation 6.0.2
Vmware Ace
Vmware Player
4.6
CVSSv2
CVE-2022-0330
A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
Linux Linux Kernel
Linux Linux Kernel 5.17
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux For Real Time 7
Redhat Enterprise Linux For Real Time For Nfv 7
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux For Real Time 8
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
4.7
CVSSv2
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4