Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware fusion 7.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2020-3965
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x prior to 15.5.2), and Fusion (11.x prior to 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local acces...
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Workstation
Vmware Fusion
Vmware Esxi 7.0.0
Vmware Cloud Foundation
1.9
CVSSv2
CVE-2020-3964
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x prior to 15.5.2), and Fusion (11.x prior to 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local acces...
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Workstation
Vmware Fusion
Vmware Esxi 7.0.0
Vmware Cloud Foundation
1.9
CVSSv2
CVE-2020-3970
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x prior to 15.5.5), and Fusion (11.x prior to 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor...
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Fusion
Vmware Esxi 7.0.0
Vmware Cloud Foundation
Vmware Workstation
NA
CVE-2022-31705
VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process run...
Vmware Esxi 7.0
Vmware Workstation
Vmware Esxi 8.0
Vmware Fusion
1 Github repository
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4