Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware fusion vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2020-3948
Linux Guest VMs running on VMware Workstation (15.x prior to 15.5.2) and Fusion (11.x prior to 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with...
Vmware Fusion
Vmware Workstation
1 Article
7.8
CVSSv3
CVE-2019-5543
For VMware Horizon Client for Windows (5.x and prior prior to 5.3.0), VMware Remote Console for Windows (10.x prior to 11.0.0), VMware Workstation for Windows (15.x prior to 15.5.2) the folder containing configuration files for the VMware USB arbitration service was found to be w...
Vmware Horizon Client
Vmware Remote Console
Vmware Workstation
1 Article
7.8
CVSSv3
CVE-2018-6962
VMware Fusion (10.x prior to 10.1.2) contains a signature bypass vulnerability which may lead to a local privilege escalation.
Vmware Fusion
7.8
CVSSv3
CVE-2017-16512
The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 up to and including 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available.
Hashicorp Vagrant Vmware Fusion
7.8
CVSSv3
CVE-2017-16873
It is possible to exploit an unsanitized PATH in the suid binary that ships with vagrant-vmware-fusion 4.0.25 up to and including 5.0.4 in order to escalate to root privileges.
Hashicorp Vagrant Vmware Fusion
7.8
CVSSv3
CVE-2017-16777
If HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.3 is installed but VMware Fusion is not, a local attacker can create a fake application directory and exploit the suid sudo helper in order to escalate to root.
Hashicorp Vagrant 5.0.3
1 EDB exploit
7.8
CVSSv3
CVE-2017-16001
In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.1, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges.
Hashicorp Vagrant 5.0.1
1 EDB exploit
7.8
CVSSv3
CVE-2017-12579
An insecure suid wrapper binary in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 4.0.24 and previous versions allows a non-root user to obtain a root shell.
Hashicorp Vagrant Vmware Fusion
1 EDB exploit
7.8
CVSSv3
CVE-2017-7642
The sudo helper in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) prior to 4.0.21 allows local users to gain root privileges by leveraging failure to verify the path to the encoded ruby script or scrub the PATH variable.
Hashicorp Vagrant Vmware Fusion
1 EDB exploit
7.8
CVSSv3
CVE-2016-5330
Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 up to and including 6.0, VMware Workstation Pro 12.1.x prior to 12.1.1, VMware Workstation Player 12.1.x prior to 12.1.1, and VMware Fusion 8.1.x prior to 8.1.1 ...
Vmware Workstation Player
Vmware Workstation Pro
Vmware Esxi
Vmware Fusion
Vmware Tools
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »