Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware workstation 6.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-3694
Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x prior to 5.5.8 build 108000, VMware Workstation 6.0.x prior to 6.0.5 build 109488, VMware Player 1.x prior to 1.0.8 build 108000, VMware Player 2.x prior to 2.0.5 build 109488, VMware ACE 1.x prior...
Vmware Server
Vmware Workstation
Vmware Ace
Vmware Player
10
CVSSv2
CVE-2008-3695
Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x prior to 5.5.8 build 108000, VMware Workstation 6.0.x prior to 6.0.5 build 109488, VMware Player 1.x prior to 1.0.8 build 108000, VMware Player 2.x prior to 2.0.5 build 109488, VMware ACE 1.x prior...
Vmware Workstation
Vmware Ace
Vmware Player
Vmware Server
10
CVSSv2
CVE-2008-3696
Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x prior to 5.5.8 build 108000, VMware Workstation 6.0.x prior to 6.0.5 build 109488, VMware Player 1.x prior to 1.0.8 build 108000, VMware Player 2.x prior to 2.0.5 build 109488, VMware ACE 1.x prior...
Vmware Server
Vmware Workstation
Vmware Ace
Vmware Player
10
CVSSv2
CVE-2008-3892
Buffer overflow in a certain ActiveX control in the COM API in VMware Workstation 5.5.x prior to 5.5.8 build 108000, VMware Workstation 6.0.x prior to 6.0.5 build 109488, VMware Player 1.x prior to 1.0.8 build 108000, VMware Player 2.x prior to 2.0.5 build 109488, VMware ACE 1.x ...
Vmware Player
Vmware Ace
Vmware Server
Vmware Workstation
1 EDB exploit
7.5
CVSSv2
CVE-2019-5544
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
Vmware Esxi 6.0
Vmware Esxi 6.5
Vmware Esxi 6.7
Vmware Horizon Daas
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Eus 7.7
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Openslp Openslp 1.2.1
Openslp Openslp 2.0.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
2 Github repositories
7.2
CVSSv2
CVE-2019-14835
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length t...
Linux Linux Kernel 5.3
Linux Linux Kernel
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.0
Opensuse Leap 15.1
Netapp Aff A700s Firmware -
Netapp H410c Firmware -
Netapp H610s Firmware -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H300e Firmware -
Netapp H500e Firmware -
1 Article
4.7
CVSSv2
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6