Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware fusion 8.5 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2019-5527
ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.
Vmware Workstation
Vmware Horizon
Vmware Remote Console
Vmware Fusion
Vmware Esxi 6.0
Vmware Esxi 6.5
Vmware Esxi 6.7
445
VMScore
CVE-2018-15756
Spring Framework, version 5.1, versions 5.0.x before 5.0.10, versions 4.3.x before 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annota...
Vmware Spring Framework
Vmware Spring Framework 5.1.0
Oracle Flexcube Private Banking 12.1.0
Oracle Insurance Policy Administration J2ee 10.2.0
Oracle Retail Xstore Point Of Service 7.1
Oracle Weblogic Server 12.1.3.0.0
Oracle Retail Invoice Matching 13.0
Oracle Flexcube Private Banking 12.0.1
Oracle Primavera Gateway 16.2
Oracle Primavera Gateway 15.2
Oracle Retail Invoice Matching 12.0
Oracle Flexcube Private Banking 12.0.3
Oracle Insurance Rules Palette 10.2.0
Oracle Retail Service Backbone 15.0
Oracle Retail Integration Bus 15.0
Oracle Weblogic Server 10.3.6.0.0
Oracle Weblogic Server 12.2.1.3.0
Oracle Communications Unified Inventory Management 7.3
Oracle Enterprise Manager Ops Center 12.3.3
Oracle Webcenter Sites 12.2.1.3.0
Oracle Endeca Information Discovery Integrator 3.2.0
Oracle Insurance Rules Palette 10.0
312
VMScore
CVE-2018-6957
VMware Workstation (14.x prior to 14.1.1, 12.x) and Fusion (10.x prior to 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must...
Vmware Workstation Pro 12.5.3
Vmware Workstation Pro 12.1
Vmware Workstation Pro 12.5.2
Vmware Workstation Pro 12.5.4
Vmware Workstation Pro 12.1.1
Vmware Workstation Pro 12.5.1
Vmware Workstation Pro 12.5.5
Vmware Workstation Pro 12.5.6
Vmware Workstation Pro 12.5.7
Vmware Workstation Pro 12.0
Vmware Workstation Pro 12.01
Vmware Workstation Pro 12.5
Vmware Workstation Pro
Vmware Workstation Player 12.1
Vmware Workstation Player 12.5.4
Vmware Workstation Player 12.5.1
Vmware Workstation Player 12.1.1
Vmware Workstation Player 12.5.2
Vmware Workstation Player 12.5.3
Vmware Workstation Player 12.0.1
Vmware Workstation Player 12.0
Vmware Workstation Player 12.5
187
VMScore
CVE-2017-4945
VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is c...
Vmware Workstation 12.5.2
Vmware Workstation 12.1.1
Vmware Workstation 12.1
Vmware Workstation 12.0.1
Vmware Workstation 12.5.1
Vmware Workstation 12.5.3
Vmware Workstation 12.5
Vmware Workstation 12.0.0
Vmware Workstation 12.5.0
Vmware Workstation 12.5.4
Vmware Workstation 12.5.5
Vmware Workstation 12.5.6
Vmware Workstation 12.5.7
Vmware Workstation 14.0
Vmware Workstation 12.5.8
Vmware Workstation 12.5.9
Vmware Fusion 8.0
Vmware Fusion 8.0.1
Vmware Fusion 8.0.2
Vmware Fusion 8.1
Vmware Fusion 8.1.1
Vmware Fusion 8.5
187
VMScore
CVE-2016-5329
VMware Fusion 8.x prior to 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Vmware Fusion 8.0.0
Vmware Fusion 8.0.1
Vmware Fusion 8.0.2
Vmware Fusion 8.1.0
Vmware Fusion 8.1.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2023-38506
CVE-2024-37198
CVE-2023-45197
CVE-2024-38621
CVE-2024-30103
elevation of privilege
CVE-2024-0044
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started