Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware fusion 8.5 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-5527
ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.
Vmware Workstation
Vmware Horizon
Vmware Remote Console
Vmware Fusion
Vmware Esxi 6.0
Vmware Esxi 6.5
Vmware Esxi 6.7
7.5
CVSSv3
CVE-2018-15756
Spring Framework, version 5.1, versions 5.0.x before 5.0.10, versions 4.3.x before 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annota...
Vmware Spring Framework
Vmware Spring Framework 5.1.0
Oracle Flexcube Private Banking 12.1.0
Oracle Insurance Policy Administration J2ee 10.2.0
Oracle Retail Xstore Point Of Service 7.1
Oracle Weblogic Server 12.1.3.0.0
Oracle Retail Invoice Matching 13.0
Oracle Flexcube Private Banking 12.0.1
Oracle Primavera Gateway 16.2
Oracle Primavera Gateway 15.2
Oracle Retail Invoice Matching 12.0
Oracle Flexcube Private Banking 12.0.3
Oracle Insurance Rules Palette 10.2.0
Oracle Retail Service Backbone 15.0
Oracle Retail Integration Bus 15.0
Oracle Weblogic Server 10.3.6.0.0
Oracle Weblogic Server 12.2.1.3.0
Oracle Communications Unified Inventory Management 7.3
Oracle Enterprise Manager Ops Center 12.3.3
Oracle Webcenter Sites 12.2.1.3.0
Oracle Endeca Information Discovery Integrator 3.2.0
Oracle Insurance Rules Palette 10.0
5.5
CVSSv3
CVE-2017-4945
VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is c...
Vmware Workstation 12.5.2
Vmware Workstation 12.1.1
Vmware Workstation 12.1
Vmware Workstation 12.0.1
Vmware Workstation 12.5.1
Vmware Workstation 12.5.3
Vmware Workstation 12.5
Vmware Workstation 12.0.0
Vmware Workstation 12.5.0
Vmware Workstation 12.5.4
Vmware Workstation 12.5.5
Vmware Workstation 12.5.6
Vmware Workstation 12.5.7
Vmware Workstation 14.0
Vmware Workstation 12.5.8
Vmware Workstation 12.5.9
Vmware Fusion 8.0
Vmware Fusion 8.0.1
Vmware Fusion 8.0.2
Vmware Fusion 8.1
Vmware Fusion 8.1.1
Vmware Fusion 8.5
5.5
CVSSv3
CVE-2016-5329
VMware Fusion 8.x prior to 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Vmware Fusion 8.0.0
Vmware Fusion 8.0.1
Vmware Fusion 8.0.2
Vmware Fusion 8.1.0
Vmware Fusion 8.1.1
5.3
CVSSv3
CVE-2018-6957
VMware Workstation (14.x prior to 14.1.1, 12.x) and Fusion (10.x prior to 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must...
Vmware Workstation Pro 12.5.3
Vmware Workstation Pro 12.1
Vmware Workstation Pro 12.5.2
Vmware Workstation Pro 12.5.4
Vmware Workstation Pro 12.1.1
Vmware Workstation Pro 12.5.1
Vmware Workstation Pro 12.5.5
Vmware Workstation Pro 12.5.6
Vmware Workstation Pro 12.5.7
Vmware Workstation Pro 12.0
Vmware Workstation Pro 12.01
Vmware Workstation Pro 12.5
Vmware Workstation Pro
Vmware Workstation Player 12.1
Vmware Workstation Player 12.5.4
Vmware Workstation Player 12.5.1
Vmware Workstation Player 12.1.1
Vmware Workstation Player 12.5.2
Vmware Workstation Player 12.5.3
Vmware Workstation Player 12.0.1
Vmware Workstation Player 12.0
Vmware Workstation Player 12.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38627
CVE-2022-45803
CVE-2024-38319
camera
template injection
CVE-2024-27801
CVE-2024-0762
CVE-2024-5791
unauthorized
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started