Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
esx vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-4773
The configuration of VMware ESX Server 2.x, 2.0.x, 2.1.x, and 2.5.x allows local users to cause a denial of service (shutdown) via the (1) halt, (2) poweroff, and (3) reboot scripts executed at the service console.
Vmware Esx 1.5.2
Vmware Esx
Vmware Esx 2.0
Vmware Esx 2.0.1
Vmware Esx 2.1.2
Vmware Esx 2.5
Vmware Esx 2.1.1
NA
CVE-2006-2481
VMware ESX Server 2.0.x prior to 2.0.2 and 2.x prior to 2.5.2 patch 4 stores authentication credentials in base 64 encoded format in the vmware.mui.kid and vmware.mui.sid cookies, which allows malicious users to gain privileges by obtaining the cookies using attacks such as cross...
Vmware Esx 2.1
Vmware Esx 2.1.1
Vmware Esx 2.0
Vmware Esx 2.0.1
Vmware Esx 2.5.2
Vmware Esx 2.1.2
Vmware Esx 2.5
1 EDB exploit
NA
CVE-2005-4583
Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x prior to 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS).
Vmware Esx 2.0
Vmware Esx 2.1.1
Vmware Esx 2.1.2
Vmware Esx 2.5
Vmware Esx 2.5.2
Vmware Esx 2.0.1
NA
CVE-2005-3619
Cross-site scripting (XSS) vulnerability in the management interface for VMware ESX 2.5.x prior to 2.5.2 upgrade patch 2, 2.1.x prior to 2.1.2 upgrade patch 6, and 2.0.x prior to 2.0.1 upgrade patch 6 allows remote malicious users to inject arbitrary web script or HTML via messag...
Vmware Esx 2.5
Vmware Esx 2.5.2
Vmware Esx 2.0.1
Vmware Esx 2.1.1
Vmware Esx 2.1.2
Vmware Esx 2.0
NA
CVE-2008-2101
The VMware Consolidated Backup (VCB) command-line utilities in VMware ESX 3.0.1 up to and including 3.0.3 and ESX 3.5 place a password on the command line, which allows local users to obtain sensitive information by listing the process.
Vmware Esx 3.5
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Esx 3.0.3
NA
CVE-2006-3589
vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key.
Vmware Esx 2.1.1
Vmware Esx 2.1.2
Vmware Esx 2.1
Vmware Server 1.0.1 Build 29996
Vmware Workstation 5.5.3
Vmware Esx 2.0.1
Vmware Infrastructure 3
Vmware Player
Vmware Esx 2.0
Vmware Esx 2.5
Vmware Esx 2.5.2
NA
CVE-2008-2100
Multiple buffer overflows in VIX API 1.1.x prior to 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 up to and including 3.5 allow guest OS users to execute ...
Vmware Esx Server 3.5
Vmware Esxi 3.5
Vmware Fusion
Vmware Player
Vmware Esx 2.5.4
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Esx 3.0.2
Vmware Ace
Vmware Server
Vmware Workstation
Vmware Esx Server 3.0
Vmware Esx 2.5.5
Vmware Esx 3.5
NA
CVE-2010-4263
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel prior to 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote malicious use...
Linux Linux Kernel
Vmware Esx 3.5
Vmware Esxi 4.1
Vmware Esxi 4.0
Vmware Esxi 3.5
Vmware Esx 4.1
Vmware Esxi 5.0
Vmware Esx 4.0
Vmware Esx 3.0.0
Vmware Esx 3.0.2
Vmware Esx 3.0.1
Vmware Esx 3.0.3
NA
CVE-2007-1270
Double free vulnerability in VMware ESX Server 3.0.0 and 3.0.1 allows malicious users to cause a denial of service (crash), obtain sensitive information, or possibly execute arbitrary code via unspecified vectors.
Vmware Esx 3.0.0
Vmware Esx 3.0.1
Vmware Esx Server 3.0
NA
CVE-2007-1271
Buffer overflow in VMware ESX Server 3.0.0 and 3.0.1 might allow malicious users to gain privileges or cause a denial of service (application crash) via unspecified vectors.
Vmware Esx 3.0.0
Vmware Esx 3.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »