Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vmware fusion 5.0.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-3519
lgtosync.sys in VMware Workstation 9.x prior to 9.0.3, VMware Player 5.x prior to 5.0.3, VMware Fusion 5.x prior to 5.0.4, VMware ESXi 4.0 up to and including 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privilege...
Vmware Esxi 4.0
Vmware Esxi 4.1
Vmware Esxi 5.1
Vmware Esxi 5.0
Vmware Workstation 9.0
Vmware Workstation 9.0.1
Vmware Workstation 9.0.2
Vmware Esx 4.0
Vmware Esx 4.1
Vmware Player 5.0.2
Vmware Player 5.0
Vmware Player 5.0.1
Vmware Fusion 5.0.3
Vmware Fusion 5.0
Vmware Fusion 5.0.2
Vmware Fusion 5.0.1
NA
CVE-2013-1406
The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x prior to 8.0.5 and 9.x prior to 9.0.1 on Windows, VMware Fusion 4.1 prior to 4.1.4 and 5.0 prior to 5.0.2, VMware View 4.x prior to 4.6.2 and 5.x prior to 5.1.2 on Windows, VMw...
Vmware Workstation 8.0.1.27038
Vmware Workstation 8.0.2
Vmware Workstation 8.0.3
Vmware Workstation 8.0.4
Vmware Workstation 8.0.0.18997
Vmware Workstation 8.0.1
Vmware Workstation 8.0
Vmware Workstation 9.0
Vmware Fusion 4.1
Vmware Fusion 4.1.1
Vmware Fusion 4.1.2
Vmware Fusion 4.1.3
Vmware Fusion 5.0
Vmware Fusion 5.0.1
Vmware View 4.0.0
Vmware View 5.1.0
Vmware View 5.1.1
Vmware View 5.0.0
Vmware View 5.0.1
Vmware View 4.5
Vmware View 4.6.0
Vmware View 4.6.1
1 EDB exploit
7.8
CVSSv3
CVE-2017-16512
The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 up to and including 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available.
Hashicorp Vagrant Vmware Fusion
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started