Summary
Detail | |||
---|---|---|---|
Vendor | Vmware | First view | 2008-06-05 |
Product | Esxi | Last view | 2023-04-25 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:* | 20 |
cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:* | 14 |
cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:* | 13 |
cpe:2.3:a:vmware:esxi:*:*:*:*:*:*:*:* | 5 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2023-04-25 | CVE-2023-29552 | The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. |
6.5 | 2022-10-07 | CVE-2022-31681 | VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host. |
6.5 | 2020-12-21 | CVE-2020-3999 | VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition. |
7.8 | 2016-08-07 | CVE-2016-5330 | Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory. |
2.1 | 2011-06-06 | CVE-2011-2146 | mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors. |
6.3 | 2011-06-06 | CVE-2011-2145 | mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error." |
6.9 | 2011-06-06 | CVE-2011-1787 | Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory. |
5 | 2011-05-09 | CVE-2011-1789 | The self-extracting installer in the vSphere Client Installer package in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, VMware ESXi 4.x before 4.1 Update 1, and VMware ESX 4.x before 4.1 Update 1 does not have a digital signature, which might make it easier for remote attackers to spoof the software distribution via a Trojan horse installer. |
5 | 2011-05-03 | CVE-2011-1786 | lsassd in Likewise Open /Enterprise 5.3 before build 7845, Open 6.0 before build 8325, and Enterprise 6.0 before build 178, as distributed in VMware ESXi 4.1 and ESX 4.1 and possibly other products, allows remote attackers to cause a denial of service (daemon crash) via an Active Directory login attempt that provides a username containing an invalid byte sequence. |
7.8 | 2011-05-03 | CVE-2011-1785 | VMware ESXi 4.0 and 4.1 and ESX 4.0 and 4.1 allow remote attackers to cause a denial of service (socket exhaustion) via unspecified network traffic. |
5 | 2011-03-11 | CVE-2010-3609 | The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information. |
7.8 | 2011-02-17 | CVE-2011-0355 | Cisco Nexus 1000V Virtual Ethernet Module (VEM) 4.0(4) SV1(1) through SV1(3b), as used in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, does not properly handle dropped packets, which allows guest OS users to cause a denial of service (ESX or ESXi host OS crash) by sending an 802.1Q tagged packet over an access vEthernet port, aka Cisco Bug ID CSCtj17451. |
9.3 | 2010-12-22 | CVE-2010-4573 | The Update Installer in VMware ESXi 4.1, when a modified sfcb.cfg is present, does not properly configure the SFCB authentication mode, which allows remote attackers to obtain access via an arbitrary username and password. |
7.2 | 2010-12-06 | CVE-2010-4297 | The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a "command injection" issue. |
8.5 | 2010-04-12 | CVE-2010-1142 | VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk. |
8.5 | 2010-04-12 | CVE-2010-1141 | VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share. |
5 | 2009-11-02 | CVE-2009-3733 | Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors. |
6.9 | 2009-11-02 | CVE-2009-2267 | VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register. |
4 | 2009-06-01 | CVE-2009-1805 | Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors. |
6.8 | 2009-04-13 | CVE-2009-1244 | Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916. |
4.7 | 2009-02-03 | CVE-2008-4914 | Unspecified vulnerability in VMware ESXi 3.5 before ESXe350-200901401-I-SG and ESX 3.5 before ESX350-200901401-SG allows local administrators to cause a denial of service (host crash) via a snapshot with a malformed VMDK delta disk. |
7.2 | 2008-12-08 | CVE-2008-4917 | Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption. |
6.9 | 2008-11-10 | CVE-2008-4915 | The CPU hardware emulation in VMware Workstation 6.0.5 and earlier and 5.5.8 and earlier; Player 2.0.x through 2.0.5 and 1.0.x through 1.0.8; ACE 2.0.x through 2.0.5 and earlier, and 1.0.x through 1.0.7; Server 1.0.x through 1.0.7; ESX 2.5.4 through 3.5; and ESXi 3.5, when running 32-bit and 64-bit guest operating systems, does not properly handle the Trap flag, which allows authenticated guest OS users to gain privileges on the guest OS. |
9.3 | 2008-11-10 | CVE-2008-4281 | Directory traversal vulnerability in VMWare ESXi 3.5 before ESXe350-200810401-O-UG and ESX 3.5 before ESX350-200810201-UG allows administrators with the Datastore.FileManagement privilege to gain privileges via unknown vectors. |
7.2 | 2008-06-05 | CVE-2008-2100 | Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
20% (4) | CWE-399 | Resource Management Errors |
20% (4) | CWE-264 | Permissions, Privileges, and Access Controls |
10% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
10% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
10% (2) | CWE-20 | Improper Input Validation |
5% (1) | CWE-476 | NULL Pointer Dereference |
5% (1) | CWE-426 | Untrusted Search Path |
5% (1) | CWE-362 | Race Condition |
5% (1) | CWE-310 | Cryptographic Issues |
5% (1) | CWE-287 | Improper Authentication |
5% (1) | CWE-200 | Information Exposure |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:5583 | VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Pri... |
oval:org.mitre.oval:def:4768 | VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Pri... |
oval:org.mitre.oval:def:5759 | VMware ESX Openwsman Lets Local Users Gain Root Privileges |
oval:org.mitre.oval:def:5640 | VMware ESX Openwsman Lets Local Users Gain Root Privileges |
oval:org.mitre.oval:def:5647 | VMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code |
oval:org.mitre.oval:def:5081 | VMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code |
oval:org.mitre.oval:def:6425 | VMware ESX Administrative Directory Traversal Bug May Allow Administrators to... |
oval:org.mitre.oval:def:6309 | VMware CPU Hardware Emulation Bug Lets Local Users Gain Elevated Privileges |
oval:org.mitre.oval:def:6246 | VMware ESX Virtual Hardware Memory Access Bug Lets Local Users Gain Elevated ... |
oval:org.mitre.oval:def:5909 | VMware ESX Server VMDK Delta Disk Processing Lets Local Administrative Users ... |
oval:org.mitre.oval:def:6065 | VMware Multiple Hosted Products Display Function Code Execution Vulnerability |
oval:org.mitre.oval:def:6130 | VMware Descheduled Time Accounting Driver Bug Lets Local Users on the Guest O... |
oval:org.mitre.oval:def:8473 | VMware improper setting of the exception code on page faults vulnerability |
oval:org.mitre.oval:def:7822 | VMware directory traversal vulnerability |
oval:org.mitre.oval:def:7020 | Windows-based VMware Tools Unsafe Library Loading vulnerability |
oval:org.mitre.oval:def:20535 | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party upda... |
oval:org.mitre.oval:def:13982 | USN-1118-1 -- openslp, openslp-dfsg vulnerability |
oval:org.mitre.oval:def:20296 | VMware ESXi and ESX Denial of Service and third party updates for Likewise co... |
oval:org.mitre.oval:def:13242 | Firmware ESXi and ESX Denial of Service and third party updates for Likewise ... |
oval:org.mitre.oval:def:20427 | VMware ESXi and ESX Denial of Service and third party updates for Likewise co... |
oval:org.mitre.oval:def:20345 | VMware hosted product updates, ESX patches and VI Client update resolve multi... |
oval:org.mitre.oval:def:20554 | VMware hosted product updates, ESX patches and VI Client update resolve multi... |
oval:org.mitre.oval:def:20206 | VMware hosted product updates, ESX patches and VI Client update resolve multi... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
73866 | VMware Multiple Products vSphere Client Installer Digital Signature Verificat... |
73742 | Likewise Open / Enterprise lsassd Service Remote DoS |
73242 | VMware Multiple Products mount.vmhgfs Host File Existence Disclosure |
73241 | VMware Multiple Products mount.vmhgfs Symlink Arbitrary Guest OS File Manipul... |
73240 | VMware Multiple Products mount.vmhgfs Race Condition Filesystem Mounting Loca... |
72118 | VMware ESX Server / ESXi Unspecified Socket Exhaustion Remote DoS |
71019 | VMware ESX Server / ESXi Service Location Protocol Daemon Unspecified DoS |
70837 | Cisco Nexus 1000V Virtual Switch 802.1Q Tagged Packet Remote DoS |
70114 | VMware ESXi Update Installer Arbitrary Credentials SFCB Authentication Mode B... |
69590 | VMware Tools Update Guest System Unspecified Arbitrary Command Injection |
63859 | VMWare Tools Unsafe Library Loading Arbitrary Code Execution |
63858 | VMware Tools Malformed Executable Guest Arbitrary Code Execution |
59441 | VMware Multiple Products Guest OS Page Fault Local Privilege Escalation |
59440 | VMware Multiple Products sdk Path HTTP Request Directory Traversal Arbitrary ... |
54922 | VMware Multiple Products on Windows Descheduled Time Accounting Driver Unspec... |
53634 | VMware Multiple Products Display Function Host OS Arbitrary Code Execution |
52705 | VMware ESX / ESXi Malformed VMDK Delta Disk Handling DoS |
52704 | VMware Multiple Products Unspecified Virtual Hardware Request Memory Corruption |
49947 | VMware ESX / ESXi Datastore.FileManagement Unspecified Traversal Privilege Es... |
49795 | VMware Multiple Products CPU Hardware Emulation Trap Flag Handling Guest OS U... |
46204 | VMware Multiple Products vmware-authd Search Path Subversion Local Privilege ... |
46203 | VMware Multiple Products VIX API Unspecified VM Host Arbitrary Code Execution |
46089 | VMware openwsman Management Service Content-Length Processing Remote Overflow |
ExploitDB Exploits
id | Description |
---|---|
33310 | VMware Server <= 2.0.1,ESXi Server <= 3.5 Directory Traversal Vulnerabi... |
15717 | VMware Tools update OS Command Injection |
OpenVAS Exploits
id | Description |
---|---|
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-25 (vmware-server vmware-player vmware-w... File : nvt/glsa_201209_25.nasl |
2012-08-24 | Name : Mandriva Update for openslp MDVSA-2012:141 (openslp) File : nvt/gb_mandriva_MDVSA_2012_141.nasl |
2012-04-16 | Name : VMSA-2010-0007: VMware hosted products, vCenter Server and ESX patches resolv... File : nvt/gb_VMSA-2010-0007.nasl |
2012-03-16 | Name : VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple securi... File : nvt/gb_VMSA-2010-0018.nasl |
2012-03-16 | Name : VMSA-2011-0004.3 VMware ESX/ESXi SLPD denial of service vulnerability and ESX... File : nvt/gb_VMSA-2011-0004.nasl |
2012-03-16 | Name : VMSA-2011-0009.3 VMware hosted product updates, ESX patches and VI Client upd... File : nvt/gb_VMSA-2011-0009.nasl |
2012-03-15 | Name : VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates ... File : nvt/gb_VMSA-2011-0007.nasl |
2011-06-13 | Name : VMware Products Multiple Vulnerabilities (Linux) -june11 File : nvt/gb_vmware_prdts_mult_vuln_lin_jun11.nasl |
2011-06-13 | Name : VMware Products Multiple Vulnerabilities (Win) - jun 11 File : nvt/gb_vmware_prdts_mult_vuln_win_jun11.nasl |
2011-05-10 | Name : Ubuntu Update for openslp-dfsg USN-1118-1 File : nvt/gb_ubuntu_USN_1118_1.nasl |
2010-12-13 | Name : VMware Products Tools Local Privilege Escalation Vulnerability (Windows) File : nvt/gb_vmware_prdts_tools_loc_prev_escl_vuln_win.nasl |
2010-12-13 | Name : VMware Products Tools Local Privilege Escalation Vulnerability (Linux) File : nvt/gb_vmware_prdts_tools_loc_prev_escl_vuln_lin.nasl |
2010-04-16 | Name : VMware Products Tools Remote Code Execution Vulnerabilies (win) File : nvt/gb_vmware_prdts_tools_code_exec_vuln_win.nasl |
2010-04-16 | Name : VMware Products Tools Remote Code Execution Vulnerabilies (win) File : nvt/gb_vmware_prdts_tools_code_exec_vuln_lin.nasl |
2010-02-23 | Name : VMware Products Directory Traversal Vulnerability File : nvt/vmware_36842_remote.nasl |
2009-11-05 | Name : VMware Products Guest Privilege Escalation Vulnerability - Nov09 (Win) File : nvt/gb_vmware_prdts_priv_esc_vuln_nov09_win.nasl |
2009-11-05 | Name : VMware Products Guest Privilege Escalation Vulnerability - Nov09 (Linux) File : nvt/gb_vmware_prdts_priv_esc_vuln_nov09_lin.nasl |
2009-11-05 | Name : VMware Serve Directory Traversal Vulnerability - Nov09 (Linux) File : nvt/gb_vmware_serv_dir_trav_vuln_nov09_lin.nasl |
2009-06-09 | Name : VMware Products Descheduled Time Accounting Driver DoS Vulnerability (Win) File : nvt/gb_vmware_prdts_dos_vuln_win_jun09.nasl |
2009-06-09 | Name : VMware Products Descheduled Time Accounting Driver DoS Vulnerability (Linux) File : nvt/gb_vmware_prdts_dos_vuln_lin_jun09.nasl |
2009-05-18 | Name : VMware Products Multiple Vulnerabilities (Linux) Apr09 File : nvt/secpod_vmware_prdts_mult_vuln_lin_apr09.nasl |
2009-05-18 | Name : VMware Products Multiple Vulnerabilities (Win) Apr09 File : nvt/secpod_vmware_prdts_mult_vuln_win_apr09.nasl |
2008-12-15 | Name : VMware Products Trap Flag In-Guest Privilege Escalation Vulnerability (Win) File : nvt/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl |
2008-12-15 | Name : VMware Products Trap Flag In-Guest Privilege Escalation Vulnerability (Linux) File : nvt/gb_vmware_prdts_inguest_prv_esc_vuln_lin.nasl |
2008-09-29 | Name : VMware VIX API Multiple Buffer Overflow Vulnerabilities (Win) File : nvt/gb_vmware_prdts_vix_api_mult_vuln.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2011-A-0075 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0028311 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
2011-B-0031 | Cisco Nexus 1000V Virtual Ethernet Module (VEM) Denial of Service Vulnerability Severity: Category I - VMSKEY: V0026089 |
2010-A-0168 | Multiple Vulnerabilities in VMware Products Severity: Category II - VMSKEY: V0025835 |
2010-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0023997 |
2009-B-0006 | Multiple Vulnerabilities in VMware Severity: Category I - VMSKEY: V0018295 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-04-14 | VmWare Tools command injection attempt RuleID : 38243 - Type : SERVER-WEBAPP - Revision : 2 |
2016-04-14 | VmWare Tools command injection attempt RuleID : 38242 - Type : SERVER-WEBAPP - Revision : 2 |
2014-01-10 | PcVue SVUIGrd.ocx ActiveX function call access RuleID : 27112 - Type : BROWSER-PLUGINS - Revision : 5 |
2014-01-10 | PcVue SVUIGrd.ocx ActiveX clsid access RuleID : 27111 - Type : BROWSER-PLUGINS - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-07-10 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201707-05.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote VMware ESXi host is missing a security-related patch. File: vmware_VMSA-2010-0020.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: A virtualization application installed on the remote host is affected by an a... File: vmware_workstation_win_vmsa_2016_0010.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: A virtualization application installed on the remote host is affected by an a... File: vmware_workstation_linux_vmsa_2016_0010.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: A virtualization application installed on the remote host is affected by an a... File: vmware_player_win_vmsa_2016_0010.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: A virtualization application installed on the remote host is affected by an a... File: vmware_player_linux_vmsa_2016_0010.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: The remote VMware ESXi host is affected by multiple vulnerabilities. File: vmware_VMSA-2016-0010_remote.nasl - Type: ACT_GATHER_INFO |
2016-08-12 | Name: A virtualization application installed on the remote Mac OS X host is affecte... File: macosx_fusion_vmsa_2016_0010.nasl - Type: ACT_GATHER_INFO |
2016-03-08 | Name: The remote VMware ESX / ESXi host is missing a security-related patch. File: vmware_VMSA-2010-0018_remote.nasl - Type: ACT_GATHER_INFO |
2016-03-08 | Name: The remote VMware ESX host is missing a security-related patch. File: vmware_VMSA-2010-0007_remote.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote VMware ESX / ESXi host is missing a security-related patch. File: vmware_VMSA-2011-0004_remote.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote VMware ESX / ESXi host is missing a security-related patch. File: vmware_VMSA-2011-0007_remote.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote VMware ESX / ESXi host is missing a security-related patch. File: vmware_VMSA-2011-0008_remote.nasl - Type: ACT_GATHER_INFO |
2016-03-04 | Name: The remote VMware ESX / ESXi host is missing a security-related patch. File: vmware_VMSA-2011-0009_remote.nasl - Type: ACT_GATHER_INFO |
2016-03-03 | Name: The remote host is missing a security-related patch. File: vmware_VMSA-2009-0007_remote.nasl - Type: ACT_GATHER_INFO |
2015-09-04 | Name: The remote Debian host is missing a security update. File: debian_DLA-304.nasl - Type: ACT_GATHER_INFO |
2015-05-29 | Name: The remote Fedora host is missing a security update. File: fedora_2015-7561.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: suse_11_4_libvmtools-devel-110608.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: suse_11_3_openslp-101012.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: suse_11_3_libvmtools-devel-110607.nasl - Type: ACT_GATHER_INFO |
2013-08-13 | Name: The remote device is missing a vendor-supplied security update. File: cisco-CSCtj17451-nxos.nasl - Type: ACT_GATHER_INFO |
2013-04-20 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2013-111.nasl - Type: ACT_GATHER_INFO |
2012-10-01 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201209-25.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2012-141.nasl - Type: ACT_GATHER_INFO |
2011-09-21 | Name: The remote VMware ESX host is missing a security-related patch. File: vmware_VMSA-2010-0007.nasl - Type: ACT_GATHER_INFO |