This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Vmware First view 2019-09-18
Product Vsphere Esxi Last view 2021-09-15
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:* 2
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:* 2
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:* 2
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:* 2
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:* 2
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201808001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:-:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201701001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703002:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201704001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201710001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201712001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201803001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201806001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:u1a:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.7:-:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.7:670-201911001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.7:670-202004001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:u3a:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:update_2:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201905001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.7:*:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:beta:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201810001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201811001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:*:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:update_3:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:u1b:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201903001:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:*:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811002:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.5:update_1:*:*:*:*:*:* 1
cpe:2.3:o:vmware:vsphere_esxi:6.7:update_1:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
8.4 2021-09-15 CVE-2020-3960

VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.

5.4 2019-09-18 CVE-2019-5531

VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-613 Insufficient Session Expiration
50% (1) CWE-125 Out-of-bounds Read