Summary
Detail | |||
---|---|---|---|
Vendor | Vmware | First view | 1999-06-26 |
Product | Workstation | Last view | 2020-12-21 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2020-12-21 | CVE-2020-3999 | VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition. |
5.3 | 2020-10-20 | CVE-2020-3995 | In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time. |
7.7 | 2020-10-20 | CVE-2020-3982 | VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's vmx process or corrupt hypervisor's memory heap. |
5.8 | 2020-10-20 | CVE-2020-3981 | VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process. |
5.5 | 2020-06-25 | CVE-2020-3971 | VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory. |
3.8 | 2020-06-25 | CVE-2020-3970 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine's vmx process leading to a partial denial of service condition. |
8.2 | 2020-06-25 | CVE-2020-3968 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. |
7.5 | 2020-06-25 | CVE-2020-3967 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. |
7.5 | 2020-06-25 | CVE-2020-3966 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. |
5.5 | 2020-06-25 | CVE-2020-3965 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine. |
4.7 | 2020-06-25 | CVE-2020-3964 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor's memory. Additional conditions beyond the attacker's control need to be present for exploitation to be possible. |
5.5 | 2020-06-25 | CVE-2020-3963 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory. |
7.8 | 2020-06-24 | CVE-2020-3969 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible. |
8.2 | 2020-06-24 | CVE-2020-3962 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. |
3.3 | 2020-05-29 | CVE-2020-3959 | VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine's vmx process leading to a partial denial of service. |
5.5 | 2020-05-29 | CVE-2020-3958 | VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.5.2) and VMware Fusion (11.x before 11.5.2) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine's vmx process leading to a denial of service condition. |
3.8 | 2020-03-17 | CVE-2020-3951 | VMware Workstation (15.x before 15.5.2) and Horizon Client for Windows (5.x and prior before 5.4.0) contain a denial-of-service vulnerability due to a heap-overflow issue in Cortado Thinprint. Attackers with non-administrative access to a guest VM with virtual printing enabled may exploit this issue to create a denial-of-service condition of the Thinprint service running on the system where Workstation or Horizon Client is installed. |
7.8 | 2020-03-16 | CVE-2020-3948 | Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM. |
8.8 | 2020-03-16 | CVE-2020-3947 | VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine. |
7.8 | 2020-03-16 | CVE-2019-5543 | For VMware Horizon Client for Windows (5.x and prior before 5.3.0), VMware Remote Console for Windows (10.x before 11.0.0), VMware Workstation for Windows (15.x before 15.5.2) the folder containing configuration files for the VMware USB arbitration service was found to be writable by all users. A local user on the system where the software is installed may exploit this issue to run commands as any user. |
7.8 | 2019-12-23 | CVE-2019-5539 | VMware Workstation (15.x prior to 15.5.1) and Horizon View Agent (7.10.x prior to 7.10.1 and 7.5.x prior to 7.5.4) contain a DLL hijacking vulnerability due to insecure loading of a DLL by Cortado Thinprint. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to administrator on a Windows machine where Workstation or View Agent is installed. |
8.6 | 2019-12-05 | CVE-2019-5098 | An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. |
7.7 | 2019-11-20 | CVE-2019-5542 | VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. |
9.1 | 2019-11-20 | CVE-2019-5541 | VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM. |
7.7 | 2019-11-20 | CVE-2019-5540 | VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
18% (24) | CWE-264 | Permissions, Privileges, and Access Controls |
12% (17) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12% (16) | CWE-125 | Out-of-bounds Read |
9% (12) | CWE-787 | Out-of-bounds Write |
7% (10) | CWE-20 | Improper Input Validation |
5% (7) | CWE-399 | Resource Management Errors |
4% (6) | CWE-200 | Information Exposure |
3% (5) | CWE-416 | Use After Free |
3% (4) | CWE-476 | NULL Pointer Dereference |
2% (3) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
2% (3) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
2% (3) | CWE-362 | Race Condition |
2% (3) | CWE-134 | Uncontrolled Format String |
2% (3) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (2) | CWE-426 | Untrusted Search Path |
1% (2) | CWE-284 | Access Control (Authorization) Issues |
1% (2) | CWE-190 | Integer Overflow or Wraparound |
0% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (1) | CWE-427 | Uncontrolled Search Path Element |
0% (1) | CWE-269 | Improper Privilege Management |
0% (1) | CWE-193 | Off-by-one Error |
0% (1) | CWE-191 | Integer Underflow (Wrap or Wraparound) |
0% (1) | CWE-189 | Numeric Errors |
0% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
0% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-234 | Hijacking a privileged process |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:16767 | USN-543-1 -- linux-restricted-modules-2.6.17/20, vmware-player-kernel-2.6.15 ... |
oval:org.mitre.oval:def:5688 | VMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain ... |
oval:org.mitre.oval:def:5358 | VMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain ... |
oval:org.mitre.oval:def:5583 | VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Pri... |
oval:org.mitre.oval:def:4768 | VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Pri... |
oval:org.mitre.oval:def:5647 | VMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code |
oval:org.mitre.oval:def:5081 | VMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code |
oval:org.mitre.oval:def:5929 | ESX 2.5.4 through 3.5 allows authenticated guest OS users to gain additional ... |
oval:org.mitre.oval:def:6309 | VMware CPU Hardware Emulation Bug Lets Local Users Gain Elevated Privileges |
oval:org.mitre.oval:def:6246 | VMware ESX Virtual Hardware Memory Access Bug Lets Local Users Gain Elevated ... |
oval:org.mitre.oval:def:6251 | VMware Heap Overflows in VNnc Codec Lets Remote Users Execute Arbitrary Code |
oval:org.mitre.oval:def:5786 | VMWare Guest Virtual Device Driver Vulnerability |
oval:org.mitre.oval:def:6310 | VMware Bug in 'hcmon.sys' Lets Local Privileged Users Deny Service |
oval:org.mitre.oval:def:5471 | VMware Windows 'vmci.sys' Driver Lets Local Users Gain Elevated Privileges |
oval:org.mitre.oval:def:6065 | VMware Multiple Hosted Products Display Function Code Execution Vulnerability |
oval:org.mitre.oval:def:6130 | VMware Descheduled Time Accounting Driver Bug Lets Local Users on the Guest O... |
oval:org.mitre.oval:def:8473 | VMware improper setting of the exception code on page faults vulnerability |
oval:org.mitre.oval:def:7020 | Windows-based VMware Tools Unsafe Library Loading vulnerability |
oval:org.mitre.oval:def:11851 | Mozilla Firefox/Thunderbird/SeaMonkey 'libpng' Buffer Overflow Vulnerability |
oval:org.mitre.oval:def:22383 | RHSA-2010:0534: libpng security update (Important) |
oval:org.mitre.oval:def:13405 | USN-960-1 -- libpng vulnerabilities |
oval:org.mitre.oval:def:13338 | DSA-2072-1 libpng -- several |
oval:org.mitre.oval:def:11512 | DSA-2072 libpng -- several vulnerabilities |
oval:org.mitre.oval:def:23184 | ELSA-2010:0534: libpng security update (Important) |
oval:org.mitre.oval:def:20345 | VMware hosted product updates, ESX patches and VI Client update resolve multi... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76060 | VMware Multiple Product UDF Filesystem ISO Image Handling Overflow |
73242 | VMware Multiple Products mount.vmhgfs Host File Existence Disclosure |
73241 | VMware Multiple Products mount.vmhgfs Symlink Arbitrary Guest OS File Manipul... |
73240 | VMware Multiple Products mount.vmhgfs Race Condition Filesystem Mounting Loca... |
71783 | VMware Workstation vmrun Unspecified Shared Library Local Privilege Escalation |
69596 | VMware Multiple Products VMnc Decoder Frame Decompression Memory Corruption |
69590 | VMware Tools Update Guest System Unspecified Arbitrary Command Injection |
69585 | VMware Multiple Products vmware-mount Mounting Process Race Condition Privile... |
69584 | VMware Multiple Products vmware-mount Library Loading Arbitrary Code Execution |
68273 | VMware Multiple Products Installer index.htm File Rendering Local Script Mani... |
66600 | Mozilla Multiple Products PNG File Handling Overflow |
65853 | libpng pngrutil.c sCAL Chunk Memory Corruption DoS |
65852 | libpng pngpread.c PNG Image Data Height Overflow |
64127 | VMware Multiple Products vmware-authd.exe Multiple Command \x25\x90 Sequence ... |
63860 | VMWare Multiple Products USB Service Host Privilege Escalation |
63859 | VMWare Tools Unsafe Library Loading Arbitrary Code Execution |
63858 | VMware Tools Malformed Executable Guest Arbitrary Code Execution |
63607 | VMware Fusion vmware-vmx Process Virtual Networking Stack Memory Disclosure |
63606 | VMware VIX API vmrun Utility Process List Format String Local Privilege Escal... |
59441 | VMware Multiple Products Guest OS Page Fault Local Privilege Escalation |
58728 | VMware Multiple Products Authorization Service vmware-authd.exe Login Request... |
57836 | VMware Workstation Movie Decoder VMnc Codec (vmnc.dll) Crafted AVI File Handl... |
57835 | VMware Workstation Movie Decoder VMnc Codec (vmnc.dll) Crafted Video File Han... |
55943 | VMWare Multiple Products VMnc Codec (vmnc.dll) Invalid RFB Message Type Handl... |
55942 | VMWare Multiple Products VMnc Codec (vmnc.dll) Open-DML Standard Index dwSize... |
ExploitDB Exploits
id | Description |
---|---|
15717 | VMware Tools update OS Command Injection |
14422 | libpng <= 1.4.2 Denial of Service Vulnerability |
OpenVAS Exploits
id | Description |
---|---|
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-25 (vmware-server vmware-player vmware-w... File : nvt/glsa_201209_25.nasl |
2012-06-15 | Name : VMSA-2012-0011 VMware Workstation, Player, Fusion, ESXi and ESX patches addre... File : nvt/gb_VMSA-2012-0011.nasl |
2012-05-03 | Name : VMSA-2012-0009 VMware Workstation, Player, ESXi and ESX patches address criti... File : nvt/gb_VMSA-2012-0009.nasl |
2012-04-16 | Name : VMSA-2010-0007: VMware hosted products, vCenter Server and ESX patches resolv... File : nvt/gb_VMSA-2010-0007.nasl |
2012-04-13 | Name : VMSA-2012-0007 VMware hosted products and ESX patches address privilege escal... File : nvt/gb_VMSA-2012-0007.nasl |
2012-03-16 | Name : VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple securi... File : nvt/gb_VMSA-2010-0018.nasl |
2012-03-16 | Name : VMSA-2011-0009.3 VMware hosted product updates, ESX patches and VI Client upd... File : nvt/gb_VMSA-2011-0009.nasl |
2011-11-17 | Name : VMware Fusion UDF File Systems Buffer Overflow Vulnerability (Mac OS X) File : nvt/secpod_vmware_fusion_udf_filesys_bof_vuln_macosx.nasl |
2011-11-17 | Name : VMware Products UDF File Systems Buffer Overflow Vulnerability (Linux) File : nvt/secpod_vmware_prdts_udf_filesys_bof_vuln_lin.nasl |
2011-11-17 | Name : VMware Products UDF File Systems Buffer Overflow Vulnerability (Win) File : nvt/secpod_vmware_prdts_udf_filesys_bof_vuln_win.nasl |
2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
2011-08-26 | Name : Apple iTunes Multiple Vulnerabilities (Mac OS X) File : nvt/secpod_itunes_mult_vuln_macosx.nasl |
2011-08-09 | Name : CentOS Update for libpng CESA-2010:0534 centos5 i386 File : nvt/gb_CESA-2010_0534_libpng_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for thunderbird CESA-2010:0545 centos5 i386 File : nvt/gb_CESA-2010_0545_thunderbird_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for firefox CESA-2010:0547 centos5 i386 File : nvt/gb_CESA-2010_0547_firefox_centos5_i386.nasl |
2011-06-13 | Name : VMware Products Multiple Vulnerabilities (Linux) -june11 File : nvt/gb_vmware_prdts_mult_vuln_lin_jun11.nasl |
2011-06-13 | Name : VMware Products Multiple Vulnerabilities (Win) - jun 11 File : nvt/gb_vmware_prdts_mult_vuln_win_jun11.nasl |
2011-04-11 | Name : VMware Workstation 'vmrun' Library Path Privilege Escalation Vulnerability (L... File : nvt/gb_vmware_workstation_loc_prev_escl_vuln_lin.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201010-01 (libpng) File : nvt/glsa_201010_01.nasl |
2010-12-13 | Name : VMware Products Memory Corruption and Buffer Overflow Vulnerability (Win) File : nvt/gb_vmware_prdts_mem_corruption_n_bof_vuln_win.nasl |
2010-12-13 | Name : VMware Products Multiple Local Privilege Escalation Vulnerabilities (Linux) File : nvt/gb_vmware_prdts_mult_loc_prev_escl_vuln_lin.nasl |
2010-12-13 | Name : VMware Products Tools Local Privilege Escalation Vulnerability (Linux) File : nvt/gb_vmware_prdts_tools_loc_prev_escl_vuln_lin.nasl |
2010-12-13 | Name : VMware Products Tools Local Privilege Escalation Vulnerability (Windows) File : nvt/gb_vmware_prdts_tools_loc_prev_escl_vuln_win.nasl |
2010-10-01 | Name : VMware Products Security Bypass Vulnerability (Linux) -Sep10 File : nvt/secpod_vmware_prdts_sec_bypass_vuln_lin_sep10.nasl |
2010-10-01 | Name : VMware Products Security Bypass Vulnerability (Win) -Sep10 File : nvt/secpod_vmware_prdts_sec_bypass_vuln_win_sep10.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0146 | VMware Workstation Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0061091 |
2015-A-0147 | VMware Player Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0061069 |
2015-B-0077 | VMware Fusion Denial of Service Vulnerability Severity: Category I - VMSKEY: V0060979 |
2015-B-0076 | Multiple Vulnerabilities in VMware Horizon View Client Severity: Category I - VMSKEY: V0060965 |
2015-A-0029 | Multiple Vulnerabilities in VMware Fusion Severity: Category I - VMSKEY: V0058535 |
2015-B-0012 | Multiple Vulnerabilities in VMware ESXi 5.0 Severity: Category I - VMSKEY: V0058517 |
2015-B-0013 | Multiple Vulnerabilities in VMware ESXi 5.1 Severity: Category I - VMSKEY: V0058515 |
2015-B-0014 | Multiple Vulnerabilities in VMware ESXi 5.5 Severity: Category I - VMSKEY: V0058513 |
2014-B-0069 | VMware ESXi 5.1 Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0051857 |
2014-B-0070 | VMware ESXi 5.5 Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0051855 |
2014-B-0068 | VMware ESXi 5.0 Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0051851 |
2014-B-0010 | Multiple Vulnerabilities in VMware ESXi 5.1 Severity: Category I - VMSKEY: V0043881 |
2014-B-0009 | Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1 Severity: Category I - VMSKEY: V0043880 |
2014-B-0008 | Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity: Category I - VMSKEY: V0043879 |
2014-A-0019 | Multiple Vulnerabilities in VMware Fusion Severity: Category I - VMSKEY: V0043844 |
2013-A-0222 | Multiple Vulnerabilties in VMware Workstation Severity: Category II - VMSKEY: V0042383 |
2013-A-0221 | Multiple Vulnerabilties in VMware Player Severity: Category II - VMSKEY: V0042382 |
2013-A-0205 | VMware ESXi 5.0 Denial of Service Vulnerability Severity: Category I - VMSKEY: V0041367 |
2012-A-0187 | Multiple Vulnerabilities in VMware Workstation Severity: Category I - VMSKEY: V0034960 |
2012-A-0188 | Multiple Vulnerabilities in VMware Player Severity: Category I - VMSKEY: V0034959 |
2012-A-0100 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0032847 |
2012-A-0099 | Multiple Vulnerabilities in VMware ESXi 4.0 and ESX 4.0 Severity: Category I - VMSKEY: V0032846 |
2012-A-0098 | Multiple Vulnerabilities in VMware ESXi 3.5 and ESX 3.5 Severity: Category I - VMSKEY: V0032845 |
2012-A-0075 | Multiple Vulnerabilities in VMware Fusion Severity: Category I - VMSKEY: V0032174 |
2012-A-0073 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0032171 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | PORT overflow attempt RuleID : 8480 - Type : PROTOCOL-FTP - Revision : 12 |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52307 - Type : FILE-IMAGE - Revision : 1 |
2019-12-24 | Mutiple products libpng extra row heap overflow attempt RuleID : 52306 - Type : FILE-IMAGE - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0890 attack attempt RuleID : 51462 - Type : FILE-OTHER - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0890 attack attempt RuleID : 51461 - Type : FILE-OTHER - Revision : 1 |
2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45444 - Type : OS-OTHER - Revision : 2 |
2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45443 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45368 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45367 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45366 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45365 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45364 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45363 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45362 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45361 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45360 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45359 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45358 - Type : OS-OTHER - Revision : 2 |
2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45357 - Type : OS-OTHER - Revision : 2 |
2016-04-14 | VmWare Tools command injection attempt RuleID : 38243 - Type : SERVER-WEBAPP - Revision : 2 |
2016-04-14 | VmWare Tools command injection attempt RuleID : 38242 - Type : SERVER-WEBAPP - Revision : 2 |
2014-01-10 | PcVue SVUIGrd.ocx ActiveX function call access RuleID : 27112 - Type : BROWSER-PLUGINS - Revision : 5 |
2014-01-10 | PcVue SVUIGrd.ocx ActiveX clsid access RuleID : 27111 - Type : BROWSER-PLUGINS - Revision : 5 |
2014-01-10 | VMWare authorization service user credential parsing DoS attempt RuleID : 20058 - Type : SERVER-OTHER - Revision : 4 |
2014-01-10 | EPRT overflow attempt RuleID : 17329 - Type : PROTOCOL-FTP - Revision : 8 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-23 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0030.nasl - Type: ACT_GATHER_INFO |
2018-11-12 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0027.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL91229003.nasl - Type: ACT_GATHER_INFO |
2018-10-31 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201810-06.nasl - Type: ACT_GATHER_INFO |
2018-10-26 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0026.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1236.nasl - Type: ACT_GATHER_INFO |
2018-08-20 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0022.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0098.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0011.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote Debian host is missing a security update. File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO |
2018-07-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1422.nasl - Type: ACT_GATHER_INFO |
2018-05-24 | Name: A virtualization application installed on the remote macOS or Mac OS X host i... File: macosx_fusion_vmsa_2018_0013.nasl - Type: ACT_GATHER_INFO |
2018-05-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-1369.nasl - Type: ACT_GATHER_INFO |
2018-05-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4187.nasl - Type: ACT_GATHER_INFO |
2018-05-02 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4188.nasl - Type: ACT_GATHER_INFO |
2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-956.nasl - Type: ACT_GATHER_INFO |
2018-03-29 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_1ce95bc7327811e8b52700012e582166.nasl - Type: ACT_GATHER_INFO |
2018-03-15 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-0512.nasl - Type: ACT_GATHER_INFO |
2018-02-27 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-057-01.nasl - Type: ACT_GATHER_INFO |
2018-02-23 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4120.nasl - Type: ACT_GATHER_INFO |
2018-02-22 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-956.nasl - Type: ACT_GATHER_INFO |
2018-02-05 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-006.nasl - Type: ACT_GATHER_INFO |
2018-01-30 | Name: A web browser installed on the remote Windows host is affected by multiple se... File: google_chrome_64_0_3282_119.nasl - Type: ACT_GATHER_INFO |
2018-01-26 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-0151.nasl - Type: ACT_GATHER_INFO |
2018-01-25 | Name: The remote AIX host is missing a security patch. File: aix_IJ03029.nasl - Type: ACT_GATHER_INFO |