This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Vmware First view 2008-11-10
Product Esxi Last view 2025-03-04
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* 51
cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:* 47
cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:* 47
cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:* 47
cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:* 46
cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:* 45
cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:* 44
cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:* 43
cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:* 43

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6 2025-03-04 CVE-2025-22226

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.

8.2 2025-03-04 CVE-2025-22225

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

8.2 2025-03-04 CVE-2025-22224

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

0 2024-06-25 CVE-2024-37086

VMware ESXi contains an out-of-bounds read vulnerability. A
malicious actor with local administrative privileges on a virtual machine with an existing snapshot may trigger an out-of-bounds read leading to a denial-of-service condition of the host.

7.2 2024-06-25 CVE-2024-37085

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

7.8 2024-05-21 CVE-2024-22273

The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.

0 2024-03-05 CVE-2024-22255

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process. Â

8.2 2024-03-05 CVE-2024-22254

VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.

6.7 2024-03-05 CVE-2024-22253

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

6.7 2024-03-05 CVE-2024-22252

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

7.5 2023-04-25 CVE-2023-29552

The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.

8.2 2022-12-14 CVE-2022-31705

VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

3.3 2022-12-13 CVE-2022-31699

VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure.

8.8 2022-12-13 CVE-2022-31696

VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox.

6.5 2022-10-07 CVE-2022-31681

VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.

6.5 2022-07-14 CVE-2022-23825

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

5.5 2022-06-15 CVE-2022-21166

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

5.5 2022-06-15 CVE-2022-21125

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

5.5 2022-06-15 CVE-2022-21123

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

7.5 2022-02-16 CVE-2021-22050

ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests.

7.5 2022-02-16 CVE-2021-22043

VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files.

7.8 2022-02-16 CVE-2021-22042

VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.

6.7 2022-02-16 CVE-2021-22041

VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

6.7 2022-02-16 CVE-2021-22040

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

7.8 2022-01-04 CVE-2021-22045

VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
15% (14) CWE-787 Out-of-bounds Write
15% (14) CWE-125 Out-of-bounds Read
8% (8) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (7) CWE-416 Use After Free
6% (6) CWE-264 Permissions, Privileges, and Access Controls
5% (5) CWE-476 NULL Pointer Dereference
5% (5) CWE-20 Improper Input Validation
4% (4) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
3% (3) CWE-459 Incomplete Cleanup
3% (3) CWE-287 Improper Authentication
3% (3) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
2% (2) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
2% (2) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (1) CWE-770 Allocation of Resources Without Limits or Throttling
1% (1) CWE-668 Exposure of Resource to Wrong Sphere
1% (1) CWE-617 Reachable Assertion
1% (1) CWE-613 Insufficient Session Expiration
1% (1) CWE-426 Untrusted Search Path
1% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (1) CWE-362 Race Condition
1% (1) CWE-284 Access Control (Authorization) Issues
1% (1) CWE-252 Unchecked Return Value
1% (1) CWE-203 Information Exposure Through Discrepancy
1% (1) CWE-193 Off-by-one Error

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:6425 VMware ESX Administrative Directory Traversal Bug May Allow Administrators to...
oval:org.mitre.oval:def:9262 Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2....
oval:org.mitre.oval:def:7783 VMware libxml2 use-after-free vulnerability
oval:org.mitre.oval:def:22743 ELSA-2009:1206: libxml and libxml2 security update (Moderate)
oval:org.mitre.oval:def:28958 RHSA-2009:1206 -- libxml and libxml2 security update (Moderate)
oval:org.mitre.oval:def:9142 The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and ...
oval:org.mitre.oval:def:8557 VMware kernel udp_sendmsg function vulnerability
oval:org.mitre.oval:def:11514 Service Console update for COS kernel
oval:org.mitre.oval:def:22460 ELSA-2009:1222: kernel security and bug fix update (Important)
oval:org.mitre.oval:def:28627 RHSA-2009:1222 -- kernel security and bug fix update (Important)
oval:org.mitre.oval:def:20506 VMware ESX third party updates for Service Console packages glibc, sudo, and ...
oval:org.mitre.oval:def:22008 RHSA-2010:0792: kernel security update (Important)
oval:org.mitre.oval:def:21695 RHSA-2010:0842: kernel security and bug fix update (Important)
oval:org.mitre.oval:def:20540 VMware ESX third party updates for Service Console packages glibc and dhcp
oval:org.mitre.oval:def:23172 ELSA-2010:0842: kernel security and bug fix update (Important)
oval:org.mitre.oval:def:23030 ELSA-2010:0792: kernel security update (Important)
oval:org.mitre.oval:def:28217 DEPRECATED: ELSA-2010-0792 -- kernel security update (important)
oval:org.mitre.oval:def:19965 VMware ESX third party updates for Service Console packages glibc and dhcp
oval:org.mitre.oval:def:20594 VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client,...
oval:org.mitre.oval:def:17183 VMware Tools Display Driver Privilege Escalation
oval:org.mitre.oval:def:20252 VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client,...
oval:org.mitre.oval:def:17258 VMware Tools Display Driver Privilege Escalation
oval:org.mitre.oval:def:20625 VMware ESXi and ESX address several security issues
oval:org.mitre.oval:def:17110 VMware ROM Overwrite Privilege Escalation
oval:org.mitre.oval:def:15209 BIOS ROM Corruption Vulnerability (CVE-2012-1515)

SAINT Exploits

Description Link
VMware ESXi OpenSLP heap overflow More info here

Open Source Vulnerability Database (OSVDB)

id Description
70483 Linux Kernel igb Subsystem drivers/net/igb/igb_main.c igb_receive_skb Functio...
69117 Linux Kernel net/rds/page.c rds_page_copy_user() Function Local Privilege Esc...
66470 OpenLDAP servers/slapd/modrdn.c modrdn Request rdn String Memory Corruption
57462 Linux Kernel net/ipv*/udp.c MSG_MORE Flag Local Privilege Escalation
56985 libxml2 XML File Multiple Attribute Type Handling DoS
49947 VMware ESX / ESXi Datastore.FileManagement Unspecified Traversal Privilege Es...

ExploitDB Exploits

id Description
15285 Linux RDS Protocol Local Privilege Escalation
9575 Linux Kernel < 2.6.19 - udp_sendmsg Local Root Exploit
9574 Linux Kernel < 2.6.19 udp_sendmsg Local Root Exploit (x86/x64)
9542 Linux Kernel 2.6 < 2.6.19 (32bit) ip_append_data() ring0 Root Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-11-16 Name : VMSA-2012-0016: VMware security updates for vSphere API and ESX Service Console
File : nvt/gb_VMSA-2012-0016.nasl
2012-06-15 Name : VMSA-2012-0011 VMware Workstation, Player, Fusion, ESXi and ESX patches addre...
File : nvt/gb_VMSA-2012-0011.nasl
2012-06-13 Name : Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
File : nvt/secpod_ms12-042.nasl
2012-06-05 Name : RedHat Update for kernel RHSA-2011:0007-01
File : nvt/gb_RHSA-2011_0007-01_kernel.nasl
2012-05-03 Name : VMSA-2012-0009 VMware Workstation, Player, ESXi and ESX patches address criti...
File : nvt/gb_VMSA-2012-0009.nasl
2012-04-13 Name : VMSA-2012-0007 VMware hosted products and ESX patches address privilege escal...
File : nvt/gb_VMSA-2012-0007.nasl
2012-04-02 Name : VMSA-2012-0006 VMware ESXi and ESX address several security issues
File : nvt/gb_VMSA-2012-0006.nasl
2012-03-16 Name : VMSA-2011-0012.3 VMware ESXi and ESX updates to third party libraries and ESX...
File : nvt/gb_VMSA-2011-0012.nasl
2012-03-16 Name : VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, ...
File : nvt/gb_VMSA-2012-0005.nasl
2011-12-02 Name : Fedora Update for kernel FEDORA-2011-16346
File : nvt/gb_fedora_2011_16346_kernel_fc14.nasl
2011-11-08 Name : Fedora Update for kernel FEDORA-2011-15241
File : nvt/gb_fedora_2011_15241_kernel_fc14.nasl
2011-10-31 Name : Fedora Update for kernel FEDORA-2011-14747
File : nvt/gb_fedora_2011_14747_kernel_fc14.nasl
2011-10-10 Name : Fedora Update for kernel FEDORA-2011-12874
File : nvt/gb_fedora_2011_12874_kernel_fc14.nasl
2011-09-07 Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007)
File : nvt/gb_macosx_su10-007.nasl
2011-08-27 Name : Fedora Update for kernel FEDORA-2011-11103
File : nvt/gb_fedora_2011_11103_kernel_fc14.nasl
2011-08-09 Name : CentOS Update for libxml CESA-2009:1206 centos3 i386
File : nvt/gb_CESA-2009_1206_libxml_centos3_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2010:0792 centos5 i386
File : nvt/gb_CESA-2010_0792_kernel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for compat-openldap CESA-2010:0542 centos5 i386
File : nvt/gb_CESA-2010_0542_compat-openldap_centos5_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1233 centos3 i386
File : nvt/gb_CESA-2009_1233_kernel_centos3_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1223 centos4 i386
File : nvt/gb_CESA-2009_1223_kernel_centos4_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1222 centos5 i386
File : nvt/gb_CESA-2009_1222_kernel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for libxml2 CESA-2009:1206 centos5 i386
File : nvt/gb_CESA-2009_1206_libxml2_centos5_i386.nasl
2011-07-18 Name : Ubuntu Update for linux-mvl-dove USN-1159-1
File : nvt/gb_ubuntu_USN_1159_1.nasl
2011-07-08 Name : Ubuntu Update for linux-mvl-dove USN-1162-1
File : nvt/gb_ubuntu_USN_1162_1.nasl
2011-06-24 Name : Fedora Update for kernel FEDORA-2011-6447
File : nvt/gb_fedora_2011_6447_kernel_fc13.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0029 Multiple Vulnerabilities in VMware Fusion
Severity: Category I - VMSKEY: V0058535
2015-B-0012 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0058517
2015-B-0013 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0058515
2015-B-0014 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0058513
2014-A-0104 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0053193
2014-B-0069 VMware ESXi 5.1 Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0051857
2014-B-0070 VMware ESXi 5.5 Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0051855
2014-B-0068 VMware ESXi 5.0 Privilege Escalation Vulnerability
Severity: Category I - VMSKEY: V0051851
2014-B-0009 Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1
Severity: Category I - VMSKEY: V0043880
2014-B-0008 Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0
Severity: Category I - VMSKEY: V0043879
2014-B-0010 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0043881
2014-A-0019 Multiple Vulnerabilities in VMware Fusion
Severity: Category I - VMSKEY: V0043844
2013-A-0222 Multiple Vulnerabilties in VMware Workstation
Severity: Category II - VMSKEY: V0042383
2013-A-0221 Multiple Vulnerabilties in VMware Player
Severity: Category II - VMSKEY: V0042382
2013-A-0218 VMware ESX/ESXi 4.1 Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0042309
2013-A-0205 VMware ESXi 5.0 Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0041367
2013-A-0204 VMware ESX/ESXi 4.0 Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0041366
2013-B-0098 VMware ESXi 5.1 Remote Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040211
2013-B-0095 VMware ESX 4.0 and ESXi 4.0 Remote Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040209
2013-B-0096 VMware ESX 4.1 and ESXi 4.1 Remote Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0040208
2013-A-0055 VMware ESXi 4.0 and ESX 4.0 Memory Corruption Vulnerability
Severity: Category I - VMSKEY: V0037067
2013-A-0056 VMware ESXi 3.5 and ESX 3.5 Memory Corruption Vulnerability
Severity: Category I - VMSKEY: V0037066
2013-A-0053 VMware ESXi 5.1 Memory Corruption Vulnerability
Severity: Category I - VMSKEY: V0037065
2013-B-0018 Multiple Vulnerabilities in VMware vCenter Server 5.0
Severity: Category I - VMSKEY: V0037063
2013-B-0012 VMware vCenter 4.1 Server and vSphere 4.1 Client Memory Corruption Vulnerability
Severity: Category II - VMSKEY: V0036789

Snort® IPS/IDS

Date Description
2018-02-20 Intel x64 side-channel analysis information leak attempt
RuleID : 45444 - Type : OS-OTHER - Revision : 2
2018-02-20 Intel x64 side-channel analysis information leak attempt
RuleID : 45443 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x64 side-channel analysis information leak attempt
RuleID : 45368 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x64 side-channel analysis information leak attempt
RuleID : 45367 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45366 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45365 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45364 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45363 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45362 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45361 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45360 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45359 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45358 - Type : OS-OTHER - Revision : 2
2018-02-06 Intel x86 side-channel analysis information leak attempt
RuleID : 45357 - Type : OS-OTHER - Revision : 2
2014-11-16 VMWare vSphere API SOAP request RetrieveProperties remote denial of service a...
RuleID : 31297 - Type : SERVER-WEBAPP - Revision : 3
2014-01-10 OpenLDAP Modrdn utf-8 string code execution attempt
RuleID : 18804 - Type : SERVER-WEBAPP - Revision : 11

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-11-12 Name: A virtualization application installed on the remote macOS or Mac OS X host i...
File: macosx_fusion_vmsa_2018_0027.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL91229003.nasl - Type: ACT_GATHER_INFO
2018-10-31 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201810-06.nasl - Type: ACT_GATHER_INFO
2018-10-26 Name: A virtualization application installed on the remote macOS or Mac OS X host i...
File: macosx_fusion_vmsa_2018_0026.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1236.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-1_0-0098.nasl - Type: ACT_GATHER_INFO
2018-07-24 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0011.nasl - Type: ACT_GATHER_INFO
2018-07-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO
2018-07-16 Name: The remote Debian host is missing a security update.
File: debian_DLA-1422.nasl - Type: ACT_GATHER_INFO
2018-05-03 Name: The remote Debian host is missing a security update.
File: debian_DLA-1369.nasl - Type: ACT_GATHER_INFO
2018-05-02 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4187.nasl - Type: ACT_GATHER_INFO
2018-05-02 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4188.nasl - Type: ACT_GATHER_INFO
2018-04-18 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-956.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_1ce95bc7327811e8b52700012e582166.nasl - Type: ACT_GATHER_INFO
2018-03-27 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201803-12.nasl - Type: ACT_GATHER_INFO
2018-03-15 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0512.nasl - Type: ACT_GATHER_INFO
2018-02-27 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-057-01.nasl - Type: ACT_GATHER_INFO
2018-02-23 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4120.nasl - Type: ACT_GATHER_INFO
2018-02-22 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-956.nasl - Type: ACT_GATHER_INFO
2018-02-05 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-006.nasl - Type: ACT_GATHER_INFO
2018-01-30 Name: A web browser installed on the remote Windows host is affected by multiple se...
File: google_chrome_64_0_3282_119.nasl - Type: ACT_GATHER_INFO
2018-01-26 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0151.nasl - Type: ACT_GATHER_INFO
2018-01-25 Name: The remote AIX host is missing a security patch.
File: aix_IJ03029.nasl - Type: ACT_GATHER_INFO
2018-01-25 Name: The remote AIX host is missing a security patch.
File: aix_IJ03030.nasl - Type: ACT_GATHER_INFO
2018-01-25 Name: The remote AIX host is missing a security patch.
File: aix_IJ03032.nasl - Type: ACT_GATHER_INFO