10 results (0.016 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

10 Nov 2008 — Directory traversal vulnerability in VMWare ESXi 3.5 before ESXe350-200810401-O-UG and ESX 3.5 before ESX350-200810201-UG allows administrators with the Datastore.FileManagement privilege to gain privileges via unknown vectors. Vulnerabilidad de salto de directorio en VMWare ESXi 3.5 anterior a ESXe350-200810401-O-UG y ESX 3.5 anterior a ESX350-200810201-UG; permite a los administradores con el privilegio Datastore.FileManagement, ganar privilegios a través de vectores desconocidos. • http://lists.vmware.com/pipermail/security-announce/2008/000042.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 75%CPEs: 16EXPL: 0

21 Sep 2007 — The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory." El servidor DHCP en EMC VMware Workstation anterior a 5.5.5 construcción 56455 y 6.x anterior a 6.0.1 construcción 55017, Player... • http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 72%CPEs: 16EXPL: 0

21 Sep 2007 — Integer underflow in the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed DHCP packet that triggers a stack-based buffer overflow. Desbordamiento inferior de entero en el servidor DHCP de EMC VMware Workstation anterior a 5.5.... • http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 9.6EPSS: 1%CPEs: 7EXPL: 1

31 Jul 2006 — VMware ESX Server 2.0.x before 2.0.2 and 2.x before 2.5.2 patch 4 stores authentication credentials in base 64 encoded format in the vmware.mui.kid and vmware.mui.sid cookies, which allows attackers to gain privileges by obtaining the cookies using attacks such as cross-site scripting (CVE-2005-3619). VMware ESX Server 2.0.x versiones anteriores a 2.0.2 y 2.x versiones anteriores a 2.5.2 patch 4 almacena credenciales de autenticación en formato de codificación base 64 en las cookies vmware.mui.kid y vmware.... • https://www.exploit-db.com/exploits/28312 • CWE-255: Credentials Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 11EXPL: 0

19 Jul 2006 — vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key. vmware-config.pl en VMware for Linux, ESX Server 2.x, y Infrastructure 3 no valida el código de retorno desde la llamada a la función Perl chmod, lo cual podría permitir un fichero llave SSL sea creado con una umask no segura que permite a usuarios ... • http://kb.vmware.com/kb/2467205 •

CVSS: 8.8EPSS: 3%CPEs: 3EXPL: 0

31 Dec 2005 — Cross-site request forgery (CSRF) vulnerability in the management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 allows allows remote attackers to perform unauthorized actions as the administrator via URLs, as demonstrated using the setUsr operation to change a password. NOTE: this issue can be leveraged with CVE-2005-3619 to automatically perform the attacks. • http://kb.vmware.com/kb/2118366 •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

31 Dec 2005 — The configuration of VMware ESX Server 2.x, 2.0.x, 2.1.x, and 2.5.x allows local users to cause a denial of service (shutdown) via the (1) halt, (2) poweroff, and (3) reboot scripts executed at the service console. • http://www.osvdb.org/21584 •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 1

31 Dec 2005 — Cross-site scripting (XSS) vulnerability in the management interface for VMware ESX 2.5.x before 2.5.2 upgrade patch 2, 2.1.x before 2.1.2 upgrade patch 6, and 2.0.x before 2.0.1 upgrade patch 6 allows remote attackers to inject arbitrary web script or HTML via messages that are not sanitized when viewing syslog log files. • http://www.corsaire.com/advisories/c051114-002.txt •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2005 — The management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges. • http://kb.vmware.com/kb/2118366 •

CVSS: 8.8EPSS: 4%CPEs: 6EXPL: 1

29 Dec 2005 — Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x before 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS). • http://secunia.com/advisories/18250 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •