Page 10 of 49 results (0.012 seconds)

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

The management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges. • http://kb.vmware.com/kb/2118366 http://secunia.com/advisories/21230 http://www.corsaire.com/advisories/c051114-003.txt http://www.kb.cert.org/vuls/id/822476 http://www.securityfocus.com/archive/1/441727/100/100/threaded http://www.securityfocus.com/archive/1/441825/100/100/threaded http://www.securityfocus.com/bid/19249 http://www.vupen.com/english/advisories/2006/3075 https://exchange.xforce.ibmcloud.com/vulnerabilities/28112 •

CVSS: 4.9EPSS: 0%CPEs: 9EXPL: 0

The configuration of VMware ESX Server 2.x, 2.0.x, 2.1.x, and 2.5.x allows local users to cause a denial of service (shutdown) via the (1) halt, (2) poweroff, and (3) reboot scripts executed at the service console. • http://www.osvdb.org/21584 http://www.vmware.com/support/kb/enduser/std_adp.php?p_sid=dsxk%2ABWh&p_lva=&p_faqid=1817 •

CVSS: 4.3EPSS: 1%CPEs: 6EXPL: 1

Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x before 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS). • http://secunia.com/advisories/18250 http://securitytracker.com/id?1015422 http://www.osvdb.org/22119 http://www.securityfocus.com/bid/16086 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2001 http://www.vupen.com/english/advisories/2005/3084 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

VMware ESX Server 1.5.2 before Patch 4 allows local users to execute arbitrary programs as root via certain modified VMware ESX Server environment variables. • http://www.osvdb.org/21585 http://www.vmware.com/download/esx/esx152-patch4.html http://www.vmware.com/support/kb/enduser/std_adp.php?p_sid=dsxk%2ABWh&p_lva=&p_faqid=1108 •