Page 18 of 87 results (0.005 seconds)

CVSS: 3.6EPSS: 0%CPEs: 11EXPL: 0

vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key. vmware-config.pl en VMware for Linux, ESX Server 2.x, y Infrastructure 3 no valida el código de retorno desde la llamada a la función Perl chmod, lo cual podría permitir un fichero llave SSL sea creado con una umask no segura que permite a usuarios locales leer o modificar la llave SSL. • http://kb.vmware.com/kb/2467205 http://secunia.com/advisories/21120 http://secunia.com/advisories/23680 http://securitytracker.com/id?1016536 http://www.osvdb.org/27418 http://www.securityfocus.com/archive/1/440583/100/0/threaded http://www.securityfocus.com/archive/1/441082/100/0/threaded http://www.securityfocus.com/archive/1/456546/100/200/threaded http://www.securityfocus.com/bid/19060 http://www.securityfocus.com/bid/19062 http://www.vmware.com/support/esx2 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

VMware Server before RC1 does not clear user credentials from memory after a console connection is made, which might allow local attackers to gain privileges. • http://securitytracker.com/id?1016200 http://www.securityfocus.com/archive/1/435709/100/0/threaded http://www.securityfocus.com/bid/18236 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2124 http://www.vupen.com/english/advisories/2006/2104 https://exchange.xforce.ibmcloud.com/vulnerabilities/26879 •