Page 4 of 48 results (0.009 seconds)

CVSS: 7.1EPSS: 0%CPEs: 16EXPL: 0

23 Dec 2013 — VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename. VMware ESXi 4.0 a 5.5 y ESX 4.0 y 4.1 permiten a usuarios locales leer o modificar ficheros arbitrarios mediante el aprovechamiento de los roles Virtual Machine Power User o Resource Pool Administrator para una acción Add Existing Dis... • http://jvn.jp/en/jp/JVN13154935/index.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

04 Dec 2013 — lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation. Igtosync.sys en VMware Workstation 9.x anteriores a 9.0.3 y VMware Player 5.x anteriores a 5.0.3, VMware Fusion 5.x anteriores a 5.0.4, VMware ESXi 4.0 hasta 5.1, y VMware ESX 4.0 y 4.1,... • http://www.vmware.com/security/advisories/VMSA-2013-0014.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Oct 2013 — hostd-vmdb in VMware ESXi 4.0 through 5.0 and ESX 4.0 through 4.1 allows remote attackers to cause a denial of service (hostd-vmdb service outage) by modifying management traffic. hostd-vmdb en VMware ESXi 4.0 hasta la versión 5.0 y ESX 4.0 hasta la versión 4.1 permite a atacantes remotos provocar una denegación de servicio (interrupción del servicio hostd-vmdb) mediante la modificación de la gestión de tráfico. VMware has updated vCenter Server, vCenter Server Appliance (vCSA), vSphere Update Manager (VUM)... • http://osvdb.org/98719 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 11EXPL: 0

10 Sep 2013 — Buffer overflow in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors. Desbordamiento de búfer en VMware ESXi 4.0 hasta 5.0, y ESX 4.0 y 4.1 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio a través de vectores no especificados. • http://jvn.jp/en/jp/JVN19847770/995428/index.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.4EPSS: 0%CPEs: 11EXPL: 0

10 Sep 2013 — Directory traversal vulnerability in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to delete arbitrary host OS files via unspecified vectors. Vulnerabilidad de salto de directorio en VMware ESXi 4.0 hasta 5.0, y ESX 4.0 y 4.1permiten a un atacante remoto borrar archivos a discrección en el sistema operativo anfitrión a través de vectores no especificados. • http://jvn.jp/en/jp/JVN72911629/995428/index.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.9EPSS: 0%CPEs: 14EXPL: 0

30 Aug 2013 — VMware ESXi 4.0 through 5.1, and ESX 4.0 and 4.1, does not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to cause a denial of service (unhandled exception and application crash) by modifying the client-server data stream. VMware ESXi v4.0 hasta v5.1, y ESX v4.0 y v4.1 no aplicar correctamente el protocolo Network File Copy (NFC), lo que permite a atacantes man-in-the-middle causar una denegación de servicio (excepción sin manejar y caída de aplicación) med... • http://www.vmware.com/security/advisories/VMSA-2013-0011.html • CWE-20: Improper Input Validation •

CVSS: 8.1EPSS: 1%CPEs: 32EXPL: 0

22 Feb 2013 — VMware vCenter Server 4.0 before Update 4b, 5.0 before Update 2, and 5.1 before 5.1.0b; VMware ESXi 3.5 through 5.1; and VMware ESX 3.5 through 4.1 do not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption) by modifying the client-server data stream. VMware vCenter Server v4.0 anterior a Update 4b, v5.0 anterior a Update 2, y v5.1 anterior a 5.1.0b; VMware ESXi v3.5 a la v5.1; y VMware ES... • http://www.vmware.com/security/advisories/VMSA-2013-0003.html •

CVSS: 7.8EPSS: 0%CPEs: 41EXPL: 1

11 Feb 2013 — The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors. La implementación en vmci.sys en el Virtual Machine Communic... • https://www.exploit-db.com/exploits/40164 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 2%CPEs: 48EXPL: 0

14 Jun 2012 — VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file. VMware Workstation v7.x antes de v7.1.6 y v8.x antes de v8.0.4, VMware Player v3.x antes de v3.1.6 y v4.x antes de v4.0.4, VMware Fusion... • http://www.vmware.com/security/advisories/VMSA-2012-0011.html • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

14 Jun 2012 — VMware Workstation 8.x before 8.0.4, VMware Player 4.x before 4.0.4, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow remote attackers to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device. VMware Workstation antes de v8.0.4 8.x, VMware Player antes de v4.0.4 4.x, VMware ESXi v3.5 a v5.0 y VMware ESX v3.5 a v4.1 permiten a atacantes remotos causar una denegación de servicio (caida del sistema operativo huesped) a través de tráfico de red de un dispos... • http://www.vmware.com/security/advisories/VMSA-2012-0011.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •