Page 5 of 49 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

06 Apr 2007 — Buffer overflow in VMware ESX Server 3.0.0 and 3.0.1 might allow attackers to gain privileges or cause a denial of service (application crash) via unspecified vectors. Desbordamiento de búfer en VMware ESX Server 3.0.0 y 3.0.1 podría permitir a atacantes remotos obtener privilegios o provocar una denegación de servicio (caída de aplicación) mediante vectores no especificados. • http://secunia.com/advisories/24788 •

CVSS: 9.6EPSS: 5%CPEs: 7EXPL: 1

31 Jul 2006 — VMware ESX Server 2.0.x before 2.0.2 and 2.x before 2.5.2 patch 4 stores authentication credentials in base 64 encoded format in the vmware.mui.kid and vmware.mui.sid cookies, which allows attackers to gain privileges by obtaining the cookies using attacks such as cross-site scripting (CVE-2005-3619). VMware ESX Server 2.0.x versiones anteriores a 2.0.2 y 2.x versiones anteriores a 2.5.2 patch 4 almacena credenciales de autenticación en formato de codificación base 64 en las cookies vmware.mui.kid y vmware.... • https://www.exploit-db.com/exploits/28312 • CWE-255: Credentials Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 11EXPL: 0

19 Jul 2006 — vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key. vmware-config.pl en VMware for Linux, ESX Server 2.x, y Infrastructure 3 no valida el código de retorno desde la llamada a la función Perl chmod, lo cual podría permitir un fichero llave SSL sea creado con una umask no segura que permite a usuarios ... • http://kb.vmware.com/kb/2467205 •

CVSS: 8.8EPSS: 2%CPEs: 3EXPL: 0

31 Dec 2005 — Cross-site request forgery (CSRF) vulnerability in the management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 allows allows remote attackers to perform unauthorized actions as the administrator via URLs, as demonstrated using the setUsr operation to change a password. NOTE: this issue can be leveraged with CVE-2005-3619 to automatically perform the attacks. • http://kb.vmware.com/kb/2118366 •

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 1

31 Dec 2005 — Cross-site scripting (XSS) vulnerability in the management interface for VMware ESX 2.5.x before 2.5.2 upgrade patch 2, 2.1.x before 2.1.2 upgrade patch 6, and 2.0.x before 2.0.1 upgrade patch 6 allows remote attackers to inject arbitrary web script or HTML via messages that are not sanitized when viewing syslog log files. • http://www.corsaire.com/advisories/c051114-002.txt •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2005 — The management interface for VMware ESX Server 2.0.x before 2.0.2 patch 1, 2.1.x before 2.1.3 patch 1, and 2.x before 2.5.3 patch 2 records passwords in cleartext in URLs that are stored in world-readable web server log files, which allows local users to gain privileges. • http://kb.vmware.com/kb/2118366 •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

31 Dec 2005 — The configuration of VMware ESX Server 2.x, 2.0.x, 2.1.x, and 2.5.x allows local users to cause a denial of service (shutdown) via the (1) halt, (2) poweroff, and (3) reboot scripts executed at the service console. • http://www.osvdb.org/21584 •

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 1

29 Dec 2005 — Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x before 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS). • http://secunia.com/advisories/18250 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2003 — VMware ESX Server 1.5.2 before Patch 4 allows local users to execute arbitrary programs as root via certain modified VMware ESX Server environment variables. • http://www.osvdb.org/21585 •