Page 5 of 24 results (0.023 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

VMware Workstation before 5.5.4, when running a 64-bit Windows guest on a 64-bit host, allows local users to "corrupt the virtual machine's register context" by debugging a local program and stepping into a "syscall instruction." MVware Workstation anterior a 5.5.4, cuando ejecuta Windows 64-bits como invitado en un anfitrión de 64 bits, permite a usuarios locales "corromper el contexto de registro de la máquina virtual" mediante la depuración de un programa local y el paso a una "instrucción de llamada al sistema" (syscall instruction). • http://osvdb.org/35509 http://secunia.com/advisories/25079 http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23732 http://www.securitytracker.com/id?1018011 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 http://www.vupen.com/english/advisories/2007/1592 https://exchange.xforce.ibmcloud.com/vulnerabilities/33993 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

VMware before 4.5.2.8848-r5 searches for gdk-pixbuf shared libraries using a path that includes the rrdharan world-writable temporary directory, which allows local users to execute arbitrary code. • http://security.gentoo.org/glsa/glsa-200502-18.xml •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

VMware Workstation 4.0.1 for Linux, build 5289 and earlier, allows local users to delete arbitrary files via a symlink attack. • http://marc.info/?l=bugtraq&m=106029217115023&w=2 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1106 •

CVSS: 3.6EPSS: 0%CPEs: 5EXPL: 0

VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack. • http://www.osvdb.org/1205 http://www.securityfocus.com/bid/943 •