
CVE-2023-29552 – Service Location Protocol (SLP) Denial-of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2023-29552
25 Apr 2023 — The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant ampli... • https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html •

CVE-2022-31699
https://notcve.org/view.php?id=CVE-2022-31699
13 Dec 2022 — VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure. VMware ESXi contiene una vulnerabilidad de desbordamiento del heap. Un actor local malicioso con privilegios restringidos dentro de un proceso de espacio aislado puede aprovechar este problema para lograr una divulgación parcial de información. • https://www.vmware.com/security/advisories/VMSA-2022-0030.html • CWE-787: Out-of-bounds Write •

CVE-2022-31681
https://notcve.org/view.php?id=CVE-2022-31681
07 Oct 2022 — VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host. VMware ESXi contiene una vulnerabilidad de deferencia de puntero null. Un actor malicioso con privilegios dentro del proceso VMX solamente, puede crear una condición de negación de servicio en el host • https://www.vmware.com/security/advisories/VMSA-2022-0025.html • CWE-476: NULL Pointer Dereference •

CVE-2014-1207 – VMware Security Advisory 2014-0001
https://notcve.org/view.php?id=CVE-2014-1207
17 Jan 2014 — VMware ESXi 4.0 through 5.1 and ESX 4.0 and 4.1 allow remote attackers to cause a denial of service (NULL pointer dereference) by intercepting and modifying Network File Copy (NFC) traffic. VMWare ESXi 4.0 hasta 5.1 y ESX 4.0 y 4.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo) interceptando y modificando tráfico Network File Copy (NFC). VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues. • http://osvdb.org/102196 •

CVE-2014-1208 – VMware Security Advisory 2014-0001
https://notcve.org/view.php?id=CVE-2014-1208
17 Jan 2014 — VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port. VMware Workstation 9.x anteriores a 9.0.1, WMware Player 5.x anteriores a 5.0.1, VMware Fusion 5.x anteriores a 5.0.1, VMware ESXi 4.0 hasta 5.1, y WMware ESX 4.0 y 4.1 permite a usuarios invitado del sistema causar una denegación de servicio (ruptura de... • http://osvdb.org/102197 •

CVE-2013-5973 – VMware Security Advisory 2013-0016
https://notcve.org/view.php?id=CVE-2013-5973
23 Dec 2013 — VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename. VMware ESXi 4.0 a 5.5 y ESX 4.0 y 4.1 permiten a usuarios locales leer o modificar ficheros arbitrarios mediante el aprovechamiento de los roles Virtual Machine Power User o Resource Pool Administrator para una acción Add Existing Dis... • http://jvn.jp/en/jp/JVN13154935/index.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-3519 – VMware Security Advisory 2013-0014
https://notcve.org/view.php?id=CVE-2013-3519
04 Dec 2013 — lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation. Igtosync.sys en VMware Workstation 9.x anteriores a 9.0.3 y VMware Player 5.x anteriores a 5.0.3, VMware Fusion 5.x anteriores a 5.0.4, VMware ESXi 4.0 hasta 5.1, y VMware ESX 4.0 y 4.1,... • http://www.vmware.com/security/advisories/VMSA-2013-0014.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-5970 – VMware Security Advisory 2013-0012
https://notcve.org/view.php?id=CVE-2013-5970
18 Oct 2013 — hostd-vmdb in VMware ESXi 4.0 through 5.0 and ESX 4.0 through 4.1 allows remote attackers to cause a denial of service (hostd-vmdb service outage) by modifying management traffic. hostd-vmdb en VMware ESXi 4.0 hasta la versión 5.0 y ESX 4.0 hasta la versión 4.1 permite a atacantes remotos provocar una denegación de servicio (interrupción del servicio hostd-vmdb) mediante la modificación de la gestión de tráfico. VMware has updated vCenter Server, vCenter Server Appliance (vCSA), vSphere Update Manager (VUM)... • http://osvdb.org/98719 • CWE-20: Improper Input Validation •

CVE-2013-3657
https://notcve.org/view.php?id=CVE-2013-3657
10 Sep 2013 — Buffer overflow in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors. Desbordamiento de búfer en VMware ESXi 4.0 hasta 5.0, y ESX 4.0 y 4.1 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio a través de vectores no especificados. • http://jvn.jp/en/jp/JVN19847770/995428/index.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-3658
https://notcve.org/view.php?id=CVE-2013-3658
10 Sep 2013 — Directory traversal vulnerability in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to delete arbitrary host OS files via unspecified vectors. Vulnerabilidad de salto de directorio en VMware ESXi 4.0 hasta 5.0, y ESX 4.0 y 4.1permiten a un atacante remoto borrar archivos a discrección en el sistema operativo anfitrión a través de vectores no especificados. • http://jvn.jp/en/jp/JVN72911629/995428/index.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •