39 results (0.014 seconds)

CVSS: 7.8EPSS: 83%CPEs: 9EXPL: 2

25 Apr 2023 — The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor. The Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant ampli... • https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html •

CVSS: 3.3EPSS: 0%CPEs: 285EXPL: 0

13 Dec 2022 — VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure. VMware ESXi contiene una vulnerabilidad de desbordamiento del heap. Un actor local malicioso con privilegios restringidos dentro de un proceso de espacio aislado puede aprovechar este problema para lograr una divulgación parcial de información. • https://www.vmware.com/security/advisories/VMSA-2022-0030.html • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 21EXPL: 0

07 Oct 2022 — VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host. VMware ESXi contiene una vulnerabilidad de deferencia de puntero null. Un actor malicioso con privilegios dentro del proceso VMX solamente, puede crear una condición de negación de servicio en el host • https://www.vmware.com/security/advisories/VMSA-2022-0025.html • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 1%CPEs: 14EXPL: 0

17 Jan 2014 — VMware ESXi 4.0 through 5.1 and ESX 4.0 and 4.1 allow remote attackers to cause a denial of service (NULL pointer dereference) by intercepting and modifying Network File Copy (NFC) traffic. VMWare ESXi 4.0 hasta 5.1 y ESX 4.0 y 4.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo) interceptando y modificando tráfico Network File Copy (NFC). VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues. • http://osvdb.org/102196 •

CVSS: 6.5EPSS: 0%CPEs: 17EXPL: 0

17 Jan 2014 — VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port. VMware Workstation 9.x anteriores a 9.0.1, WMware Player 5.x anteriores a 5.0.1, VMware Fusion 5.x anteriores a 5.0.1, VMware ESXi 4.0 hasta 5.1, y WMware ESX 4.0 y 4.1 permite a usuarios invitado del sistema causar una denegación de servicio (ruptura de... • http://osvdb.org/102197 •

CVSS: 7.1EPSS: 0%CPEs: 16EXPL: 0

23 Dec 2013 — VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename. VMware ESXi 4.0 a 5.5 y ESX 4.0 y 4.1 permiten a usuarios locales leer o modificar ficheros arbitrarios mediante el aprovechamiento de los roles Virtual Machine Power User o Resource Pool Administrator para una acción Add Existing Dis... • http://jvn.jp/en/jp/JVN13154935/index.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

04 Dec 2013 — lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation. Igtosync.sys en VMware Workstation 9.x anteriores a 9.0.3 y VMware Player 5.x anteriores a 5.0.3, VMware Fusion 5.x anteriores a 5.0.4, VMware ESXi 4.0 hasta 5.1, y VMware ESX 4.0 y 4.1,... • http://www.vmware.com/security/advisories/VMSA-2013-0014.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

18 Oct 2013 — hostd-vmdb in VMware ESXi 4.0 through 5.0 and ESX 4.0 through 4.1 allows remote attackers to cause a denial of service (hostd-vmdb service outage) by modifying management traffic. hostd-vmdb en VMware ESXi 4.0 hasta la versión 5.0 y ESX 4.0 hasta la versión 4.1 permite a atacantes remotos provocar una denegación de servicio (interrupción del servicio hostd-vmdb) mediante la modificación de la gestión de tráfico. VMware has updated vCenter Server, vCenter Server Appliance (vCSA), vSphere Update Manager (VUM)... • http://osvdb.org/98719 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 11EXPL: 0

10 Sep 2013 — Buffer overflow in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors. Desbordamiento de búfer en VMware ESXi 4.0 hasta 5.0, y ESX 4.0 y 4.1 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio a través de vectores no especificados. • http://jvn.jp/en/jp/JVN19847770/995428/index.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.4EPSS: 0%CPEs: 11EXPL: 0

10 Sep 2013 — Directory traversal vulnerability in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to delete arbitrary host OS files via unspecified vectors. Vulnerabilidad de salto de directorio en VMware ESXi 4.0 hasta 5.0, y ESX 4.0 y 4.1permiten a un atacante remoto borrar archivos a discrección en el sistema operativo anfitrión a través de vectores no especificados. • http://jvn.jp/en/jp/JVN72911629/995428/index.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •