VMware

ESXi

123 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.26%
  • Published 10.09.2013 11:28:40
  • Last modified 11.04.2025 00:51:21

Buffer overflow in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors.

  • EPSS 0.58%
  • Published 10.09.2013 11:28:40
  • Last modified 11.04.2025 00:51:21

Directory traversal vulnerability in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to delete arbitrary host OS files via unspecified vectors.

  • EPSS 0.36%
  • Published 04.09.2013 03:24:36
  • Last modified 11.04.2025 00:51:21

VMware ESXi 4.0 through 5.1, and ESX 4.0 and 4.1, does not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to cause a denial of service (unhandled exception and application crash) by modifying the cli...

  • EPSS 1.13%
  • Published 22.02.2013 20:55:01
  • Last modified 11.04.2025 00:51:21

VMware vCenter Server 4.0 before Update 4b, 5.0 before Update 2, and 5.1 before 5.1.0b; VMware ESXi 3.5 through 5.1; and VMware ESX 3.5 through 4.1 do not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attacke...

  • EPSS 0.9%
  • Published 15.02.2013 12:09:29
  • Last modified 11.04.2025 00:51:21

VMware vCenter Server 4.0 before Update 4b and 4.1 before Update 3a, VMware VirtualCenter 2.5, VMware vSphere Client 4.0 before Update 4b and 4.1 before Update 3a, VMware VI-Client 2.5, VMware ESXi 3.5 through 4.1, and VMware ESX 3.5 through 4.1 do n...

  • EPSS 0.74%
  • Published 11.02.2013 22:55:01
  • Last modified 11.04.2025 00:51:21

The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1...

  • EPSS 1.28%
  • Published 20.11.2012 05:52:02
  • Last modified 11.04.2025 00:51:21

The vSphere API in VMware ESXi 4.1 and ESX 4.1 allows remote attackers to cause a denial of service (host daemon crash) via an invalid value in a (1) RetrieveProp or (2) RetrievePropEx SOAP request.

  • EPSS 2.03%
  • Published 14.06.2012 20:55:01
  • Last modified 11.04.2025 00:51:21

VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute...

  • EPSS 0.45%
  • Published 14.06.2012 20:55:01
  • Last modified 11.04.2025 00:51:21

VMware Workstation 8.x before 8.0.4, VMware Player 4.x before 4.0.4, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow remote attackers to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device.

  • EPSS 1.16%
  • Published 04.05.2012 16:55:01
  • Last modified 11.04.2025 00:51:21

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host...