Vulnerabilities > Vmware

DATE CVE VULNERABILITY TITLE RISK
2023-10-25 CVE-2023-34048 Out-of-bounds Write vulnerability in VMWare Vcenter Server
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
network
low complexity
vmware CWE-787
critical
9.8
2023-10-25 CVE-2023-34056 Unspecified vulnerability in VMWare Vcenter Server
vCenter Server contains a partial information disclosure vulnerability. A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data.
network
low complexity
vmware
4.3
2023-10-25 CVE-2023-46118 Resource Exhaustion vulnerability in VMWare Rabbitmq
RabbitMQ is a multi-protocol messaging and streaming broker.
network
low complexity
vmware CWE-400
4.9
2023-10-25 CVE-2023-46120 Resource Exhaustion vulnerability in VMWare Rabbitmq Java Client
The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes.
network
low complexity
vmware CWE-400
7.5
2023-10-20 CVE-2023-34045 Unspecified vulnerability in VMWare Fusion 13.0.0/13.0.1/13.0.2
VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
local
low complexity
vmware
7.8
2023-10-20 CVE-2023-34044 Out-of-bounds Read vulnerability in VMWare Fusion and Workstation
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
local
low complexity
vmware CWE-125
6.0
2023-10-20 CVE-2023-34046 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in VMWare Fusion 13.0.0/13.0.1/13.0.2
VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
local
high complexity
vmware CWE-367
7.0
2023-10-20 CVE-2023-34051 Incorrect Authorization vulnerability in VMWare Aria Operations for Logs
VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.
network
low complexity
vmware CWE-863
critical
9.8
2023-10-20 CVE-2023-34052 Deserialization of Untrusted Data vulnerability in VMWare Aria Operations for Logs
VMware Aria Operations for Logs contains a deserialization vulnerability. A malicious actor with non-administrative access to the local system can trigger the deserialization of data which could result in authentication bypass.
local
low complexity
vmware CWE-502
7.8
2023-10-19 CVE-2023-34050 Deserialization of Untrusted Data vulnerability in VMWare Spring Advanced Message Queuing Protocol
In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
network
low complexity
vmware CWE-502
4.3