Vulnerabilities > Vmware > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-09-10 | CVE-2013-3658 | Path Traversal vulnerability in VMWare ESX and Esxi Directory traversal vulnerability in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to delete arbitrary host OS files via unspecified vectors. | 9.4 |
2013-05-01 | CVE-2013-3080 | Permissions, Privileges, and Access Controls vulnerability in VMWare Vcenter Server Appliance 5.1 VMware vCenter Server Appliance (vCSA) 5.1 before Update 1 allows remote authenticated users to create or overwrite arbitrary files, and consequently execute arbitrary code or cause a denial of service, by leveraging Virtual Appliance Management Interface (VAMI) web-interface access. | 9.0 |
2013-05-01 | CVE-2013-3079 | Code Injection vulnerability in VMWare Vcenter Server Appliance 5.1 VMware vCenter Server Appliance (vCSA) 5.1 before Update 1 allows remote authenticated users to execute arbitrary programs with root privileges by leveraging Virtual Appliance Management Interface (VAMI) access. | 9.0 |
2013-02-15 | CVE-2013-1405 | Improper Authentication vulnerability in VMWare products VMware vCenter Server 4.0 before Update 4b and 4.1 before Update 3a, VMware VirtualCenter 2.5, VMware vSphere Client 4.0 before Update 4b and 4.1 before Update 3a, VMware VI-Client 2.5, VMware ESXi 3.5 through 4.1, and VMware ESX 3.5 through 4.1 do not properly implement the management authentication protocol, which allow remote servers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 10.0 |
2012-11-14 | CVE-2012-3569 | USE of Externally-Controlled Format String vulnerability in VMWare OVF Tool, Player and Workstation Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file. | 9.3 |
2012-06-14 | CVE-2012-3288 | Improper Input Validation vulnerability in VMWare products VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file. | 9.3 |
2012-05-04 | CVE-2012-2450 | Products Multiple Memory Corruption Privilege Escalation vulnerability in VMware VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS. | 9.0 |
2012-05-04 | CVE-2012-2449 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in VMWare products VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS. | 9.0 |
2012-05-04 | CVE-2012-1517 | Buffer Errors vulnerability in VMWare ESX and Esxi The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers. | 9.0 |
2012-05-04 | CVE-2012-1516 | Buffer Errors vulnerability in VMWare ESX and Esxi The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers. | 9.0 |