Vmware : Security Vulnerabilities (CVSS score between 8 and 8.99)
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-21983 |
|
|
|
2021-03-31 |
2022-02-01 |
8.5 |
None |
Remote |
Low |
??? |
None |
Complete |
Complete |
Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system. |
2 |
CVE-2016-7457 |
264 |
|
+Priv |
2016-12-29 |
2017-07-30 |
8.0 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Complete |
VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to gain privileges, or halt and remove virtual machines, via unspecified vectors. |
3 |
CVE-2012-1518 |
264 |
|
+Priv |
2012-04-17 |
2017-12-29 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors. |
4 |
CVE-2012-1515 |
264 |
|
+Priv |
2012-04-02 |
2018-10-12 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine. |
Total number of vulnerabilities :
4
Page :
1
(This Page)