Show filters
139 Total Results
Displaying 21-30 of 139
Sort by:
Attacker Value
Unknown
CVE-2021-22050
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests.
0
Attacker Value
Unknown
CVE-2021-22043
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files.
0
Attacker Value
Unknown
CVE-2021-22042
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.
0
Attacker Value
Unknown
CVE-2021-22041
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
0
Attacker Value
Unknown
CVE-2021-22040
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
0
Attacker Value
Unknown
CVE-2021-22045
Disclosure Date: January 04, 2022 (last updated October 07, 2023)
VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.
0
Attacker Value
Unknown
CVE-2020-3960
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
0
Attacker Value
Unknown
CVE-2021-21994
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
SFCB (Small Footprint CIM Broker) as used in ESXi has an authentication bypass vulnerability. A malicious actor with network access to port 5989 on ESXi may exploit this issue to bypass SFCB authentication by sending a specially crafted request.
0
Attacker Value
Unknown
CVE-2021-21995
Disclosure Date: July 13, 2021 (last updated February 23, 2025)
OpenSLP as used in ESXi has a denial-of-service vulnerability due a heap out-of-bounds read issue. A malicious actor with network access to port 427 on ESXi may be able to trigger a heap out-of-bounds read in OpenSLP service resulting in a denial-of-service condition.
0
Attacker Value
Unknown
CVE-2021-21974
Disclosure Date: February 24, 2021 (last updated February 22, 2025)
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
0