Show filters
63 Total Results
Displaying 1-10 of 63
Sort by:
Attacker Value
High
CVE-2020-3992 — ESXi OpenSLP remote code execution vulnerability
Disclosure Date: October 20, 2020 (last updated November 28, 2024)
OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.
11
Attacker Value
Unknown
CVE-2022-31696
Disclosure Date: December 13, 2022 (last updated October 10, 2024)
VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox.
3
Attacker Value
Unknown
CVE-2022-31699
Disclosure Date: December 13, 2022 (last updated October 08, 2023)
VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure.
1
Attacker Value
Unknown
CVE-2019-5544 — ESXi OpenSLP remote code execution vulnerability
Disclosure Date: December 06, 2019 (last updated July 26, 2024)
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
1
Attacker Value
Unknown
CVE-2017-5753
Disclosure Date: January 04, 2018 (last updated January 15, 2025)
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
1
Attacker Value
Unknown
CVE-2021-22050
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests.
0
Attacker Value
Unknown
CVE-2021-22041
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
0
Attacker Value
Unknown
CVE-2021-22040
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
0
Attacker Value
Unknown
CVE-2021-22045
Disclosure Date: January 04, 2022 (last updated October 07, 2023)
VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.
0
Attacker Value
Unknown
CVE-2020-3960
Disclosure Date: September 15, 2021 (last updated November 29, 2024)
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
0