![]() ![]() VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. ![]() VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.ĮSXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. ![]() VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox. VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious local actor with restricted privileges within a sandbox process may exploit this issue to achieve a partial information disclosure. ![]() VMware ESXi contains a heap-overflow vulnerability. If you want to see a complete summary for this CPE, please contact us. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |