cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-21989,https://securityvulnerability.io/vulnerability/CVE-2021-21989,,VMware Workstation (16.x prior to 16.1.2) and Horizon Client for Windows (5.x prior to 5.5.2) contain out-of-bounds read vulnerability in the Cortado ThinPrint component (TTC Parser). A malicious actor with access to a virtual machine or remote desktop may be able to exploit these issues leading to information disclosure from the TPView process running on the system where Workstation or Horizon Client for Windows is installed.,Vmware,"Vmware Workstation Pro / Player (workstation), Vmware Horizon Client For Windows",6.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2021-05-24T11:43:34.000Z,0 CVE-2021-21988,https://securityvulnerability.io/vulnerability/CVE-2021-21988,,VMware Workstation (16.x prior to 16.1.2) and Horizon Client for Windows (5.x prior to 5.5.2) contain out-of-bounds read vulnerability in the Cortado ThinPrint component (JPEG2000 Parser). A malicious actor with access to a virtual machine or remote desktop may be able to exploit these issues leading to information disclosure from the TPView process running on the system where Workstation or Horizon Client for Windows is installed.,Vmware,"Vmware Workstation Pro / Player (workstation), Vmware Horizon Client For Windows",6.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2021-05-24T11:35:00.000Z,0 CVE-2021-21987,https://securityvulnerability.io/vulnerability/CVE-2021-21987,,VMware Workstation (16.x prior to 16.1.2) and Horizon Client for Windows (5.x prior to 5.5.2) contain out-of-bounds read vulnerability in the Cortado ThinPrint component (TTC Parser). A malicious actor with access to a virtual machine or remote desktop may be able to exploit these issues leading to information disclosure from the TPView process running on the system where Workstation or Horizon Client for Windows is installed.,Vmware,"Vmware Workstation Pro / Player (workstation), Vmware Horizon Client For Windows",6.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2021-05-24T11:34:55.000Z,0 CVE-2020-3998,https://securityvulnerability.io/vulnerability/CVE-2020-3998,,VMware Horizon Client for Windows (5.x prior to 5.5.0) contains an information disclosure vulnerability. A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes.,Vmware,Vmware Horizon Client For Windows,6.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2020-10-23T13:49:50.000Z,0 CVE-2020-3991,https://securityvulnerability.io/vulnerability/CVE-2020-3991,,VMware Horizon Client for Windows (5.x before 5.5.0) contains a denial-of-service vulnerability due to a file system access control issue during install time. Successful exploitation of this issue may allow an attacker to overwrite certain admin privileged files through a symbolic link attack at install time. This will result into a denial-of-service condition on the machine where Horizon Client for Windows is installed.,Vmware,Vmware Horizon Client For Windows,7.1,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-10-16T13:15:22.000Z,0 CVE-2020-3990,https://securityvulnerability.io/vulnerability/CVE-2020-3990,,VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an information disclosure vulnerability due to an integer overflow issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client.,Vmware,Vmware Workstation And Horizon Client For Windows,6.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2020-09-16T16:17:17.000Z,0 CVE-2020-3989,https://securityvulnerability.io/vulnerability/CVE-2020-3989,,VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain a denial of service vulnerability due to an out-of-bounds write issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to create a partial denial-of-service condition on the system where Workstation or Horizon Client for Windows is installed. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client.,Vmware,Vmware Workstation And Horizon Client For Windows,3.3,LOW,0.00044999999227002263,false,false,false,false,,false,false,2020-09-16T16:17:11.000Z,0 CVE-2020-3988,https://securityvulnerability.io/vulnerability/CVE-2020-3988,,VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (JPEG2000 parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.,Vmware,Vmware Workstation And Horizon Client For Windows,6.1,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2020-09-16T16:14:08.000Z,0 CVE-2020-3987,https://securityvulnerability.io/vulnerability/CVE-2020-3987,,VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMR STRETCHDIBITS parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.,Vmware,Vmware Workstation And Horizon Client For Windows,6.1,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2020-09-16T16:14:01.000Z,0 CVE-2020-3986,https://securityvulnerability.io/vulnerability/CVE-2020-3986,,VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMF Parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.,Vmware,Vmware Workstation And Horizon Client For Windows,6.1,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2020-09-16T16:13:54.000Z,0 CVE-2020-3974,https://securityvulnerability.io/vulnerability/CVE-2020-3974,,"VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed.",Vmware,"Vmware Fusion, Vmware Remote Console For Mac And Horizon Client For Mac",7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-07-10T13:14:45.000Z,0 CVE-2020-3961,https://securityvulnerability.io/vulnerability/CVE-2020-3961,,VMware Horizon Client for Windows (prior to 5.4.3) contains a privilege escalation vulnerability due to folder permission configuration and unsafe loading of libraries. A local user on the system where the software is installed may exploit this issue to run commands as any user.,Vmware,Vmware Horizon Client For Windows,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2020-06-15T15:18:29.000Z,0 CVE-2020-3957,https://securityvulnerability.io/vulnerability/CVE-2020-3957,,"VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed.",Vmware,"Vmware Fusion,Vmware Remote Console For Mac,Vmware Horizon Client For Mac",7,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2020-05-29T19:37:58.000Z,0 CVE-2020-3950,https://securityvulnerability.io/vulnerability/CVE-2020-3950,,"VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.",Vmware,"Vmware Fusion, Vmware Remote Console For Mac And Horizon Client For Mac",7.8,HIGH,0.013539999723434448,true,false,false,true,,false,false,2020-03-17T18:41:52.000Z,0 CVE-2020-3951,https://securityvulnerability.io/vulnerability/CVE-2020-3951,,VMware Workstation (15.x before 15.5.2) and Horizon Client for Windows (5.x and prior before 5.4.0) contain a denial-of-service vulnerability due to a heap-overflow issue in Cortado Thinprint. Attackers with non-administrative access to a guest VM with virtual printing enabled may exploit this issue to create a denial-of-service condition of the Thinprint service running on the system where Workstation or Horizon Client is installed.,Vmware,Vmware Workstation And Horizon Client For Windows,3.8,LOW,0.0004400000034365803,false,false,false,false,,false,false,2020-03-17T18:41:49.000Z,0 CVE-2019-5543,https://securityvulnerability.io/vulnerability/CVE-2019-5543,,"For VMware Horizon Client for Windows (5.x and prior before 5.3.0), VMware Remote Console for Windows (10.x before 11.0.0), VMware Workstation for Windows (15.x before 15.5.2) the folder containing configuration files for the VMware USB arbitration service was found to be writable by all users. A local user on the system where the software is installed may exploit this issue to run commands as any user.",Vmware,"Vmware Horizon Client For Windows,Vmware Remote Console For Windows,Vmware Workstation For Windows",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2020-03-16T17:24:55.000Z,0 CVE-2019-5527,https://securityvulnerability.io/vulnerability/CVE-2019-5527,,"ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.",Vmware,"Esxi, Workstation, Fusion, Vmrc And Horizon Client",8.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2019-10-10T16:28:46.000Z,0 CVE-2018-6970,https://securityvulnerability.io/vulnerability/CVE-2018-6970,,"VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privileged process running on a system where Horizon Connection Server, Horizon Agent or Horizon Client are installed. Note: This issue doesn't apply to Horizon 6, 7 Agents installed on Linux systems or Horizon Clients installed on non-Windows systems.",Vmware,"Vmware Horizon 6, Horizon 7, And Horizon Client",6.5,MEDIUM,0.007499999832361937,false,false,false,false,,false,false,2018-08-07T00:00:00.000Z,0 CVE-2018-6964,https://securityvulnerability.io/vulnerability/CVE-2018-6964,,VMware Horizon Client for Linux (4.x before 4.8.0 and prior) contains a local privilege escalation vulnerability due to insecure usage of SUID binary. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on a Linux machine where Horizon Client is installed.,Vmware,Horizon Client For Linux,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2018-05-29T00:00:00.000Z,0 CVE-2017-4948,https://securityvulnerability.io/vulnerability/CVE-2017-4948,,"VMware Workstation (14.x before 14.1.0 and 12.x) and Horizon View Client (4.x before 4.7.0) contain an out-of-bounds read vulnerability in TPView.dll. On Workstation, this issue in conjunction with other bugs may allow a guest to leak information from host or may allow for a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this issue in conjunction with other bugs may allow a View desktop to leak information from host or may allow for a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View.",Vmware,"Workstation,Horizon Client For Windows",7.1,HIGH,0.0006500000017695129,false,false,false,false,,false,false,2018-01-05T14:29:00.000Z,0 CVE-2017-4937,https://securityvulnerability.io/vulnerability/CVE-2017-4937,,"VMware Workstation (12.x before 12.5.8) and Horizon View Client for Windows (4.x before 4.6.1) contain an out-of-bounds read vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View Client.",Vmware,"Workstation,Horizon View Client For Windows",7.8,HIGH,0.0013299999991431832,false,false,false,false,,false,false,2017-11-17T14:29:00.000Z,0 CVE-2017-4935,https://securityvulnerability.io/vulnerability/CVE-2017-4935,,"VMware Workstation (12.x before 12.5.8) and Horizon View Client for Windows (4.x before 4.6.1) contain an out-of-bounds write vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View Client.",Vmware,"Workstation,Horizon View Client For Windows",7.8,HIGH,0.0014299999456852674,false,false,false,false,,false,false,2017-11-17T14:29:00.000Z,0 CVE-2017-4936,https://securityvulnerability.io/vulnerability/CVE-2017-4936,,"VMware Workstation (12.x before 12.5.8) and Horizon View Client for Windows (4.x before 4.6.1) contain an out-of-bounds read vulnerability in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client.",Vmware,"Workstation,Horizon View Client For Windows",7.8,HIGH,0.0013299999991431832,false,false,false,false,,false,false,2017-11-16T00:00:00.000Z,0 CVE-2017-4918,https://securityvulnerability.io/vulnerability/CVE-2017-4918,,"VMware Horizon View Client (2.x, 3.x and 4.x prior to 4.5.0) contains a command injection vulnerability in the service startup script. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on the Mac OSX system where the client is installed.",Vmware,Horizon View Client For Mac,9.8,CRITICAL,0.0033400000538676977,false,false,false,false,,false,false,2017-06-08T19:00:00.000Z,0 CVE-2017-4908,https://securityvulnerability.io/vulnerability/CVE-2017-4908,,"VMware Workstation (12.x prior to 12.5.3) and Horizon View Client (4.x prior to 4.4.0) contain multiple heap buffer-overflow vulnerabilities in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View.",Vmware,"Workstation,Horizon View Client For Windows",7.8,HIGH,0.00107999995816499,false,false,false,false,,false,false,2017-06-08T13:00:00.000Z,0