cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-34058,https://securityvulnerability.io/vulnerability/CVE-2023-34058,SAML Token Signature Bypass in VMware Tools,"VMware Tools has a vulnerability that allows a malicious actor with granted Guest Operation Privileges in a virtual machine to potentially elevate their privileges. This occurs when the virtual machine has been assigned a more privileged Guest Alias, creating an opportunity for unauthorized access to sensitive resources within the virtual environment.",Vmware,"VMware Tools,open-vm-tools",7.5,HIGH,0.001290000043809414,false,,false,false,false,,,false,false,,2023-10-27T05:15:00.000Z,0 CVE-2023-34057,https://securityvulnerability.io/vulnerability/CVE-2023-34057,Local Privilege Escalation Vulnerability in VMware Tools,"VMware Tools has a vulnerability that allows a malicious user with local access to a guest virtual machine to escalate their privileges. This could potentially enable unauthorized actions within the virtual machine environment, posing a security risk. It is crucial for users to implement necessary security measures to safeguard their virtual machines from this type of exploit.",Vmware,VMware Tools,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-10-27T05:15:00.000Z,0 CVE-2023-34059,https://securityvulnerability.io/vulnerability/CVE-2023-34059,File Descriptor Hijack Vulnerability in Open-vm-tools by VMware,"The open-vm-tools package contains a potential vulnerability within the vmware-user-suid-wrapper component. A threat actor with non-root privileges may exploit this vulnerability to intercept and manipulate the /dev/uinput file descriptor, thereby simulating user inputs. This could lead to malicious control over the host environment, allowing unauthorized actions and user impersonations.",Vmware,Open-vm-tools,7.4,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2023-10-27T05:15:00.000Z,0 CVE-2023-20900,https://securityvulnerability.io/vulnerability/CVE-2023-20900,Privilege Escalation Vulnerability in VMware vSphere Affecting Guest Operations,"A vulnerability exists within VMware vSphere that allows a malicious actor with Guest Operation Privileges in a virtual machine to potentially elevate their privileges. This issue arises when the virtual machine has been assigned a more privileged Guest Alias, enabling unauthorized access to higher-level operations and potentially compromising the integrity of the host and other guest instances.",Vmware,"VMware Tools,VMware Tools (open-vm-tools)",7.5,HIGH,0.0017000000225380063,false,,false,false,false,,,false,false,,2023-08-31T10:15:00.000Z,0 CVE-2023-20867,https://securityvulnerability.io/vulnerability/CVE-2023-20867,VMware ESXi Compromise Threatens Guest VM Security,"The VMware ESXi vulnerability CVE-2023-20867 is being actively exploited by a Chinese cyberespionage group known as UNC3886. The vulnerability allows the attacker to execute commands and transfer files to and from guest virtual machines from a compromised ESXi host without the need for guest credentials. This exploitation threatens the confidentiality and integrity of the guest VMs. The group is also deploying custom backdoors on compromised targets. The vendor, VMware, has patched the vulnerability; however, this case highlights the importance of timely patching and security vigilance in protecting against advanced cyber threats.",Vmware,Vmware Tools,3.9,LOW,0.005419999826699495,true,2023-06-23T00:00:00.000Z,true,true,true,2023-06-14T16:46:16.000Z,,true,false,,2023-06-13T17:15:00.000Z,0 CVE-2022-31693,https://securityvulnerability.io/vulnerability/CVE-2022-31693,Denial-of-Service Vulnerability in VMware Tools for Windows,"VMware Tools for Windows is affected by a vulnerability in the VM3DMP driver that allows a local user with malicious intent to initiate a PANIC condition. This can lead to a denial-of-service scenario in the guest operating system, impacting stability and availability. Users are encouraged to update to the latest version to mitigate potential risks.",Vmware,Tools,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-06-07T00:00:00.000Z,0 CVE-2009-1142,https://securityvulnerability.io/vulnerability/CVE-2009-1142,Privilege Escalation Vulnerability in open-vm-tools by VMware,"A vulnerability in open-vm-tools allows local users to exploit a symlink attack against /tmp files. If the vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled, attackers can escalate privileges, potentially compromising system security. This vulnerability highlights the need for secure configurations and timely updates to prevent unauthorized access.",Vmware,Open Vm Tools,6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-11-23T00:00:00.000Z,0 CVE-2009-1143,https://securityvulnerability.io/vulnerability/CVE-2009-1143,Local Access Control Bypass in Open-VM-Tools by VMware,"A vulnerability was discovered in open-vm-tools that allows local users to bypass intended access restrictions when mounting shares. This issue arises from a symlink attack exploiting a race condition in the realpath function within mount.vmhgfs, commonly referred to as hgfsmounter. As a result, unauthorized users may gain access to restricted file paths, which can lead to potential data breaches.",Vmware,Open-vm-tools,7,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-11-23T00:00:00.000Z,0 CVE-2022-31676,https://securityvulnerability.io/vulnerability/CVE-2022-31676,Local Privilege Escalation Vulnerability in VMware Tools,"VMware Tools, specifically versions 12.0.0, 11.x.y, and 10.x.y, are susceptible to a local privilege escalation vulnerability. This issue allows a malicious actor with non-administrative access to the Guest Operating System to elevate their privileges to that of a root user within the virtual machine. Successful exploitation of this vulnerability poses significant security risks, enabling unauthorized actions that could compromise the integrity and confidentiality of the virtualized environment.",Vmware,Vmware Tools,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-08-23T00:00:00.000Z,0 CVE-2022-22977,https://securityvulnerability.io/vulnerability/CVE-2022-22977,XML External Entity Vulnerability in VMware Tools for Windows,"VMware Tools for Windows has a vulnerability that allows a malicious actor with non-administrative local user privileges to exploit an XML External Entity (XXE) issue. The exploitation could lead to a denial-of-service condition or unintended information disclosure, posing significant risks to system integrity and user data.",Vmware,Vmware Tools For Windows,7.1,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-05-24T18:15:38.000Z,0 CVE-2022-22943,https://securityvulnerability.io/vulnerability/CVE-2022-22943,Uncontrolled Search Path Vulnerability in VMware Tools for Windows,VMware Tools for Windows versions 11.x.y and 10.x.y before 12.0.0 are vulnerable due to an uncontrolled search path issue that could allow a malicious actor with local administrative privileges within the Windows guest operating system to execute arbitrary code with elevated system privileges. This vulnerability poses a significant risk as it may enable attackers to gain unauthorized access and control over critical system functions within the environment where VMware Tools is installed.,Vmware,Vmware Tools For Windows,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-03-03T21:59:08.000Z,0 CVE-2021-21999,https://securityvulnerability.io/vulnerability/CVE-2021-21999,Local Privilege Escalation Vulnerability in VMware Tools and Console,"VMware Tools for Windows, VMware Remote Console for Windows, and VMware App Volumes are susceptible to a local privilege escalation vulnerability. An attacker with standard access to a virtual machine can exploit this issue by placing a specially crafted file named 'openssl.cnf' in an unrestricted directory. This exploitation allows for the execution of malicious code with elevated privileges, posing a significant risk for users if not addressed promptly.",Vmware,"Vmware Tools For Windows, Vmware Remote Console For Windows And Vmware App Volumes",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2021-06-23T11:16:41.000Z,0 CVE-2021-21997,https://securityvulnerability.io/vulnerability/CVE-2021-21997,Denial-of-Service Vulnerability in VMware Tools for Windows by VMware,"VMware Tools for Windows contains a vulnerability in the VM3DMP driver that allows a malicious local user to exploit the driver, leading to a denial-of-service condition in the guest operating system. This issue can cause the VM3DMP driver to trigger a crash, resulting in loss of service and requiring a restart of the affected virtual machine. Users are advised to update their VMware Tools to the latest version to mitigate this risk.",Vmware,Vmware Tools For Windows,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-06-18T12:41:17.000Z,0 CVE-2020-3972,https://securityvulnerability.io/vulnerability/CVE-2020-3972,Denial-of-Service Vulnerability in VMware Tools for macOS,"VMware Tools for macOS versions 11.x.x and earlier, prior to 11.1.1, contain a vulnerability in the Host-Guest File System (HGFS) implementation. This flaw allows attackers with non-admin privileges on guest macOS virtual machines to induce a denial-of-service condition, potentially disrupting the functionality of their own VMs. It is crucial for users to update to the latest version to mitigate this risk.",Vmware,Vmware Tools For Mac OS,3.3,LOW,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-06-19T17:29:36.000Z,0 CVE-2020-3941,https://securityvulnerability.io/vulnerability/CVE-2020-3941,Privilege Escalation Vulnerability in VMware Tools for Windows,"VMware Tools for Windows 10.x.y suffers from a race condition during the repair operation, potentially allowing an attacker to escalate privileges within the Virtual Machine that has this software installed. This risk does not affect VMware Tools 11.x.y, as the problematic functionality is absent in that version. It is essential for users to apply the necessary updates and patches to mitigate this vulnerability and secure their environments.",Vmware,Vmware Tools For Windows (vmware Tools),7,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-01-15T19:03:19.000Z,0 CVE-2019-5522,https://securityvulnerability.io/vulnerability/CVE-2019-5522,Out of Bounds Read Vulnerability in VMware Tools for Windows,"VMware Tools for Windows contains an out of bounds read vulnerability in the vm3dmp driver, affecting Windows guest machines where VMware Tools is installed. This vulnerability is found in versions 10.2.x and 10.3.x prior to 10.3.10. A local attacker with non-administrative access could potentially exploit this flaw to expose sensitive kernel information or disrupt service on the affected Windows guest machine.",Vmware,Vmware Tools For Windows,7.1,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2019-06-06T19:00:03.000Z,0 CVE-2018-6969,https://securityvulnerability.io/vulnerability/CVE-2018-6969,,"VMware Tools (10.x and prior before 10.3.0) contains an out-of-bounds read vulnerability in HGFS. Successful exploitation of this issue may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs. In order to be able to exploit this issue, file sharing must be enabled.",Vmware,Vmware Tools,7,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2018-07-12T00:00:00.000Z,0 CVE-2015-5191,https://securityvulnerability.io/vulnerability/CVE-2015-5191,,"VMware Tools prior to 10.0.9 contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation. CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",Vmware,Vmware Tools,6.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-07-28T21:29:00.000Z,0 CVE-2016-5328,https://securityvulnerability.io/vulnerability/CVE-2016-5328,,"VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.",Vmware,Tools,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-12-29T09:02:00.000Z,0 CVE-2016-7080,https://securityvulnerability.io/vulnerability/CVE-2016-7080,,"The graphic acceleration functions in VMware Tools 9.x and 10.x before 10.0.9 on OS X allow local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2016-7079.",Vmware,Tools,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-12-29T09:02:00.000Z,0 CVE-2016-7079,https://securityvulnerability.io/vulnerability/CVE-2016-7079,,"The graphic acceleration functions in VMware Tools 9.x and 10.x before 10.0.9 on OS X allow local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2016-7080.",Vmware,Tools,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-12-29T09:02:00.000Z,0 CVE-2014-4200,https://securityvulnerability.io/vulnerability/CVE-2014-4200,,"vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, uses 0644 permissions for the vm-support archive, which allows local users to obtain sensitive information by extracting files from this archive.",Vmware,"Vm-support,Workstation,Tools",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2014-08-28T15:00:00.000Z,0 CVE-2014-4199,https://securityvulnerability.io/vulnerability/CVE-2014-4199,,"vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.",Vmware,"Vm-support,Workstation,Tools",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2014-08-28T15:00:00.000Z,0 CVE-2012-3569,https://securityvulnerability.io/vulnerability/CVE-2012-3569,,"Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file.",Vmware,Ovf Tool,,,0.9645699858665466,false,,false,false,false,,,false,false,,2012-11-14T11:00:00.000Z,0 CVE-2011-1681,https://securityvulnerability.io/vulnerability/CVE-2011-1681,,"vmware-hgfsmounter in VMware Open Virtual Machine Tools (aka open-vm-tools) 8.4.2-261024 and earlier attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to trigger corruption of this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.",Vmware,Open-vm-tools,,,0.0005200000014156103,false,,false,false,false,,,false,false,,2011-04-10T01:29:00.000Z,0