cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-22977,https://securityvulnerability.io/vulnerability/CVE-2022-22977,,"VMware Tools for Windows(12.0.0, 11.x.y and 10.x.y) contains an XML External Entity (XXE) vulnerability. A malicious actor with non-administrative local user privileges in the Windows guest OS, where VMware Tools is installed, may exploit this issue leading to a denial-of-service condition or unintended information disclosure.",Vmware,Vmware Tools For Windows,7.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-05-24T18:15:38.000Z,0 CVE-2022-22943,https://securityvulnerability.io/vulnerability/CVE-2022-22943,,"VMware Tools for Windows (11.x.y and 10.x.y prior to 12.0.0) contains an uncontrolled search path vulnerability. A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.",Vmware,Vmware Tools For Windows,6.7,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2022-03-03T21:59:08.000Z,0 CVE-2021-21999,https://securityvulnerability.io/vulnerability/CVE-2021-21999,,"VMware Tools for Windows (11.x.y prior to 11.2.6), VMware Remote Console for Windows (12.x prior to 12.0.1) , VMware App Volumes (2.x prior to 2.18.10 and 4 prior to 2103) contain a local privilege escalation vulnerability. An attacker with normal access to a virtual machine may exploit this issue by placing a malicious file renamed as `openssl.cnf' in an unrestricted directory which would allow code to be executed with elevated privileges.",Vmware,"Vmware Tools For Windows, Vmware Remote Console For Windows And Vmware App Volumes",7.8,HIGH,0.00044999999227002263,false,false,false,false,,false,false,2021-06-23T11:16:41.000Z,0 CVE-2021-21997,https://securityvulnerability.io/vulnerability/CVE-2021-21997,,"VMware Tools for Windows (11.x.y prior to 11.3.0) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest operating system, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest operating system.",Vmware,Vmware Tools For Windows,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2021-06-18T12:41:17.000Z,0 CVE-2020-3941,https://securityvulnerability.io/vulnerability/CVE-2020-3941,,The repair operation of VMware Tools for Windows 10.x.y has a race condition which may allow for privilege escalation in the Virtual Machine where Tools is installed. This vulnerability is not present in VMware Tools 11.x.y since the affected functionality is not present in VMware Tools 11.,Vmware,Vmware Tools For Windows (vmware Tools),7,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-01-15T19:03:19.000Z,0 CVE-2019-5522,https://securityvulnerability.io/vulnerability/CVE-2019-5522,,VMware Tools for Windows update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. This issue is present in versions 10.2.x and 10.3.x prior to 10.3.10. A local attacker with non-administrative access to a Windows guest with VMware Tools installed may be able to leak kernel information or create a denial of service attack on the same Windows guest machine.,Vmware,Vmware Tools For Windows,7.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2019-06-06T19:00:03.000Z,0