Логотип exploitDog
bind:CVE-2012-1516
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-1516

Количество 2

Количество 2

nvd логотип

CVE-2012-1516

почти 14 лет назад

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-35cq-g3fr-gm2p

больше 3 лет назад

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-1516

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

CVSS3: 9.9
1%
Низкий
почти 14 лет назад
github логотип
GHSA-35cq-g3fr-gm2p

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

CVSS3: 9.9
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу