Você está na página 1de 175

Patch Release

ESX400-201203001
ESX400-201203401

ESX400-201203001
ESX410-201201001

ESX400-201203001
ESX410-201201001

ESX400-201203001
ESX410-201201001

ESX400-201203001
ESX410-201201001

ESXi400-201203001
ESXi410-201201001
5.0_update01

vCenter-CB-2.0.1
vCenter-CB-2.0.1
vCenter Server 4.0 Update 4a

VirtualCenter 2.5 Update 6b

ESX400-201209001

View 4.6.1

View 4.6.1

Workstation 7.1.4
Player 3.1.4

ESXi400-201110001
4.1_update02
ESXi500-201112001
ESX400-201209001
4.1_update3

vCenter Server 4.1 Update 3


vCenter Server 5.0 Update 2

update-from-esxi4.1-4.1_update03

ESX400-201209001
4.1_update3

5.0_update01

Workstation 7.1.2
Player 3.1.2
ESXe350-201203401-O-SG
ESXi400-201203001
4.1_update01

ESX350-201203401-SG
ESX400-201203001
4.1_update01

ESX400-201203001
ESX410-201204001

ESX400-201203001

Workstation 8.0.2
Workstation 7.1.6
Player 4.0.2
Player 3.1.6
Fusion 4.1.2
ESXe350-201203401-O-SG
ESXi400-201203001
ESXi410-201201001
5.0_update01
ESX350-201203402-BG
ESX400-201203001
ESX410-201201001

ESX400-201209001
ESX410-201204001

ESX400-201209001
ESX410-201204001

Workstation 7.1.5
Player 3.1.6
Fusion 4.1.2
ESXe350-201205401-O-SG
4.0_update03
4.1_update02
ESX350-201205401-SG
4.0_update03
4.1_update02

Workstation 7.1.5
Player 3.1.6

ESXi410-201205001

ESXi400-201205001

ESXi500-201205001
ESXi410-201205001
ESXi400-201205001
ESXe350-201205401-O-SG

ESX410-201205001
ESX400-201205001
ESX350-201205401-SG

ESXi500-201205001
ESXi410-201205001
ESXi400-201205001
ESXe350-201205401-O-SG
ESX410-201205001
ESX400-201205001
ESX350-201205401-SG

Workstation 7.1.6 or later


Player 3.1.6 or later
Fusion 4.1.2 or later
ESXi500-201205001
ESXi410-201205001
ESXi400-201205001
ESXe350-201205401-O-SG
ESX410-201205001
ESX400-201205001
ESX350-201205401-SG
vMA-5.0.0.2-724898
vMA-5.0.0.2-724898
vMA-5.0.0.2-724898

Workstation 8.0.4 or later


Workstation 7.1.6 or later
Player 4.0.4 or later
Player 3.1.6 or later
Fusion 4.1.3 or later
ESXi500-201206001
ESXi410-201206001
ESXi400-201206001
ESXe350-201206401-O-SG
ESX410-201206001
ESX400-201206001

ESX350-201206401-SG

Workstation 8.0.4 or later


Player 4.0.4 or later

ESXi500-201206001
ESXi410-201206001
ESXi400-201206001
ESXe350-201206401-O-SG
ESX410-201206001
ESX400-201206001
ESX350-201206401-SG

ESXi500-201207001
4.1_update03
ESXi400-201209001

vCenter Server 5.0 Update 2


vCenter Server 4.1 Update 3
vCenter Server 4.0 Update 4a

update-from-esxi4.1-4.1_update03

vCenter Server 4.0 Update 4a

Update Manager 4.1 Update 3


Update Manager 4.0 Update 4a

update-from-esxi4.1-4.1_update03

update-from-esxi5.0-5.0_update02
update-from-esxi4.1-4.1_update03.zip

update-from-esx4.1-4.1_update3.zip

update-from-esx4.1-4.1_update3.zip
ESX400-201209001

update-from-esx4.1-4.1_update3.zip
ESX400-201209001

update-from-esx4.1-4.1_update3.zip

update-from-esx4.1-4.1_update3.zip
ESX400-201209001

update-from-esx4.1-4.1_update3.zip

update-from-esx4.1-4.1_update3.zip
ESX400-201209001

update-from-esx4.1-4.1_update3.zip
ESX400-201209001

Workstation 8.0.5 or later

Workstation 8.0.5 or later

Workstation 8.0.5 or later

ESXi410-201211001

ESX410-201211001

ESX410-201211001

ESX410-201211001

ESX410-201211001

ESX410-201211001

VMware-viewconnectionserver-5.1.2-912971
VMware-viewconnectionserver-4.6.2-916912

update-from-esxi5.0-5.0_update02
update-from-esxi5.1-5.1_update01
update-from-esxi5.0-5.0_update02

ESXi410-201301001
ESXi400-201302001
ESXe350-201302401-O-SG
ESX410-201301001
ESX400-201302001
ESX350-201302401-SG
update-from-esxi5.1-5.1_update01
ESXi500-201303001
ESXi410-201301001

ESX410-201301001

ESX410-201301001
ESX410-201301001

ESX410-201301001

VMware-workstation-full-9.0.1-894247
VMware-workstation-full-8.0.5-893925

VMware-Fusion-5.0.2-900491
VMware-Fusion-4.1.4-900582-light
VMware-viewconnectionserver-5.1.2-912971
VMware-viewconnectionserver-4.6.2-916912
ESXi510-201212001
update-from-esxi5.0-5.0_update02
ESXi410-201211001
ESXi400-201302001
ESX410-201211001
ESX400-201302001

ESXi510-201212001
update-from-esxi5.0-5.0_update02
ESXi410-201211001
ESXi400-201302001
ESXe350-201302401-O-SG
ESX410-201211001
ESX400-201302001
ESX350-201302401-SG

Virtual Center 2.5 Update 6c

ESX350-201302401-SG

ESX350-201302401-SG
update-from-esxi5.1-5.1_update01
ESXi500-201303001
ESXi410-201304001
ESXi400-201305001

ESX410-201304001
ESX400-201305001

ESX410-201312001
ESX400-201305001

update-from-esxi5.1-5.1_update02
update-from-esxi5.0-5.0_update03
ESXi410-201307001
ESX410-201307001
ESX400-201310001
update-from-esxi5.1-5.1_update02
update-from-esxi5.0-5.0_update03
ESXi410-201307001
ESXi400-201310001
ESX410-201307001
ESX400-201310001

ESX410-201307001
ESX400-201310001

ESX410-201307001
ESX400-201310001
Workstation 9.0.2 or later
Workstation 8.0.5 or later
Player 5.0.2 or later
Player 4.0.5 or later

ESXi510-201307001
ESXi500-201308001
ESXi410-201304001
ESXi400-201305001
ESX410-201304001
ESX400-201305001

update-from-esxi5.0-5.0_update03
ESXi410-201307001
ESXi400-201305001
ESX410-201307001
ESX400-201305001

ESXi510-Update01
ESXi500-201303001
ESXi410-201301001
ESXi400-201305001
ESX410-201301001
ESX400-201305001

ESX410-201312001

ESX410-201312001
ESXi550-201312001
ESXi510-201310001
ESXi500-Update03
ESXi410-201312001
ESXi400-201310001
ESX410-201312001
ESX400-201310001
ESXi510-Update02
ESXi500-Update03
ESXi410-201312001
ESXi400-201310001
ESX410-201312001
ESX400-201310001

ESXi510-Update02
ESXi500-Update03
ESXi410-201312001
ESXi400-201310001
ESX410-201312001
ESX400-201310001

ESXi550-Update01
ESXi510-201404001
ESXi500-201405001
ESXi410-201404001
ESXi400-201404001
ESX410-201404001
ESX400-201404001
ESXi550-Update01

5.5 Update 1

5.5 Update 1

ESXi410-201404001
ESXi400-201404001
ESX410-201404001
ESX400-201404001

ESXi550-201404420-SG
ESXi550-201404401-SG

horizon-nginx-rpm-1.5.0.0-1736237.x86_64.rpm

Workstation
Player
Fusion
update-from-esxi5.5-5.5_update01
ESXi510-201404001
ESXi500-201405001

ESXi550-201406001
ESXi510-201406001
ESXi500-201407001

update-from-esxi5.5-5.5_update02

ESX410-20141000
ESX400-201410001

update-from-esxi5.1-5.1_update03
update-from-esxi5.5-5.5_update02
update-from-esxi5.1-5.1_update03
update-from-esxi5.0-5.0_update03
update-from-esxi5.1-5.1_update03

update-from-esxi5.1-5.1_update03

update-from-esxi5.1-5.1_update03
update-from-esxi5.1-5.1_update03
update-from-esxi5.1-5.1_update03

update-from-esxi5.5-5.5_update02d

ESXi510-201503001
ESXi500-201502001
ESXi510-201503001

VMware-srm-5.5.1-2653439

update-from-esxi5.5-5.5_update02e

VMware-Postgres-appliance-9.3.6.0-2686907_OVF10
VMware-vFabric-Postgres-appliance-9.2.10.0-2686745_OVF10
VMware-vPostgres-appliance-9.1.15.0-2676705_OVF10
VMware-vSphere_Replication-5.8.0.2-2613527
VMware-vSphere_Replication-5.6.0.3-2579602

vmware-vcloud-director-5.5.3-2578696

update-from-esxi5.5-5.5_update02e

Bulletin ID
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201203401-SG
ESX410-201201401-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201203403-SG
ESX410-201201402-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201203405-SG
ESX410-201201406-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201203404-SG
ESX410-201201407-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable

Knowledge Base

2011767
2011767

2011767
2009080

2011767
2009080

2011767
2009080

ESX400-201203402-SG
ESX410-201201405-SG
Not Affected
Not Affected
Not Affected
Patch Pending
ESXi400-201203401-SG
ESXi410-201201401-SG
ESXi500-201203101-SG
Not Affected
Not Affected
Not Affected
vCenter-CB-2.0.1-643764
vCenter-CB-2.0.1-643764
VMware-VIMSetup-all-4.0.0-818020
Not Applicable
Not Applicable
VirtualCenter 2.5 Update 6b
Not Affected
Not Affected
Not Affected
Not Affected
ESX350-201203401-SG
ESX400-201209402-SG
Not Applicable
Not Affected
View 4.6.1
No Patch Planned
Not Affected
View 4.6.1
No Patch Planned
Not Affected
Not Affected
Not Affected
Not Affected
7.1.4
Not Affected
3.1.4
Not Affected
Not Affected
ESXi400-201110402-BG
ESXi410-201110202-UG
ESXi500-201112402-BG
Not Affected
ESX400-201110401-SG
ESX410-201110201-SG
vCO 4.2 Update 1
vCO 4.1 Update 2
vCO 4.0 Update 4
Not Affected

2011767
2009080

2011768
2009137
2010823

RN

2009155
2019661
RN

RN

RN

1039199
2002341
2007672
2019661
2020362

vSM 4.1.0 Update 2


vSM 4.0.1 Update 2
Not Applicable
VMware-VIMSetup-all-4.1.0-816786
vCenter Server 5.0 Update 2
Not Applicable
Update Manager 5.0 Update 1
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208101-SG
vCenter 4.0 Update 4a
vCenter 4.1 Update 3
vCenter 5.0 Update 1
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX400-201209401-SG
ESX410-201208101-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESXi500-201203101-SG
Not Applicable
Not Applicable
Not Applicable
Not Affected
Not Affected
Not Affected
Not Affected
7.1.2
Not Affected
3.1.2
Not Affected
ESXe350-201203401-I-SG
ESXi400-201203401-SG
ESXi410-201101201-SG
Not Affected

RN
RN
RN
RN

2020373
RN
RN
RN

1039199
2020362

2011432

2009160
2011777
1027919

ESX350-201203401-SG
ESX400-201203401-SG
ESX410-201101201-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201203401-SG
ESX410-201204401-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201203407-SG
Not Applicable
Not Affected
Not Affected
Not Affected
8.0.2
7.1.6
4.0.2
3.1.6
4.1.2
ESXe350-201203402-T-BG
ESXi400-201203402-BG
ESXi410-201201402-BG
ESXi500-201203102-SG
ESX350-201203402-BG
ESX400-201203401-SG
ESX410-201201401-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201209401-SG
ESX410-201204401-SG
Not Affected
Not Affected

2009155
2011767
1027904

2011767
2013057

2011767

RN
RN
RN
RN
RN
2009161
2011768
2009137
2010823
2009156
2011767
2009080

2019661
2013057

Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
ESX400-201209401-SG
ESX410-201204402-SG
Not Affected
Not Affected
Not Affected
Not Affected
7.1.5
Not Affected
3.1.6
Not Affected
ESXe350-201205401-I-SG
ESXi400-201105201-UG
ESXi410-201110201-SG
Not Affected
ESX350-201205401-SG
ESX400-201105201-UG
ESX410-201110201-SG
Not Affected
Not Affected
Not Affected
Not Affected
7.1.5
Not Affected
3.1.6
Not Affected
Not Affected
Not Affected
ESXi410-201201401-SG
Not Affected
Not Affected
Not Affected
ESX410-201201401-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESXi500-201205401-SG
ESXi410-201205401-SG
ESXi400-201205401-SG
ESXe350-201205401-I-SG

2019661
2013057

RN
RN
2019538
1031736
2002338
2019535
1031732
2002337

RN
RN

2019860

2019855

2019857
2019860
2019855
2019538

ESX410-201205401-SG
ESX400-201205401-SG
ESX350-201205401-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESXi500-201205401-SG
ESXi410-201205401-SG
ESXi400-201205401-SG
ESXe350-201205401-I-SG
ESX410-201205401-SG
ESX400-201205401-SG
ESX350-201205401-SG
Not Affected
Not Affected
Not Affected
Not Affected
7.1.6 or later
Not Affected
3.1.6 or later
4.1.2 or later
ESXi500-201205401-SG
ESXi410-201205401-SG
ESXi400-201205401-SG
ESXe350-201205401-I-SG
ESX410-201205401-SG
ESX400-201205401-SG
ESX350-201205401-SG
vMA-5.0.0.2-724898
vMA-5.0.0.2-724898
vMA-5.0.0.2-724898
Not Affected
Not Affected
Not Affected
8.0.4 or later
7.1.6 or later
4.0.4 or later
3.1.6 or later
4.1.3 or later
ESXi500-201206401-SG
ESXi410-201206401-SG
ESXi400-201206401-SG
ESXe350-201206401-I-SG
ESX410-201206401-SG
ESX400-201206401-SG

2019859
2019853
2019535

2019857
2019860
2019855
2019538
2019859
2019853
2019535

RN
RN
RN
2019857
2019860
2019855
2019538
2019859
2019853
2019535
2021164
2021164
2021164

RN
RN
RN
RN
RN
2021031
2019243
2021027
2021018
2019065
2021025

ESX350-201206401-SG
Not Affected
Not Affected
Not Affected
8.0.4 or later
Not Affected
4.0.4 or later
Not Affected
Not Affected
ESXi500-201206401-SG
ESXi410-201206401-SG
ESXi400-201206401-SG
ESXe350-201206401-I-SG
ESX410-201206401-SG
ESX400-201206401-SG
ESX350-201206401-SG
Not Affected
Not Affected
Not Affected
ESXi500-201207101-SG
ESXi410-201208101-SG
ESXi400-201209401-SG
Patch Pending
Not Applicable
Not Applicable
Not Applicable
vCenter Server 5.0 Update 2
VMware-VIMSetup-all-4.1.0-816786
VMware-VIMSetup-all-4.0.0-818020
Not Applicable
Patch Pending
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208101-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
VMware-VIMSetup-all-4.0.0-818020
Patch Pending
Not Applicable
VMware-VIMSetup-all-4.1.0-816786
VMware-VIMSetup-all-4.0.0-818020
Not Affected
Not Affected
Not Affected

2021017

RN
RN

2021031
2019243
2021027
2021018
2019065
2021025
2021017

2019107
2020373
2019662

RN
RN
RN

2020373

RN

RN
RN

Not Affected
ESX410-201208101-SG
Not Applicable
Not Applicable
ESXi-5.0.0-20121201001
ESXi410-201208101-SG
Patch Pending
Patch Pending
ESX410-201208101-SG
Patch Pending
Patch Pending
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208103-SG
ESX400-201209401-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208101-SG
ESX400-201209401-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208107-SG
Patch Pending
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208102-SG
ESX400-201209402-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208104-SG
Patch Pending
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable

2020373

2033751
2020373

2020362

2020373
2019661

2020373
2019661

2020373

2020373
2019661

2020373

ESX410-201208106-SG
ESX400-201209401-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201208105-SG
ESX400-201209404-SG
Not Applicable
vCOps 5.0.3
update to vCOps 5.0.3
Not Affected
VMware vCenter Server 4.1 Update 2
VMware vCenter Server 4.0 Update 3
Movie Decoder 9.0
Movie Decoder 9.0
Movie Decoder 9.0
Not Affected
vCOps 5.0.3
Not Affected
vCOps 5.0.3
Not Affected
Not Affected
Not Affected
Not Affected
8.0.5 or later
Not Affected
Not Affected
4.0.5 or later
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
8.0.5 or later
Not Affected
Not Affected
4.0.5 or later
Not Affected
Not Affected
Not Affected

2020373
2019661

2020373
2019661
RN
RN

RN
RN
RN
RN
RN

RN

RN

RN

RN

Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
8.0.5 or later
Not Affected
Not Affected
4.0.5 or later
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
OVF Tool 3.0.1
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESXi410-201211401-SG
Not Affected
Not Affected
ESX410-201211401-SG
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201211402-SG
Patch Pending
Not Applicable
Not Affected
Not Affected
Not Affected

RN

RN

RN

2036257

2036254

2036254

Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201211407-SG
Patch Pending
Not Applicable
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201211407-SG
Patch Pending
Not Applicable
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201211405-SG
Patch Pending
Not Applicable
View 5.1.2
View 4.6.2
5.1.0.b
vCSA 5.0 Update 2
Not Affected
vCSA 5.0 Update 2
ESXi510-201304101-SG
ESXi500-201212101-SG
No Patch Planned
No Patch Planned
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Affected
5.0 Update 2
4.1 Update 3
Not Affected
Not Affected
Not Affected
5.0 Update 2
Not Affected
Not Affected

2036254

2036254

2036254

RN
RN
RN
RN
RN
2041632
2033751

RN
RN

RN

Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
4.1 Update 3a
4.0 Update 4b
2.5 Update 6c
Not Affected
Not Affected
4.1 Update 3a
4.0 Update 4b
2.5 Update 6c
Not Affected
Not Affected
ESXi410-201301401-SG
ESXi400-201302401-SG
ESXe350-201302401-I-SG
ESX410-201301401-SG
ESX400-201302401-SG
ESX350-201302401-SG
ESXi510-201304101-SG
ESXi500-201303101-SG
ESXi410-201301401-SG
No Patch Planned
Not Applicable
ESX410-201301405-SG
No Patch Planned
No Patch Planned
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201301402-SG
ESX400-201305402-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
ESX410-201301403-SG
Not Affected
Not Applicable
Workstation 9.0.1
Workstation 8.0.5

RN
RN
RN

RN
RN
RN

2041332
2041344
2042543
2041331
2041343
2042541
2041632
2044373
2041332

2041331

2041331
2041331

2041331

RN
RN

Fusion 5.0.2
Fusion 4.1.4
View 5.1.2
View 4.6.2
ESXi510-201212102-SG
ESXi500-201212102-SG
ESXi410-201211402-BG
ESXi400-201302402-SG
Not Affected
ESX410-201211401-SG
ESX400-201302401-SG
Not Affected
vCenter Server 5.1.0b
vCenter Server 5.0 Update 2
Not Affected
vCenter Server 4.0 Update 4b
Not Affected
ESXi510-201212101-SG
ESXi500-201212101-SG
ESXi410-201301401-SG
ESXi400-201302401-SG
ESXe350-201302401-I-SG
ESX410-201301401-SG
ESX400-201302401-SG
ESX350-201302401-SG
Not Applicable
Not Applicable
Not Applicable
Patch Pending
Virtual Center 2.5 Update 6c
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Patch Pending
ESX350-201302401-SG
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Patch Pending
ESX350-201302401-SG
ESXi510-201304101-SG
ESXi500-201303101-SG
ESXi410-201304401-SG
ESXi400-201305401-SG

RN
RN
RN
RN
2035775
2033751
2036257
2041344
2036254
2041343
RN
RN
RN
2035775
2033751
2036257
2041344
2042543
2036254
2041343
2042541

RN

2042541

2042541
2041632
2044373
2045258
2044241

ESX410-201304401-SG
ESX400-201305404-SG
vFabric Postgres 9.2.4
vFabric Postgres 9.1.9
vCenter 5.1 Update 1
Not Applicable
Not Applicable
Not Applicable
vCSA 5.1 Update 1
Not Affected
vCSA 5.1 Update 1
Not Affected
vCenter Server 5.1 Update 1
5.0 Update 3
Patch Pending
Not Applicable
Not Applicable
Update Manager 5.1 Update 1
5.0 Update 3
Not Applicable
Not Applicable
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Patch Pending
Not Applicable
Not Applicable
vCenter Server 5.1 Update 1
Not Affected
Not Affected
Not Affected
Not Affected
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Affected
Not Affected
Not Applicable
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201312401-SG
ESX400-201305402-SG
CBM 2.5.1
CBM 2.5.1

2045257
2044240
RN
RN
RN

RN
RN
RN
RN

RN
RN

RN

2061209
2044240
RN
RN

vCenter 5.1 Update 2


vCenter 5.0 Update 3
Patch Pending
Patch Pending
ESXi510-201401101-SG
ESXi500-201310101-SG
ESXi410-201307401-SG
Patch Pending
ESX410-201307403-SG
ESX400-201310401-SG
ESXi510-201401101-SG
ESXi500-201310101-SG
ESXi410-201307401-SG
ESXi400-201310401-SG
ESX410-201307405-SG
ESX400-201310402-SG
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201307404-SG
ESX400-201310401-SG
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201307404-SG
ESX400-201310401-SG
9.0.2 or later
8.0.5 or later
5.0.2 or later
4.0.5 or later
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESXi510-201307101-SG
ESXi500-201308101-SG
ESXi410-201304401-SG
ESXi400-201305401-SG
ESX410-201304401-SG
ESX400-201305401-SG
Not Affected

RN
RN
2062314
2055559
2053396
2053393
2059495
2062314
2055559
2053396
2059496
2053393
2059495

2053393
2059495

2053393
2059495

2052143
2053131
2045258
2044241
2045257
2044240

Not Affected
Not Affected
Not Affected
Not Affected
Not Affected
ESXi500-201310101-SG
ESXi410-201307401-SG
ESXi400-201305401-SG
ESX410-201307401-SG
ESX400-201305401-SG
Not Affected
Not Affected
5.0 Update 3
Not Affected
Not Affected
Not Applicable
5.1 Update 2
5.0 Update 3
Patch Pending
Not Applicable
Not Applicable
5.1 Update 2
5.0 Update 3
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Patch Pending
Not Applicable
Not Affected
5.0.3 or Later
Not Affected
9.0.3 or Later
ESXi510-201304102-SG
ESXi500-201303102-SG
ESXi410-201301402-BG
ESXi400-201305401-SG
ESX410-201301401-SG
ESX400-201305401-SG
5.0.4 or Later
Not Affected
Not Affected
5.0.3 or Later
Not Affected
9.0.3 or Later
Not Affected
Not Affected
Not Affected

2055559
2053396
2044241
2053393
2044240

RN

RN
RN

RN
RN

RN
RN
2041632
2044373
2041332
2044241
2041331
2044240
RN

RN
RN

Not Affected
ESX410-201312401-SG
Patch Pending
Not Affected
Not Affected
Not Affected
Not Affected
ESX410-201312403-SG
Patch Pending
ESXi550-201312101-SG
ESXi510-201310101-SG
ESXi500-201310101-SG
ESXi410-201312401-SG
ESXi400-201310401-SG
ESX410-201312401-SG
ESX400-201310401-SG
Not Affected
ESXi510-201401101-SG
ESXi500-201310101-SG
ESXi410-201312401-SG
ESXi400-201310401-SG
ESX410-201312401-SG
ESX410-201312401-SG
Not Affected
Workstation 9.0.1 or later
Not Affected
Player 5.0.1 or later
Not Affected
Fusion 5.0.1 or later
Not Affected
ESXi510-201401101-SG
ESXi500-201310101-SG
ESXi410-201312401-SG
ESXi400-201310401-SG
ESX410-201312401-SG
ESX410-201312401-SG
Not Affected
vCloud Director 5.1.3 or later
5.5 Update 1
5.1 Update 3
Patch Pending
ESXi550-201403101-SG
ESXi510-201404101-SG
ESXi500-201405101-SG
ESXi410-201404401-SG
ESXi400-201404401-SG
ESX410-201404402-SG
ESX400-201404402-SG
ESXi550-201403101-SG
ESXi550-201409101-SG

2061209

2061209
2063795
2053402
2055559
2061210
2059496
2061209
2059495
2062314
2055559
2061210
2059496
2061209
2059495
RN
RN
RN
2062314
2055559
2061210
2059496
2061209
2059495
RN
RN
RN
2065832
2070666
2075521
2072477
2068805
2072476
2068798
2065832
2079725

ESXi510-201412101-SG
No Patch Planned
No Patch Planned
Not Applicable
Not Applicable
5.5 Update 1
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
5.5 Update 1
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Applicable
Not Affected
5.1 Update 2
5.0 Update 3
ESXi410-201404401-SG
ESXi400-201402402-SG
ESX410-201404401-SG
ESX400-201404401-SG
Not Affected
5.1 Update 2
5.0 Update 3
Not Affected
Not Affected
Not Affected
Not Affected
5.5.0c
5.5 Update 1a
ESXi550-201404420
ESXi550-201404401
10.0.2 or later
6.0.3 or later
6.0.2 or later
4.0.2 or later
4.1.1 or later
6.0.4 or later
3.2.2 or later
4.4.2 or later
Feature Pack 2 or later
2.3.3 or later

2086278

RN

RN

RN
RN
2072477
2068805
2072476
2068798
RN
RN

RN
RN
2076586
2076120
RN
RN
RN

RN
RN
2076796

2.3.3 or later
2.3.3 or later
2.3.3 or later
2.3.3 or later
2.3.3 or later
2.3.3 or later
Horizon Workspace Server 1.5 and apply patch horizon-nginxrpm-1.5.0.0-1736237.x86_64
horizon-nginx-rpm-1.5.0.0- 1736237.x86_64
1.8.1 or later
1.8.1 or later
1.8.1 or later
1.8.1 or later
1.8.1 or later
1.8.1 or later
1.8.1 or later
3.5.1
vCNS 5.5.2
vCNS 5.1.4
6.0.1 + patch
1.1 Update
vSphere 5.5.0c or vSphere 5.5 Update 1a
vCD 5.5.1.1
10.0.2 or later
6.0.3 or later
6.0.2 or later
ESXi550-201403102-SG
ESXi510-201404102-SG
ESXi500-201405102-SG
ESXi550-201406401-SG
2.0.0
2.6.0.1
horizon-nginx-rpm-1.5.0.0-1876270.x86_64.rpm
horizon-nginx-rpm-1.8.2.1820-1876338.x86_64.rpm
4.4.3
5.3.2
5.3 FP3
4.1.3
4.0.4
6.0.5
3.2.3
5.5.2.1
5.1.4.1
5.4.1
5.4.1
5.5u1b
5.1u2a
5.0u3a
ESXi550-201406401-SG
ESXi510-201406401-SG
ESXi500-201407401-SG

2076796
2076796
2076796
2076796
2076796
2076796
2076551
2076551
2076551
2076783
2076783
2076783
2076783
2076783
2076783
RN
RN
2076869
2076855
RN
2076891

2065832
2070666
2075521
2077359
RN
RN
2082181
2082181
RN
RN
RN

RN
RN
NA
NA
RN
RN
RN
2077360
2077640
2078807

10.0.3
9.0.4
6.0.4
5.0.5
6.0.3
5.0.4
2.6.0.1
1.8.2
1.8.2
3.0
3.0
3.0
3.0
3.0
3.5.2
3.5.2
5.8.2
5.7.3
5.5.1.2
5.5.1.2
5.1.3.1
5.5.1.1
5.1.2.1
5.0.3.2
5.5u1b
5.1.u2a
5.0.u3a
5.5u1b
5.1u2a
5.0u3a
5.5u1b
5.7.2
1.1
1.1
Patch Pending
3.3.1
5.5.2
5.1.1
Not Affected
Not Affected
Not Affected
6.0.1.2
Patch Pending
Patch Pending
Patch Pending
5.5.7
Patch Pending
5.5.1.1
5.8
5.5 Update 2

RN
RN
RN
RN
RN
RN
RN
RN
RN
RN
RN
RN
NA
RN
NA
NA
RN
RN
RN
RN
RN
2081861
2081860
2081859
RN
RN
RN
RN
RN
RN
RN
RN
RN
RN

RN
RN

RN

2082132
RN
2082666
NA
RN

5.5.2
5.1.3
5.0.4
5.8.2
5.7.3
5.5.2
Patch Pending
Patch Pending
5.5 Update 2
5.1 Update 3
Patch Pending
5.5 Update 2
5.1 Update 3
Patch Pending
ESXi550-201409101-SG
ESXi510-201412101-SG
Patch Pending
5.5 Update 2
5.5 Update 2
6.0.6
5.5.3
5.1.4.2
ESX410-201410401-SG
ESX400-201410401-SG
5.5 Update 2a
5.1 Update 2b
5.0 Update 3b
6.1.1
6.0.2
5.4.3
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-sles11sp3-64bit
bash-shell-shock-patch_1.1
bash-shell-shock-patch_1.0.1
nsx-manager-4.2.1-build39263
nsx-manager-4.1.4-build39258
???
VMware-NSX-Manager-upgrade-bundle-6.1.1-2179522
VMware-NSX-Manager-upgrade-bundle-6.0.7-2176282
???
5.5.3
5.1.2
bash-2.05b-20.1.1vmw.i386
5.8.2 SP3

RN
RN
RN
RN
RN
RN

RN
RN
RN
RN
2079731
2086278
RN
RN
RN
RN
RN
2090859
2090853
2091085
2091018
2091017
2091183
2091183
2091183
2091067
2091067
2091067
2091067
2091067
2091067
2091067
2091067
2091014
2091013
2091179
2091205
2091213
2091216
2091104
2091102
2092300
2091210

5.8.1 SP3
5.8.0 SP2
5.7.1 SP1
5.0.2 SP1
5.8.3
5.7.1
2.0.1
2.0 Update 1
1.5 Update 1
VMware-vcops-5.8.3-SLES11SP3-ShellShock-HP
VMware-vcops-SLES11SP2-ShellShock-HP
VMware-vcops-SLES11SP2-ShellShock-HP
VMware-vcops-SLES11SP2-ShellShock-HP
VMware-vcops-SLES11SP1-ShellShock-HP
VMware-vcops-SLES11SP1-ShellShock-HP
VMware-vcops-SLES11SP1-ShellShock-HP
VMware-vcops-SLES11SP1-ShellShock-HP
bash-openssl-sles11sp1-64bit
bash-openssl-sles11sp1-64bit
bash-openssl-sles11sp1-64bit
5.5.1.3
5.1.2.2
2091112_bash-sles11sp2-64bit
ApplicationDirector-5.2-ApplicationServices-6.x-shellshock-patch
ApplicationDirector-5.2-ApplicationServices-6.x-shellshock-patch
ApplicationDirector-5.2-ApplicationServices-6.x-shellshock-patch
VCAC_6.1_ShellShock_HP1
vCAC_6.0.1.2_ShellShock_HP1
vCAC_6.0.1.2_ShellShock_HP1
vCAC_6.0.1.2_ShellShock_HP1
ApplicationDirector-5.2-ApplicationServices-6.x-shellshock-patch
ApplicationDirector-5.2-ApplicationServices-6.x-shellshock-patch
ApplicationDirector-5.2-ApplicationServices-6.x-shellshock-patch
2.6.1
5.5.3.1
5.1.4.3
3.3.2
3.3.2
9.3.5.1
9.2.9.1
9.1.14.1
3.0.1.1
2.0.4
5.1
bash_3.2-0ubuntu18-1_i386.deb
3.1
1.1.1

2091372
2091373
2091223
2091224
2091095
2091093
2091108
2091065
2091065
2091083
2091401
2091401
2091401
2091002
2091002
2091002
2091002
2091036
2091036
2091036
2091038
2091039
2091112
2091129
2091129
2091129
2091012
2091012
2091012
2091012
2091129
2091129
2091129
2091071
2091045
2091218
2091217
2091184
2091184
2091055
2091055
2091055
2091281
2091015
2091090
2091990
2091087
2091050
RN

5.8
5.5.x
5.1.21
5.5.0.2
5.0.0.3
5.8.0.1
5.6.0.2
5.5.1.3
5.1.2.2
5.5.2
5.1.3
5.5.7
5.1 Update 3
5.5 Update 2
5.1 Update 3
5.0 Update 3
ESXi550-201501101-SG
ESXi510-201412101-SG
No Patch Planned
Patch Pending
ESXi510-201412101-SG
No Patch Planned
Patch Pending
ESXi510-201412101-SG
Patch Pending
5.1 Update 3
Patch Pending
5.1 Update 3
Patch Pending
VMRC_VCAC_6.1.1.zip
VMRC_VCAC_6.1.zip
VMRC_VCAC_6.0.1.2.zip
VMRC_VCAC_6.0.1.1.zip
VMRC_VCAC_6.0.1.zip
7.3.3.0 (FP3)
10.0.5
6.0.5
6.0.5
ESXi550-201403102-SG
ESXi510-201404101-SG
ESXi500-201405101-SG
10.0.5
6.0.5
7.0.1
6.0.5
10.0.5
6.0.5
ESXi550-201501101-SG
ESXi510-201404101-SG
5.5 Update 2d

2091341
2091341
2091341
2079150
2079151
2091019
2091031
2091033
2091035
2091000
2091086
RN
RN
RN
RN
RN
2099265
2086278

2086278

2086278
RN
RN
2097932
2097932
2097932
2097932
2097932
RN
RN
RN
2065832
2070666
2075521
RN
RN
RN
RN
RN
RN
2099265
2070666
RN

Patch Pending
Patch Pending
ESXi550-201501101-SG
ESXi510-201503101-SG
ESXi500-201502101-SG
ESXi550-201501101-SG
ESXi510-201503101-SG
Patch Pending
5.8.1
5.5.9
No Patch Planned
6.1
5.3.4
2.1.1
2.1.1
6.1.4
5.4.5
5.5.4.1
2.7.1
vCloudUsageMeter-3.3.3.0-2662895_OVF10.ova
5.5.1.5
Patch Pending
Patch Pending
6.0.0a
5.5 Update 2e
5.1 Update 3a
5.0 Update 3d
vmware-jre-1.7.0_76-1server.x86_64.rpm
VMware-vcops-JRE-SKIP-TLS-HP
VMware-vcops-JRE-SKIP-TLS-HP
6
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
jre-6u91-linux-amd64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
9.3.6.0
9.2.10.0
9.1.15.0
5.8.0.2
5.6.0.3
5.5.1.5
Patch Pending

2099265
2099286
2101910
2099265
2099286

RN
RN

RN
RN
2114239
2111994

2111640
RN
RN
RN
2111898
2111172
2111172
RN
2111981
2111981
2111981
2111981
2111658
2111658
2111658
2111658
2111658
RN
RN
RN
2112022
2112025
2112008
2111337
2111337
2111337

jre-7u76-linux-x64.rpm
jdk-7u80-linux-x64.rpm
jdk-7u80-linux-x64.rpm
Patch Pending
Patch Pending
Patch Pending
Patch Pending
CBM-27
CBM-26
jdk-7u76-linux-x64.tar.gz
jdk-7u76-linux-x64.tar.gz
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
vmware-jre-1.7.0_76-1server.x86_64.rpm
VMware-NSX-Manager-6.1.4-2691049
4.2.4
5.5.3
5.6.4.1
Patch Pending
Fix
Fix
5.8.4
jre-7u76-linux-x64.rpm
Patch Pending
vmware-jre-1.7.0_76-1server.x86_64.rpm
5.1.3.1
VMware-vRealize-Log-Insight-2.5.0-2629935.pak
VMware-vCenter-Log-Insight-2.0.5-2629934.pak
VMware-vCenter-Log-Insight-1.5.2-2638236.pak
jre-7u76-linux-x64.rpm
5.5.0.4
5.1.0.3
6.0.0a
5.5 Update 2e
5.1 Update 3a
5.0 Update 3d
1.2.1

2111336
2116604
2116604

2112011
2113178
2112258
2112258
2111802
2111802
2111802
RN
RN
RN
RN
2111670
2111670
RN
2111334
2112028
2112028
RN
2113235
2113235
2113235
2113235
2112648
2634230
2111640
RN
RN
RN
RN

KB

KB
KB

KB
KB

KB
KB

KB
KB

Build

660575
660575

660575
660575

660575
660575

660575
660575

Product
vCenter
vCenter
vCenter
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter
vCenter
vCenter
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter
vCenter
vCenter
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter
vCenter
vCenter
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter
vCenter
vCenter
ESXi
ESXi
ESXi
ESXi
ESX

Server
Server
Server

Server
Server
Server

Server
Server
Server

Server
Server
Server

Server
Server
Server

KB
KB

KB
KB
KB

RN

KB
KB

RN

RN

RN

KB
KB
KB
KB
KB

660575
660575

ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
660575
ESXi
582267
ESXi
608089
ESXi
ESX
ESX
ESX
643764
CBM
643764
CBM
818020 vCenter Server
vCenter Server
vCenter Server
598800
VirtualCenter
ESXi
ESXi
ESXi
ESXi
604481
ESX
787047
ESX
ESX
View
640196
View
View
View
640196
View
View
vCenter Server
vCenter Server
vCenter Server
Workstation
491717
Workstation
Player
Player
Fusion
ESXi
480973
ESXi
502767
ESXi
515841
ESXi
ESX
480973
ESX
811144
ESX
vCO
vCO
vCO
vSM

RN
RN

576124
638154

RN
RN

KB
RN
RN
RN

811144
818020
816786
639890

KB
KB

480973
811144

KB

608089

KB
KB
KB

604481
660575
348481

vSM
vSM
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
Update Manager
Update Manager
Update Manager
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi

KB
KB
KB

604481
660575
348481

KB
KB

660575
659051

KB

660575

RN
RN
RN
RN
RN
KB
KB
KB
KB
KB
KB
KB

591240
744570
591240
744570
683185
604481
660575

KB
KB

787047
659051

608089
604481
660575
582267

ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server

KB
KB

787047
659051

RN

491717

RN

744570

KB
KB
KB

702112
403554
502767

KB
KB
KB

702112
403553
502767

RN

491717

RN

744570

KB

702113

KB

702116

KB
KB
KB
KB

702118
702113
702116
702112

vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi

KB
KB
KB

702113
702116
702112

KB
KB
KB
KB
KB
KB
KB

702118
702113
702116
702112
702113
702116
702112

RN

744570

RN
RN
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB

744570
683185
702118
702113
702116
702112
702113
702116
702112
724898
724898
724898

RN
RN
RN
RN
RN
KB
KB
KB
KB
KB
KB

744019
744570
744019
744570
730298
721882
721871
721907
725354
721871
721907

ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vMA
vMA
vMA
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX

KB

RN
RN

KB
KB
KB
KB
KB
KB
KB

KB
KB
KB

RN
RN
RN

KB

RN

RN
RN

725354

ESX
vCenter Server
vCenter Server
vCenter Server
744019
Workstation
Workstation
744019
Player
Player
Fusion
721882
ESXi
721871
ESXi
721907
ESXi
725354
ESXi
721871
ESX
721907
ESX
725354
ESX
vCenter Server
vCenter Server
vCenter Server
764879
ESXi
811144
ESXi
787047
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
Update Manager
Update Manager
Update Manager
ESXi
ESXi
ESXi
ESXi
811144
ESX
ESX
ESX
vCenter Server
vCenter Server
818020 vCenter Server
VirtualCenter
Update Manager
799345 Update Manager
818020 Update Manager
ESXi
ESXi
ESXi

KB

811144

KB
KB

912577
811144

KB

811144

KB
KB

811144
787047

KB
KB

811144
787047

KB

811144

KB
KB

811144
787047

KB

811144

ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi

KB
KB

811144
787047

KB
KB

811144
787047

RN
RN

RN
RN
RN
RN
RN

RN

893925

RN

893925

RN

893925

RN

893925

ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCOps
vCOps
vCO
vCO
vCO
Movie Decoder
Movie Decoder
Movie Decoder
vCOps
vCOps
vCOps
CapacityIQ
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Workstation
Player
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Workstation
Player
Player
Player
Fusion
ESXi

RN

893925

RN

893925

RN

KB

874690

KB

874690

KB

874690

ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
Workstation
Workstation
Workstation
Player
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
OVF Tool
OVF Tool
OVF Tool
OVF Tool
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server

KB

874690

KB

874690

KB

874690

RN
RN
RN
RN

691993
916912
947940
920217

RN
KB
KB

1063671
912577

RN
RN

913577
800380

RN

920217

ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
View
View
VCSA
VCSA
VCSA
VCSA
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
vCSA
vCSA
ESXi
ESXi

RN
RN
RN

925676
934016
988558

RN
RN
RN

925676
934018
988558

KB
KB
KB
KB
KB
KB
KB
KB
KB

988178
989856
988599
988178
989856
988599
1063671
1022489
988178

KB

988178

KB
KB

988178
988178

KB

988178

RN
RN

894247
893925

ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
vSphere Client
vSphere Client
vSphere Client
vSphere Client
VI-Client
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Workstation
Workstation

RN
RN
RN
RN
KB
KB
KB
KB

900491
900582
691993
916912
911593
912577
874690
989856

KB
KB

874690
989856

RN
RN

947939
913577

RN

934016

KB
KB
KB
KB
KB
KB
KB
KB

911593
912577
874690
989856
988599
874690
989856
988599

RN

943004

KB

988599

KB
KB
KB
KB
KB

988599
1063671
1022489
1050704
1070634

Fusion
Fusion
View
View
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi

KB
KB
RN
RN
RN

1050704
1070634

RN

1065184

RN

1065184

RN
RN

1064983
1300600

RN
RN

1065152
1300600

RN

1064983

KB
KB
RN
RN

1363503
1070634
1131433
1131433

1064983

ESX
ESX
vFabric Postgres
vFabric Postgres
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VCSA
VCSA
VCSA
VCSA
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
Update Manager
Update Manager
Update Manager
Update Manager
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
CBM
CBM

RN
RN

1473063
1300600

KB
KB
KB

1483097
1311177
1198252

KB
KB
KB
KB
KB
KB
KB
KB

1198252
1335992
1483097
1311177
1198252
1335992
1198252
1335992

KB
KB

1198252
1335992

KB
KB

1198252
1335992

KB
KB
KB
KB
KB
KB

1142907
1197855
1050704
1070634
1050704
1070634

vCenter Server
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Workstation
Workstation
Player
Player
Fusion
ESXi
ESXi
ESXi
ESXi
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
vCenter Server

KB
KB
KB
KB
KB

1311177
1198252
1070634
1198252
1070634

RN

1300600

RN
RN

1623101
1300600

RN
RN

1623101
1300600

RN

1410761

RN
KB
KB
KB
KB
KB
KB
RN

1410761
1063671
1024429
988178
1070634
988178
1070634
1435862

RN

1410761

RN

1410761

vCenter Server
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
Update Manager
Update Manager
Update Manager
Update Manager
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Player
Player
Workstation
Workstation
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Fusion
Fusion
Player
Player
Workstation
Workstation
ESXi
ESXi
ESXi

KB

1363503

KB

1363503

KB
KB
KB
KB
KB
KB
KB

1474526
1312874
1311175
1363503
1335992
1363503
1335992

KB
KB
KB
KB
KB
KB

1483097
1311175
1363503
1335992
1363503
1335992

RN

894247

RN

802507

RN

802507

KB
KB
KB
KB
KB
KB

1483097
1311175
1363503
1335992
1363503
1335992

RN
RN
RN

1489357
1624811
2308385

KB
KB
KB
KB
KB
KB
KB
KB
KB

1623387
1743201
1749766
1682698
1682696
1682698
1682696
1623387
2068190

ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Workstation
Workstation
Player
Player
Fusion
Fusion
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
vCloud Director
vCloud Director
VCSA
VCSA
VCSA
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi

KB

2323236

RN

1623101

RN

1623101

RN
RN
KB
KB
KB
KB

1473063
1300600
1682698
1682696
1682698
1682696

RN
RN

1473063
1300600

RN
RN
KB
KB
RN
RN
RN

1750597
1750787
1746974
1746018
1744117
1747349
1744117

RN
RN
KB

4.4.2
2.3.3

ESXi
ESXi
ESXi
ESX
ESX
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
VirtualCenter
Update Manager
Update Manager
Update Manager
Update Manager
Update Manager
ESXi
ESXi
ESXi
ESXi
ESX
ESX
vSphere Client
vSphere Client
vSphere Client
ESXi
ESXi
ESX
ESX
vSphere Client
vSphere Client
vSphere Client
ESXi
ESXi
ESX
ESX
vCenter Serve
vCenter Serve
ESXi
ESXi
Workstation
Fusion
Player
NSX for Multi-Hypervisor
NSX for Multi-Hypervisor
NSX for vSphere
NVP
Horizon Mirage Edge Gateway
Horizon View Feature Pack 1
Horizon View Client

KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB

2.3.3
2.3.3
2.3.3
2.3.3
2.3.3
2.3.3
2.3.3
1736237
1736201
1751014
1751014
1751013
1751013
1751014
1751013

RN
RN
KB
KB
RN
KB

1740418
1740417
1748061
1474321

KB
KB
KB
KB
RN
RN
KB
KB
RN
RN
RN

1623387
1743201
1749766
1881737
1885370
NA
1876270
1876338
49382
1887719
1879321

RN
RN
NA
NA
RN
RN
RN
KB
KB
KB

1912200
1912202
5.4.1
5.4.1
1891314
1882349
1917469
1881737
1900470
1918656

Horizon View Client


Horizon View Client
Horizon View Client
Horizon View Client
Horizon View Client
Horizon View Client
Horizon Workspace Serve
Horizon Workspace Serve
Horizon Workspace Serve
Horizon Workspace Client
Horizon Workspace Client
Horizon Workspace Client
Horizon Workspace Client
Horizon Workspace for Macintosh
Horizon Workspace for Windows
OVF Tool
VMware vCloud Networking and Security (vCNS)
VMware vCloud Networking and Security (vCNS)
vCloud Automation Center (vCAC)
vSphere Big Data Extensions
Client Integration Plug-In
vCloud Director
Workstation
Player
Fusion
ESXi
ESXi
ESXI
ESXi
Big Data Extensions
vCenter Charge Back Manager
Horizon Workspace Server
Horizon Workspace Server
Horizon Mirage Edge Gateway
Horizon View
Horizon View Feature Pack
NSX for Multi-Hypervisor
NSX for Multi-Hypervisor
NSX for vSphere
NVP
vCloud Networking and Security
vCloud Networking and Security
Pivotal Web Server
vFabric Web Server
vCSA
vCSA
vCSA
ESXi
ESXi
ESXi

RN
RN
RN
RN
RN
RN
RN
RN
RN
RN
RN
RN
NA
RN
NA
NA
RN
RN
RN
RN
RN
KB
KB
KB
RN
RN
RN
RN
RN
RN
RN
RN
RN
RN

1895310
1945795
1887983
1945692
1895310
1945795
NA
1917619
1917617
3.0
3.0
3.0
3.0
3.0
1880279
1880279
1885282
1929593
1929337
1881717
1881640
1964818
1964824
1964819
1891314
1882349
1917469
1891314
1882349
1917469
1891314
242
2074955
2074955

RN
RN

1890136

RN

1768531

KB
RN
KB
NA
RN

1879843
2055179
2043780

Workstation
Workstation
Fusion
Fusion
Player
Player
vCenter Chargeback Manager
Horizon Workspace Client
Horizon Workspace Client
Horizon View Client
Horizon View Client
Horizon View Client
Horizon View Client
Horizon View Client
OVF Tool
OVF Tool
vCenter Operations Manager
vCenter Operations Manager
vCenter Support Assistant
vCD
vCD
vCenter Site Recovery Manager
vCenter Site Recovery Manager
vCenter Site Recovery Manager
vSphere Client
vSphere Client
vSphere Client
vCenter Server
vCenter Server
vCenter Server
Update Manager
Config Manager (VCM)
ITBM Standard
ITBM Standard
Studio
Usage Meter
vCenter Converter Standalone
vCenter Converter Standalone
vCloud Application Director
vFabric Application Director
vFabric Application Director
vCloud Automation Center (vCAC)
VIX API
vMA (Management Assistant)
VMware vSphere PowerCLI
vSphere Data Protection
vSphere Data Protection
vSphere Replication
vSphere Replication
vSphere SDK for Perl

RN
RN
RN
RN
RN
RN

1890828
1890807
1885841
1885282
1929593
1992027

RN
RN

2075275
2306353

RN
RN

2075275
2306353

KB
KB

2068190
2323236

RN
RN
RN
RN
RN
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB

2075275
2075275
2103699
2081508
2102811
2168595
2167889
2170515
2170517
2170782
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

KB
KB

2179522
2176282

KB
KB
KB
KB

NA
NA

39263
39258

VDDK
VDDK
VDDK
vCOPS
vCOPS
vCO
vCO
vCO
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
vCenter Server
vCenter Update Manager
NSX Edge
vCNS Edge
vCNS Edge
ESX
ESX
vCenter Server Appliance
vCenter Server Appliance
vCenter Server Appliance
Horizon DaaS Platform
Horizon DaaS Platform
Horizon DaaS Platform
Horizon Workspace
Horizon Workspace
Horizon Workspace
Horizon Workspace
Horizon Workspace
Horizon Workspace
Horizon Workspace
Horizon Workspace
IT Business Management Suite
IT Business Management Suite
NSX for Multi-Hypervisor
NSX for Multi-Hypervisor
NSX for Multi-Hypervisor
NSX for vSphere
NSX for vSphere
NVP
vCenter Converter Standalone
vCenter Converter Standalone
vCenter Application Discovery Manager
vCenter Hyperic Server

KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
RN

2182335
2188865
2188865
2188865
2191616
2191616
2191616
2191616

2170717
2170716

2175697
2174081

2171038
2170145
2170086
2171775

vCenter Hyperic Server


vCenter Hyperic Server
vCenter Hyperic Server
vCenter Hyperic Server
vCenter Infrastructure Navigator
vCenter Infrastructure Navigator
vCenter Infrastructure Navigator
vCenter Log Insight
vCenter Log Insight
vCenter Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Orchestrator Appliance
vCenter Orchestrator Appliance
vCenter Orchestrator Appliance
vCenter Site Recovery Manager
vCenter Site Recovery Manager
vCenter Support Assistant
vCloud Application Director
vCloud Application Director
vCloud Application Director
vCloud Automation Center
vCloud Automation Center
vCloud Automation Center
vCloud Automation Center
vCloud Automation Center Application Services
vCloud Automation Center Application Services
vCloud Automation Center Application Services
vCloud Director Appliance
vCloud Connector
vCloud Networking and Security
vCloud Networking and Security
vCloud Usage Meter
vCloud Usage Meter
vFabric Postgres
vFabric Postgres
vFabric Postgres
View Planner
VMware Data Recovery
VMware Mirage Gateway
VMware Studio
VMware Workbench
vSphere App HA
vSphere Big Data Extensions
vSphere Big Data Extensions

KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
KB
RN
RN
RN
RN
RN
KB
KB

2170514
2172161
2170307
2170306
2171621

2306353
2075275
2306353
2210222
2352327
2323236

KB

2323236

KB

2323236

RN

2306353

RN

2306353

KB
KB
KB
KB
KB
RN
RN
RN
KB
KB
KB
RN
RN
RN
RN
RN
RN
KB
KB
RN

2209127
1623387
1743201
1749766

2209127

2352327
1743201
2442329

vSphere Data Protection


vSphere Data Protection
vSphere Data Protection
vSphere Management Assistant
vSphere Management Assistant
vSphere Replication
vSphere Replication
vSphere Replication
vSphere Replication
vSphere Storage Appliance
vSphere Storage Appliance
vSphere Data Protection
vCenter Server Appliance
vCenter Server
vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESXi
ESXi
ESXi
ESXi
ESXi
vCenter Server
vCenter Server
vCenter Update Manager
vCenter Update Manager
vCloud Automation Center
vCloud Automation Center
vCloud Automation Center
vCloud Automation Center
vCloud Automation Center
AirWatch On-Premise
Workstation
Player
Fusion
ESXi
ESXi
ESXi
Workstation
Player
Fusion
Fusion
Workstation
Player
ESXi
ESXi
vCenter Server

KB
KB
KB
KB
KB

2352327
2575044
2505810
2352327
2575044

RN
RN

2560245
2560245

RN
RN
KB
KB

2673026
2651442
2662895
2653439

KB
RN
RN
RN
KB
KB
KB
RN
KB
KB
KB
KB
KB
KB
KB
KB
KB
RN
RN
RN
KB
KB
KB

2656757
2646482
2669725
2656067

KB
KB
KB

2632669

2686907
2686745
2676705
2613527
2579602
2647463

vCenter Server
vCenter Server
ESXi
ESXi
ESXi
ESXi
ESXi
ESXi
VMware vSphere Data Protection
VMware vSphere Data Protection
VMware vSphere Data Protection
Horizon View
Horizon View
Horizon Workspace Portal Server
Horizon Workspace Portal Server
Horizon DaaS Platform
Horizon DaaS Platform
vCloud Networking and Security
vCloud Connector
vCloud Usage Meter
vCenter Site Recovery Manager
vCenter Site Recovery Manager
vCenter Site Recovery Manager
vCenter Server
vCenter Server
vCenter Server
vCenter Server
vRealize Operations Manager
vCenter Operations Manager
vCenter Operations Manager
vCenter Support Assistant
vRealize Application Services
vRealize Application Services
vCloud Application Director
vCloud Application Director
vRealize Automation
vRealize Automation
vCloud Automation Center
vRealize Code Stream
vRealize Code Stream
vPostgres
vPostgres
vPostgres
vSphere Replication
vSphere Replication
vSphere Replication
vSphere Replication
vRealize Hyperic
vRealize Hyperic
vRealize Hyperic

KB
KB
KB

KB
KB
KB
KB
KB
KB
KB
RN
RN
RN
RN

2691049
42965
2578696
2619597

KB
KB
RN
KB
KB
KB
RN
KB
KB
KB
KB
KB
KB
KB
RN
RN
RN
RN

2631654
2112647
2656757
2646482
2650847
2692649
2812592

vSphere AppHA
vSphere Big Data Extensions
vSphere Big Data Extensions
vSphere Data Protection
vSphere Data Protection
vSphere Data Protection
vSphere Data Protection
vCenter Chargeback Manager
vCenter Chargeback Manager
vRealize Business Adv/Ent
vRealize Business Adv/Ent
vRealize Business Standard
vRealize Business Standard
vRealize Business Standard
NSX for vSphere
NSX for Multi-Hypervisor
vCloud Director
vCloud Director For Service Providers
vCenter Application Discovery manager
vRealize Configuration Manager
vRealize Configuration Manager
vCenter Infrastructure Navigator
vCenter Infrastructure Navigator
vRealize Orchestrator
vRealize Orchestrator
vRealize Orchestrator
vRealize Log Insight
vRealize Log Insight
vRealize Log Insight
vRealize Log Insight
vSphere Management Assistant
vSphere Management Assistant
vSphere Update Manager
vSphere Update Manager
vSphere Update Manager
vSphere Update Manager
EVO:RAIL

Version

Running on

CVE

4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.1
3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5

Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX

CVE-2011-0726; CVE-2011-1078; CVE2011-1079; CVE-2011-1080;


CVE-2011CVE-2011-0726;
CVE-2011-1078;
CVE1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-0726; CVE-2011-1078; CVECVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-0726;
CVE-2011-1078;
CVE2011-1172;
CVE-2011-1494;
CVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-0726;
CVE-2011-1078;
CVE1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011CVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079; CVE-2011-1080;
CVE-2011-0726;
CVE-2011-1078; CVECVE-2010-4649;
CVE-2011-0695;
CVE1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-0726;
CVE-2011-1078;
CVE2011-0711;
CVE-2011-1044;
CVE-2011CVE-2010-4649;
CVE-2011-0695;
1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-0726; CVE-2011-1078; CVE1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2010-4649;
CVE-2011-0695;
1495;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011CVE-2011-1170;
CVE-2011-1171;
CVE1093; CVE-2011-1577;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011-0726;
CVE-2011-1078;
CVE-2011-1593;
CVE-2011-1745;
1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2011CVE-2010-4649;
CVE-2011-0695;
CVE1495; CVE-2011-1163;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-0726;
CVE-2011-1078;
CVE2011-1746;
CVE-2011-1776;
CVE-2011CVE-2011-1593;
CVE-2011-1745;
CVE1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2010-4649;
CVE-2011-0695;
1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011-1170;
CVE-2011-1171;
CVE1093;
CVE-2011-1163;
CVE-2011-1166;
2011-1079;
CVE-2011-1080;
CVE-2011CVE-2011-2192
1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011CVE-2011-1593;
CVE-2011-1745;
1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2010-4649;
CVE-2011-0695;
CVE1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011CVE-2011-1170;
CVE-2011-1171;
1093;
CVE-2011-1163;
CVE-2011-1166;
CVE-2011-2192
CVE-2011-2492;
CVE-2011-1780;
CVE1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011-1593;
CVE-2011-1745;
1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2011CVE-2010-4649;
CVE-2011-0695;
CVE1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011-1170;
CVE-2011-1171;
CVE-2011-2192
2011-2525;
CVE-2011-2689;
CVE-2011-2492;
CVE-2011-1780;
1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011CVE-2011-1593;
CVE-2011-1745;
CVE1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2010-4649;
CVE-2011-0695;
1495;
CVE-2011-1577;
CVE-2011-1763;
2011-1172;
CVE-2011-1494;
CVE-2011CVE-2011-2192
2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011CVE-2011-2492;
CVE-2011-1780;
CVE1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011-1593;
CVE-2011-1745;
1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2011CVE-2010-4649;
CVE-2011-0695;
CVE1495;
CVE-2011-1577;
CVE-2011-1763;
CVE-2011-2192
CVE-2011-2517;
CVE-2011-2519;
2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011CVE-2011-2492;
CVE-2011-1780;
1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011-1593;
CVE-2011-1745;
CVE1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2011CVE-2010-4649;
CVE-2011-0695; CVECVE-2011-2192
2011-2901
CVE-2011-2517;
CVE-2011-2519;
2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011-2492;
CVE-2011-1780;
CVE1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011CVE-2011-1593;
CVE-2011-1745;
1182;
CVE-2011-1573;
CVE-2011-1576;
2011-0711;
CVE-2011-1044;
CVE-2011-2192
2011-2901
CVE-2011-2517;
CVE-2011-2519;
2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011CVE-2011-2492;
CVE-2011-1780;
CVE1936; CVE-2011-1573;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011-1593;
CVE-2011-1745;
1182;
CVE-2011-1576;
CVE-2011-2192
2011-2901
CVE-2011-2517;
CVE-2011-2519;
CVE2482; CVE-2011-2022;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011-2492;
CVE-2011-1780;
1936;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011CVE-2011-1593;
CVE-2011-1745;
CVECVE-2011-2192
2011-2901
CVE-2011-2517;
CVE-2011-2519;
2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011-2492;
CVE-2011-1780;
CVE1936;
CVE-2011-2022;
CVE-2011-2213;
2011-1746;
CVE-2011-1776;
CVE-2011CVE-2011-2192
2011-2901
CVE-2011-2517;
CVE-2011-2519;
CVE2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011CVE-2011-2492;
CVE-2011-1780;
1936;
CVE-2011-2022;
CVE-2011-2213;
CVE-2010-2059;
CVE-2011-3378
2011-2901
CVE-2011-2517;
CVE-2011-2519;
CVE2482; CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011CVE-2011-2492;
CVE-2011-1780;
CVE-2010-2059;
CVE-2011-3378
2011-2901
CVE-2011-2517;
CVE-2011-2519;
CVE2482;
CVE-2011-2491;
CVE-2011-2495;
2011-2525;
CVE-2011-2689;
CVE-2011CVE-2010-2059;
CVE-2011-3378
2011-2901
CVE-2011-2517;
CVE-2011-2519;
CVE2482;
CVE-2011-2491;
CVE-2011-2495;
CVE-2010-2059;
CVE-2011-3378
2011-2901
CVE-2011-2517; CVE-2011-2519; CVECVE-2010-2059;
CVE-2011-3378
2011-2901
CVE-2010-2059; CVE-2011-3378
CVE-2010-2059; CVE-2011-3378
CVE-2010-2059; CVE-2011-3378
CVE-2010-2059; CVE-2011-3378
CVE-2010-2059; CVE-2011-3378
CVE-2010-0547; CVE-2010-0787; CVE2011-1678; CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547; CVE-2010-0787; CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678; CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2010-0547;
CVE-2010-0787;
CVE2694
2011-1678;
CVE-2011-2522;
CVE-2011CVE-2009-3720;
CVE-2010-3493;
CVE2694
2011-1015;
CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015;
CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015; CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015; CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015; CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015; CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015; CVE-2011-1521
CVE-2009-3720;
CVE-2010-3493; CVE2011-1015; CVE-2011-1521

4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
1.6.2
2.0.0
4.0
4.1
5.0
2.5
3.5
4.0
4.1
5.0
3.5
4.0
4.1
5.0
4.6
4.0
5.0
4.6
4.0
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.2
4.1
4.0
5.0

ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
any
any
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Linux

CVE-2009-3720; CVE-2010-3493; CVE2011-1015; CVE-2011-1521


CVE-2009-3720;
CVE-2010-3493; CVE2011-1015;
CVE-2011-1521
CVE-2009-3560; CVE-2009-3720; CVE2010-1634; CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634; CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560; CVE-2009-3720; CVE1521
2010-1634;
CVE-2010-2089;
CVE-2011CVE-2009-3560;
CVE-2009-3720;
CVE1521
2010-1634;
CVE-2010-2089; CVE-2011CVE-2012-1472
1521
CVE-2012-1472
CVE-2011-3548; CVE-2011-3521; CVE2011-3554; CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3545; ; CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3551; ;CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVECVE-2011-3556;
CVE-2011-3557;
3551;
CVE-2011-3550;
CVE-2011-3516;
3545;
;
CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548; CVE-2011-3521; CVECVE2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
CVE3551;
CVE-2011-3516;
3545; CVE-2011-3550;
; CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
CVE3551;
CVE-2011-3516;
3545;
;CVE-2011-3550;
CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVECVE-2011-3389;
CVE-2011-3553;
3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
CVE3551;
CVE-2011-3550;
CVE-2011-3516;
3545;
;
CVE-2011-3549;
CVE-20112011-3554; CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
CVE3551; ;CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
CVE3546; ;CVE-2011-3550;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
3551;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
CVE3551;
CVE-2011-3550;
CVE-2011-3516;
3545;
;
CVE-2011-3549;
CVE-20112011-3554; CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
CVE3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
3551;
CVE-2011-3516;
3545;
;CVE-2011-3550;
CVE-2011-3549;
CVE-20112011-3554;
CVE-2011-3544;
CVE-2011CVE-2012-1509;
CVE-2012-1510;
CVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
3551;
CVE-2011-3550;
CVE-2011-3516;
3545;
;
CVE-2011-3549;
CVE-20112012-1508
CVE-2012-1509; CVE-2012-1510; CVECVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
CVE3551;
CVE-2011-3550;
CVE-2011-3516;
2012-1508
CVE-2012-1509;
CVE-2012-1510;
CVE2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
CVE3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2011-3556;
CVE-2011-3557;
2012-1508
CVE-2012-1511
2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
CVE3546;
CVE-2011-3558;
CVE-2011-3547;
2011-3560;
CVE-2011-3555;
CVE-2011CVE-2012-1511
2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
CVE3546;
CVE-2011-3558;
CVE-2011-3547;
CVE-2012-1511
2011-3552;
CVE-2011-3561
CVE-2011-3389;
CVE-2011-3553;
CVE-2012-1509; CVE-2012-1510; CVECVE2011-3552;
CVE-2011-3561
2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1509; CVE-2012-1510; CVE2012-1508
CVE-2012-1513
CVE-2012-1513
CVE-2012-1513
CVE-2012-1514

4.1
4.0
4.0
4.1
5.0
2.5
5.0
4.1
4.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
2.5
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
2.5
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
3.5
4.0
4.1
5.0

Linux
Linux
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi

CVE-2012-1514
CVE-2012-1514
CVE-2011-3548; CVE-2011-3521; CVE2011-3554; CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3545; CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVECVE-2011-3550;
CVE-2011-3516;
CVE3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554; CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011-3548;
CVE-2011-3521;
CVE3560; CVE-2011-3549;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVECVE-2011-3558;
CVE-2011-3547;
3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
CVE3545; CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011-3548;
CVE-2011-3521;
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
CVE3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548; CVE-2011-3521; CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011-3558;
CVE-2011-3547;
3560;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
CVE3545; CVE-2011-3555;
CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011-3548;
CVE-2011-3521;
3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
CVE3560; CVE-2011-3549;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011-3558;
CVE-2011-3547;
3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554; CVE-2011-3544;
CVE-2011-3548;
CVE-2011-3521; CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011-3558;
CVE-2011-3547;
CVE3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011-3548;
CVE-2011-3521;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
CVE3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011CVE-2011-3548;
CVE-2011-3521;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011-3558;
CVE-2011-3547;
3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
CVE3545; CVE-2011-3549;
CVE-2011-3551;
2011-3554;
CVE-2011-3544;
CVE-2011-3190;
CVE-2011-3375;
3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
CVE3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011-3550;
CVE-2011-3516;
3545;
CVE-2011-3549;
CVE-2011-3551;
2012-0022
CVE-2011-3190;
CVE-2011-3375;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011-3558;
CVE-2011-3547;
3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-2011CVE-2011-3550;
CVE-2011-3516;
2012-0022
CVE-2011-3190; CVE-2011-3375; CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011-3558;
CVE-2011-3547;
CVE3560;
CVE-2011-3555;
CVE-2011-3546;
2011-3556;
CVE-2011-3557;
CVE-20112012-0022
CVE-2011-3190;
CVE-2011-3375;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
CVE3560; CVE-2011-3555;
CVE-2011-3546;
2012-0022
CVE-2011-3190;
CVE-2011-3375;
CVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-2011CVE-2011-3558;
CVE-2011-3547;
2012-0022
CVE-2011-3190; CVE-2011-3375; CVECVE3552;
CVE-2011-3561
2011-3389;
CVE-2011-3553;
CVE-20112012-0022
CVE-2011-3190;
CVE-2011-3375;
CVE3552;
CVE-2011-3561
2012-0022
CVE-2011-3190;
CVE-2011-3375; CVE2012-0022
CVE-2011-3190; CVE-2011-3375; CVE2012-0022
CVE-2011-3190; CVE-2011-3375; CVE2012-0022
CVE-2011-3190; CVE-2011-3375; CVE2012-0022
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2010-0405
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2012-1515

3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1

ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows

CVE-2012-1515
CVE-2012-1515
CVE-2012-1515
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2011-2482; CVE-2011-3191; CVE2011-4348
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2012-1518
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2011-3191; CVE-2011-4348; CVE2012-0028
CVE-2010-4008; CVE-2011-0216; CVE2011-1944; CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905; CVE-2011-3919
2011-1944;
CVE-2011-2834; CVE-20113905; CVE-2011-3919

5.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
3.5
4.0
4.1
5.0
3.5
4.0
4.1
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
5.0
4.1
4.0
3.5

Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi

CVE-2010-4008; CVE-2011-0216; CVE2011-1944; CVE-2011-2834;


CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905;
CVE-2011-3919
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008; CVE-2011-0216; CVE3905; CVE-2011-3919
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905; CVE-2011-3919
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905;
CVE-2011-3919
2011-1944; CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905; CVE-2011-3919
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905; CVE-2011-3919
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;
CVE3905;
CVE-2011-3919
2011-1944;
CVE-2011-2834; CVE-2011CVE-2012-1516
3905;
CVE-2011-3919
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1516
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-1517
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2448

4.1
4.0
3.5
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
5.0
4.1
4.0
3.5
4.1
4.0

ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
any
any
any
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX

CVE-2012-2448
CVE-2012-2448
CVE-2012-2448
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2449
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2450
CVE-2012-2752
CVE-2012-2752
CVE-2012-2752
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288
CVE-2012-3288

3.5
4.0
4.1
5.0
8.0
7.0
4.0
3.0
4.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
2.5
5.0
4.1
4.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
2.5
5.0
4.1
4.0
5.0
4.1
4.0

ESX
Windows
Windows
Windows
any
any
any
any
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi

CVE-2012-3288
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2012-3289
CVE-2010-4008; CVE-2011-0216;CVE2011-1944; CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008; CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944; CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944; CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2010-4008;
CVE-2011-0216;CVE3905;CVE-2011-3919;
CVE-2012-0841
2011-1944;
CVE-2011-2834;
CVE-2011CVE-2012-0497; CVE-2012-0498;
CVE3905;CVE-2011-3919;
CVE-2012-0841
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE0500; CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVECVE-2012-0503;
CVE-2012-0505;
CVE0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499; CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE5035; CVE-2012-0508;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
CVE0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499; CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497; CVE-2012-0498; CVE5035;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
CVE0500; CVE-2012-0501;
CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
5035; CVE-2012-0508;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497; CVE-2012-0498; CVE5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE5035; CVE-2012-0508;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0504;
2012-0499;
CVE-2012-0507;
CVE-2012CVE-2012-0497;
CVE-2012-0498;
CVE5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
CVE0500;
CVE-2012-0508;
CVE-2012-0504;
2012-0499; CVE-2012-0507;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
0500;
CVE-2012-0508;
CVE-2012-0504;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
CVE5035;
CVE-2012-0501;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-0503;
CVE-2012-0505;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713; CVE-2012-1721; CVE5035;
CVE-2012-0506
2012-0502;
CVE-2011-3563;
CVE-2011CVE-2012-1726;
CVE-2012-0551;
CVE1725; CVE-2012-0501;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
5035; CVE-2012-1716;
CVE-2012-0501;
CVE-2012-0506
2012-1719;
CVE-2012-1724;
CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
CVE1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713; CVE-2012-1721; CVE1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012-1713;
CVE-2012-1721;
CVE1718; CVE-2012-1716;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
CVE1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722; CVE-2012-1723;
CVE-2012-1713;
CVE-2012-1721; CVE1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
CVE1718; CVE-2012-1716;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012-1726;
CVE-2012-0551;
CVE1725;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-20121718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012CVE-2012-1726;
CVE-2012-0551;
CVE1725; CVE-2012-1716; CVE-2012-1711;
1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719; CVE-2012-1724;
CVE-2012CVE-2012-1726;
CVE-2012-0551;
CVE1718; CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-20121718; CVE-2012-1720; CVE-2012-1717

3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.1
4.0
3.5

ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi

CVE-2012-1713; CVE-2012-1721; CVE2012-1722; CVE-2012-1723;


CVE-2012CVE-2012-1713;
CVE-2012-1721;
CVE1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713; CVE-2012-1721; CVECVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2012-1713;
CVE-2012-1721;
CVE2012-1719;
CVE-2012-1724;
CVE-2012-1726;
CVE-2012-0551;
1725;
CVE-2012-1716;
CVE-2012-1711;
2012-1722;
CVE-2012-1723;
CVE-2012CVE-2010-4180;
CVE-2010-4252;
CVE1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012CVE-2012-1726;
CVE-2012-0551;
CVE1725;
CVE-2012-1716;
CVE-2012-1711;
2011-0014; CVE-2011-4108;
CVE-2011CVE-2010-4180;
CVE-2010-4252;
1718;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012CVE-2012-1726;
CVE-2012-0551;
4109;
CVE-2011-4576;
CVE-2011-4577;
2011-0014;
CVE-2011-4108;
CVE-2011CVE-2010-4180;
CVE-2010-4252;
CVE1718; CVE-2011-4576;
CVE-2012-1720;
CVE-2012-1717
2012-1719;
CVE-2012-1724;
CVE-2012CVE-2011-4619;
CVE-2012-0050
4109;
CVE-2011-4577;
2011-0014;
CVE-2011-4108;
CVE-2011CVE-2010-4180;
CVE-2010-4252;
CVE1718;
CVE-2012-1720;
CVE-2012-1717
CVE-2011-4619;
CVE-2012-0050
4109; CVE-2011-4576;
CVE-2011-4577;
2011-0014;
CVE-2011-4108;
CVE-2011CVE-2010-4180;
CVE-2010-4252;
CVECVE-2011-4619;
CVE-2012-0050
4109;
CVE-2011-4576;
CVE-2011-4577;
2011-0014;
CVE-2011-4108;
CVE-2011CVE-2010-4180;
CVE-2010-4252;
CVECVE-2011-4619;
CVE-2012-0050
4109;
CVE-2011-4576;
CVE-2011-4577;
2011-0014;
CVE-2011-4108;
CVE-2011CVE-2010-4180; CVE-2010-4252; CVECVE-2011-4619;
CVE-2012-0050
4109;
CVE-2011-4576;
CVE-2011-4577;
2011-0014;
CVE-2011-4108;
CVE-2011CVE-2012-2110
CVE-2011-4619;
CVE-2012-0050
4109;
CVE-2011-4576;
CVE-2011-4577;
CVE-2012-2110
CVE-2011-4619;
CVE-2012-2110 CVE-2012-0050
CVE-2012-2110
CVE-2012-2110
CVE-2012-2110
CVE-2012-2110
CVE-2011-1833; CVE-2011-2484; CVE2011-2496; CVE-2011-3188;
CVE-2011CVE-2011-1833;
CVE-2011-2484;
CVE3209; CVE-2011-3363;
CVE-2011-4110;
2011-2496;
CVE-2011-3188;
CVE-2011CVE-2011-1833;
CVE-2011-2484;
CVECVE-2011-1020;
CVE-2011-4132;
CVE3209;
CVE-2011-3363;
CVE-2011-4110;
2011-2496; CVE-2011-3188;
CVE-2011CVE-2011-1833;
CVE-2011-2484;
2011-4324;
CVE-2011-4325;
CVE-2012CVE-2011-1020;
CVE-2011-4132;
3209;
CVE-2011-3363;
CVE-2011-4110;
2011-2496;
CVE-2011-3188;
CVE-2011CVE-2011-1833;
CVE-2011-2484;
CVE0207; CVE-2011-3363;
CVE-2011-2699;
CVE-2012-1583
2011-4324;
CVE-2011-4325;
CVE-2012CVE-2011-1020;
CVE-2011-4132;
3209;
CVE-2011-4110;
2011-2496;
CVE-2011-3188;
CVE-2011CVE-2011-1833;
CVE-2011-2484;
CVE0207;
CVE-2011-2699;
CVE-2012-1583
2011-4324;
CVE-2011-4325;
CVE-2012CVE-2011-1020;
CVE-2011-4132;
CVE3209;
CVE-2011-3363;
CVE-2011-4110;
2011-2496; CVE-2011-3188;
CVE-2011CVE-2011-1833;
CVE-2011-2484;
0207;
CVE-2011-2699;
CVE-2012-1583
2011-4324;
CVE-2011-4325;
CVE-2012CVE-2011-1020;
CVE-2011-4132;
3209;
CVE-2011-3363;
CVE-2011-4110;
2011-2496;
CVE-2011-3188;
CVE-2011CVE-2010-2761;
CVE-2010-4410;
CVE0207;
CVE-2011-2699;
CVE-2012-1583
2011-4324;
CVE-2011-4325;
CVE-2012CVE-2011-1020;
CVE-2011-4132;
3209;
CVE-2011-3363;
CVE-2011-4110;
2011-3597
CVE-2010-2761; CVE-2010-4410; CVE0207;
CVE-2011-2699;
CVE-2012-1583
2011-4324;
CVE-2011-4325;
CVE-2012CVE-2011-1020;
CVE-2011-4132;
CVE2011-3597
CVE-2010-2761;
CVE-2010-4410;
0207; CVE-2011-2699;
CVE-2012-1583
2011-4324;
CVE-2011-4325;
CVE-20122011-3597
CVE-2010-2761;
CVE-2010-4410;
CVE0207;
CVE-2011-2699;
CVE-2012-1583
2011-3597
CVE-2010-2761; CVE-2010-4410; CVE2011-3597
CVE-2010-2761; CVE-2010-4410; CVE2011-3597
CVE-2010-2761; CVE-2010-4410; CVE2011-3597
CVE-2012-0841
CVE-2012-0841
CVE-2012-0841
CVE-2012-0841
CVE-2012-0841
CVE-2012-0841
CVE-2012-0841
CVE-2009-5029; CVE-2009-5064; CVE2010-0830; CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE4609; CVE-2012-0864
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE4609;
CVE-2012-0864
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029; CVE-2009-5064; CVE4609; CVE-2012-0864
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE4609; CVE-2012-0864
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE4609;
CVE-2012-0864
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029; CVE-2009-5064; CVE4609; CVE-2012-0864
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2011-4128;
CVE-2012-1569;
CVE4609; CVE-2012-0864
2012-1573
CVE-2011-4128;
CVE-2012-1569; CVE2012-1573
CVE-2011-4128; CVE-2012-1569; CVE2012-1573
CVE-2011-4128; CVE-2012-1569; CVE2012-1573

4.1
4.0
3.5
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
1.0
4.2
4.1
4.0
7.0
6.0
5.0
5.0
1.0
5.0
1.5
4.0
4.1
5.0
9.0
8.0
8.0
5.0
4.0
4.0
4.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
9.0
8.0
8.0
5.0
4.0
4.0
4.0
5.0

ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
any
any
Windows
Windows
Windows
Windows
Windows
Windows
any
any
any
any
Windows
Windows
Windows
any
Windows
Linux
any
Windows
Linux
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
Windows
Linux
any
Windows
Linux
Mac
ESXi

CVE-2011-4128; CVE-2012-1569;
2012-1573
CVE-2011-4128; CVE-2012-1569;
2012-1573
CVE-2011-4128; CVE-2012-1569;
2012-1573
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2012-0060; CVE-2012-0061;
2012-0815
CVE-2011-5057; CVE-2012-0391;
2012-0392; CVE-2012-0394
CVE-2011-5057;
CVE-2012-0391;
2012-0392; CVE-2012-0394
CVE-2011-5057;
CVE-2012-0391;
2012-0392; CVE-2012-0394
CVE-2011-5057;
CVE-2012-0391;
2012-0392; CVE-2012-0394
CVE-2011-5057;
CVE-2012-0391;
2012-0392;
CVE-2012-0394
CVE-2012-4897
CVE-2012-4897
CVE-2012-4897
CVE-2012-5050
CVE-2012-5050
CVE-2012-5051
CVE-2012-5051
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5458
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459

CVECVECVECVECVECVECVECVECVECVECVECVECVECVECVE-

4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
9.0
8.0
8.0
5.0
4.0
4.0
4.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
3.0
2.1
2.1
2.0
4.0
4.1
5.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0

ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
any
Windows
Linux
any
Windows
Linux
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
any
Windows
Linux / Mac
any
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows

CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-5459
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-3569
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-5703
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2012-1033;
2012-3817
CVE-2011-4940;
2012-1150
CVE-2011-4940;
2012-1150
CVE-2011-4940;
2012-1150

CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2012-1667;
CVE-2011-4944;
CVE-2011-4944;
CVE-2011-4944;

CVECVECVECVECVECVECVECVECVECVECVECVECVE-

5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
4.0
4.1
5.0
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.0
4.0
5.1
5.0
5.1
5.0
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
5.1
5.0

ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Linux
Linux
Linux
Linux
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
Windows
Linux
Linux
ESXi
ESXi

CVE-2011-4940; CVE-2011-4944; CVE2012-1150


CVE-2011-4940; CVE-2011-4944; CVE2012-1150
CVE-2011-4940; CVE-2011-4944; CVE2012-1150
CVE-2011-4940; CVE-2011-4944; CVE2012-1150
CVE-2011-4940; CVE-2011-4944; CVE2012-1150
CVE-2011-4940; CVE-2011-4944; CVE2012-1150
CVE-2011-4940; CVE-2011-4944; CVE2012-1150
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0876; CVE-2012-1148
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-0441
CVE-2012-5978
CVE-2012-5978
CVE-2012-6324
CVE-2012-6324
CVE-2012-6325
CVE-2012-6325
CVE-2009-5029; CVE-2009-5064; CVE2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE4609; CVE-2012-0864;
CVE-2012-3404;
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVECVE-2012-3405;
CVE-2012-3406;
4609;
CVE-2012-0864;
CVE-2012-3404;
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE2012-3480
CVE-2012-3405;
CVE-2012-3406;
4609;
CVE-2012-0864;
CVE-2012-3404;
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029; CVE-2009-5064; CVE2012-3480
CVE-2012-3405;
CVE-2012-3406;
4609;
CVE-2012-0864;
CVE-2012-3404;
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE2012-3480
CVE-2012-3405;
CVE-2012-3406;
4609;
CVE-2012-0864;
CVE-2012-3404;
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
CVE2012-3480
CVE-2012-3405;
CVE-2012-3406;
CVE4609;
CVE-2012-0864;
CVE-2012-3404;
2010-0830; CVE-2011-1089;
CVE-2011CVE-2009-5029;
CVE-2009-5064;
2012-3480
CVE-2012-3405;
CVE-2012-3406;
CVE4609;
CVE-2012-0864;
CVE-2012-3404;
2010-0830;
CVE-2011-1089;
CVE-2011CVE-2012-6326
2012-3480
CVE-2012-3405;
CVE-2012-3406;
CVE4609;
CVE-2012-0864;
CVE-2012-3404;
CVE-2012-6326
2012-3480
CVE-2012-3405;
CVE-2012-3406;
CVECVE-2012-6326
2012-3480
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326

4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
9.0
8.0

ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Windows
Windows

CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2012-6326
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2013-1405
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2011-3102; CVE-2012-2807
CVE-2012-4244
CVE-2012-4244
CVE-2012-4244
CVE-2012-4244
CVE-2012-4244
CVE-2012-4244
CVE-2012-4244
CVE-2012-4244
CVE-2011-1202; CVE-2011-3970; CVE2012-2825; CVE-2012-2870;
CVE-2012CVE-2011-1202;
CVE-2011-3970;
CVE2871
2012-2825;
CVE-2012-2870;
CVE-2012CVE-2011-1202; CVE-2011-3970; CVE2871
2012-2825;
CVE-2012-2870;
CVE-2012CVE-2011-1202;
CVE-2011-3970;
CVE2871
2012-2825;
CVE-2012-2870;
CVE-2012CVE-2011-1202;
CVE-2011-3970;
CVE2871
2012-2825;
CVE-2012-2870;
CVE-2012CVE-2011-1202; CVE-2011-3970; CVE2871
2012-2825;
CVE-2012-2870;
CVE-2012CVE-2011-1202;
CVE-2011-3970;
CVE2871
2012-2825;
CVE-2012-2870;
CVE-2012CVE-2011-1202;
CVE-2011-3970;
CVE2871
2012-2825;
CVE-2012-2870; CVE-2012CVE-2013-1406
2871
CVE-2013-1406

5.0
4.1
5.0
4.0
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0

Mac
Mac
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Any
Any
Any
Any
Any
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Any
Any
Any
Any
Any
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi

CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1406
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2013-1659
CVE-2012-5083; CVE-2012-1531; CVE2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVE1533; CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVE2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086; CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531; CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVE2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086; CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531; CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
CVE1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083; CVE-2012-1531; CVE2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533; CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531;
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084; CVE-2012-1532;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
CVE1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083; CVE-2012-1531; CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
CVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVECVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
CVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
CVECVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081; CVE-2012-5067;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
CVE-2012-2110
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079; CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5134 CVE-2012-5073; CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5134
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
CVE-2012-5134
CVE-2012-5077; CVE-2012-5085
CVE-2012-5134

4.1
4.0
9.2.x
9.1.x
5.1
5.0
4.1
4.0
5.1
5.0
5.1
5.0
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
3.5
4.1
4.0
3.5
5.1
5.0
4.1
4.0
4.1
4.0
2.0
2.5

ESX
ESX
Any
Any
Any
Any
Any
Any
Linux
Linux
Linux
Linux
Any
Any
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
Any
Any
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Any
Any

CVE-2012-5134
CVE-2012-5134
CVE-2013-1899; CVE-2013-1900; CVE2013-1901
CVE-2013-1899;
CVE-2013-1900; CVECVE-2013-31072013-1901
CVE-2013-3107
CVE-2013-3107
CVE-2013-3107
CVE-2013-3079
CVE-2013-3079
CVE-2013-3080
CVE-2013-3080
CVE-2012-5083; CVE-2012-1531; CVE2012-5086; CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVE1533; CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVE2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533; CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083; CVE-2012-1531; CVE2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533; CVE-2012-5080;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084; CVE-2012-1532;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086; CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531; CVE2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531;
CVE5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086; CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531; CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
CVE1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083; CVE-2012-1531; CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533; CVE-2012-1532;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012-5083;
CVE-2012-1531;
CVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084; CVE-2012-1532;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-5076;
2012-5086;
CVE-2012-5087;
CVE-2012CVE-2012-5083;
CVE-2012-1531;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
CVE1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5086; CVE-2012-5087;
CVE-2012-5885;
CVE-2012-5886; CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012CVE-2012-3143;
CVE-2012-5088;
1533;
CVE-2012-1532;
CVE-2012-5076;
2012-5887;
CVE-2012-2733;
CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-2012-3143;
CVE-2012-5088;
4534;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012-5068;
CVE-2012-4416;
5084;
CVE-2012-5080;
CVE-2012-3159;
2012-5078;
CVE-2012-5089;
CVE-20124534;
CVE-2012-3546;
CVE-2012-4431
2012-5887; CVE-2012-2733;
CVE-2012-5885;
CVE-2012-5886; CVECVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
CVE5084;
CVE-2012-3159;
4534; CVE-2012-5080;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012-5075;
CVE-2012-5073;
5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
CVE-2012CVE-2012-5068;
CVE-2012-4416;
4534;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885; CVE-2012-5886; CVECVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
2012-5074;
CVE-2012-5071;
4534; CVE-2012-5082;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
CVE5069;
CVE-2012-5067;
CVE-2012-5070;
4534; CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-5082;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-2012CVE-2012-5075;
CVE-2012-5073;
4534;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885; CVE-2012-5886; CVECVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-3216;
2012-5079;
CVE-2012-5072;
CVE-20124534; CVE-2012-5082;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077;
CVE-2012-5085
5081;
CVE-2012-3216;
4534; CVE-2012-5082;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVECVE-2012-5077; CVE-2012-5085
4534;
CVE-2012-3546;
CVE-2012-4431
2012-5887; CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVE4534; CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-5885;
CVE-2012-5886;
CVE4534;
CVE-2012-3546;
CVE-2012-4431
2012-5887;
CVE-2012-2733;
CVE-2012CVE-2012-2337; CVE-2012-3440
4534;
CVE-2012-3546;
CVE-2012-4431
CVE-2012-2337;
CVE-2012-3440
CVE-2012-2337; CVE-2012-3440
CVE-2012-2337; CVE-2012-3440
CVE-2012-2337; CVE-2012-3440
CVE-2012-2337; CVE-2012-3440
CVE-2013-3520
CVE-2013-3520

5.1
5.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
9.0
8.0
5.0
4.0
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.1
5.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.5

Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Linux
Linux
Linux
Linux
Mac
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Any
Any
Any
Any
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Any

CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0169;
CVE-2013-0338
CVE-2013-0338
CVE-2013-0338
CVE-2013-0338
CVE-2013-0338
CVE-2013-0338
CVE-2013-2116
CVE-2013-2116
CVE-2013-2116
CVE-2013-2116
CVE-2013-2116
CVE-2013-2116
CVE-2013-0268;
CVE-2013-0268;
CVE-2013-0268;
CVE-2013-0268;
CVE-2013-0268;
CVE-2013-0268;
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1662
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-1661
CVE-2013-5970

CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166
CVE-2013-0166

CVE-2013-0871
CVE-2013-0871
CVE-2013-0871
CVE-2013-0871
CVE-2013-0871
CVE-2013-0871

5.1
5.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
2.5
5.1
5.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
6.x
5.x
10.x
9.x
5.1
5.0
4.1
4.0
4.1
4.0
6.x
5.x
6.x
5.x
10.x
9.x
5.1
5.0
4.1

Any
Any
Any
Any
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Any
Any
Any
windows
windows
Any
Any
Any
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Linux
Linux
Any
Linux
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Mac OS/X
Mac OS/X
Windows
Windows
Any
Any
ESXi
ESXi
ESXi

CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5970
CVE-2013-5971
CVE-2013-5971
CVE-2013-5971
CVE-2013-5971
CVE-2013-5971
CVE-2013-2470; CVE-2013-2471; CVE2013-2472; CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVECVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470; CVE-2013-2471; CVE2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
3743; CVE-2013-2464;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVECVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472; CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471; CVE2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVECVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472; CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471; CVE2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470; CVE-2013-2471; CVECVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743; CVE-2013-2464;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
CVE2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-5972
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
CVE-2013-5972
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468; CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459; CVECVE-2013-5972
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-5972
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
CVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400; CVE-2013-2407;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVECVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
CVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
CVECVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-3519
1500 CVE-2013-3744;
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-2457;
CVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452; CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443; CVECVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-3519
1500 CVE-2013-2450;
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2456;
CVE-2013-3519
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVECVE-2013-3519
1500
2013-1571; CVE-2013-2451; CVE-2013CVE-2013-3519
1500
CVE-2012-2372; CVE-2012-3552; CVE2013-2147; CVE-2013-2164;
CVE-2013CVE-2012-2372;
CVE-2012-3552;
CVE2206; CVE-2013-2224;
CVE-2013-2234;
2013-2147;
CVE-2013-2164;
CVE-2013CVE-2012-2372;
CVE-2012-3552;
CVECVE-2013-2237;
CVE-2013-2232
2206;
CVE-2013-2224;
CVE-2013-2234;
2013-2147;
CVE-2013-2164;
CVE-2013CVE-2013-2237;
CVE-2013-2232
2206; CVE-2013-2224;
CVE-2013-2234;
CVE-2013-2237; CVE-2013-2232

4.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
4.1
4.0
10.0
9.0
6.0
5.0
6.0
5.0
5.5
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1.x
5.5
5.1
5.0
5.5
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1

ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Any
Any
Any
Any
Mac OS/X
Mac OS/X
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Any
Any
Linux
Linux
Linux
ESXi
ESXi
ESXi
ESXi
ESXi
ESX
ESX
ESXi
ESXi

CVE-2012-2372; CVE-2012-3552; CVE2013-2147; CVE-2013-2164;


CVE-2013CVE-2012-2372;
CVE-2012-3552;
CVE2206;
CVE-2013-2224;
CVE-2013-2234;
2013-2147;
CVE-2013-2164;
CVE-2013CVE-2012-2372; CVE-2012-3552; CVECVE-2013-2237;
CVE-2013-2232
2206;
CVE-2013-2224;
CVE-2013-2234;
2013-2147;
CVE-2013-2164;
CVE-2013CVE-2013-0791;CVE-2013-1620
CVE-2013-2237;
CVE-2013-2232
2206;
CVE-2013-2224;
CVE-2013-2234;
CVE-2013-0791;CVE-2013-1620
CVE-2013-2237;
CVE-2013-2232
CVE-2013-0791;CVE-2013-1620
CVE-2013-0791;CVE-2013-1620
CVE-2013-0791;CVE-2013-1620
CVE-2013-0791;CVE-2013-1620
CVE-2013-5973
CVE-2013-5973
CVE-2013-5973
CVE-2013-5973
CVE-2013-5973
CVE-2013-5973
CVE-2013-5973
CVE-2014-1207
CVE-2014-1207
CVE-2014-1207
CVE-2014-1207
CVE-2014-1207
CVE-2014-1207
CVE-2014-1207
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1208
CVE-2014-1211
CVE-2014-1211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-5211
CVE-2013-4332
CVE-2013-4332

5.0
4.1
4.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
2.5
5.5
5.1
5.0
4.1
4.0
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
4.1
4.0
5.5
5.1
5.0
4.1
4.0
4.1
4.0
5.5(GA)
5.5U1
5.5(GA)
5.5U1
10.x
6.x
6.x
4.0.x
4.1.x
6.0.x
3.x
4.4.x
5.3
2.1.x

ESXi
ESXi
ESXi
ESXi
ESXi
Any
Any
Any
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Windows
ESXi
ESXi
ESXi
ESXi
ESX
ESX
Windows
Windows
Windows
ESXi
ESXi
ESX
ESX
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Any
Any
ESXi
ESXi
Any
OSX
Any

Android

CVE-2013-4332
CVE-2013-4332
CVE-2013-4332
CVE-2013-4332
CVE-2013-4332
CVE-2013-2470; CVE-2013-2471; CVE2013-2472; CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVECVE-2013-2469;
CVE-2013-2459;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470; CVE-2013-2471; CVECVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463; CVE-2013-2462;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743; CVE-2013-2464;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472; CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471; CVECVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
CVE2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463; CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743; CVE-2013-2464;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013CVE-2013-2470;
CVE-2013-2471;
CVE2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2013-2470;
CVE-2013-2471;
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
2463;
CVE-2013-2464;
CVE-2013-2465;
2013-2472;
CVE-2013-2473;
CVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013-2469;
CVE-2013-2459;
CVE2463;
CVE-2013-2464;
CVE-2013-2465;
CVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468;
CVE-2013-2466;
CVE-2013CVE-2013-2469;
CVE-2013-2459;
CVECVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
CVE3743;
CVE-2013-2462;
CVE-2013-2460;
2013-2468; CVE-2013-2466;
CVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2013-2445;
CVE-2013-2448;
3743;
CVE-2013-2462;
CVE-2013-2460;
CVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2407;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013-2445;
CVE-2013-2448;
CVECVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVE2400; CVE-2013-2407;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444;
2467;
CVE-2013-2454;
2013-2442;
CVE-2013-2461;
CVE-2013CVE-2014-1209
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447; CVE-2013-2407;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2013CVE-2013-2458;
CVE-2013-2444;
CVE2467;
CVE-2013-2454;
CVE-2014-1210
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446; CVE-2013-2437;
CVE-2013-2458;
CVE-2013-2444; CVECVE-2014-1210
1500
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
2400;
CVE-2013-3744;
CVE-2013-2457;
2013-2446;
CVE-2013-2437;
CVE-2014-1210
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013-2453;
CVE-2013-2443;
CVE2400;
CVE-2013-3744;
CVE-2013-2457;
CVE-2014-1210
1500 CVE-2013-2450;
2013-1571;
CVE-2013-2451;
CVE-2013-2412;
CVE-2013-2449;
2447;
CVE-2013-2456;
2013-2452;
CVE-2013-2455;
CVE-2013CVE-2013-2453;
CVE-2013-2443;
CVECVE-2014-1210
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
2013-2452; CVE-2013-2455;
CVE-2014-1210
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVE2447;
CVE-2013-2450;
CVE-2013-2456;
CVE-2014-1210
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2013-2412;
CVE-2013-2449;
CVECVE-2014-0076;
CVE-2014-0160
1500
2013-1571;
CVE-2013-2451;
CVE-2013CVE-2014-0076; CVE-2014-0160
1500
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160

2.2.x
2.3.x
2.1.x
2.2.x
2.3.x
2.3.x
1
1.5.x
1.8.x
1.5.1
1.5.2
1.5.1
1.5.2
1.8
1.8
3.5
5.5.1
5.5.3
6.x
1.1
5.5
5.5
10.0
6.0
6.0
5.5
5.1
5.0
5.5
1.1
2.6
1.5
1.8
4.4.x
5.x
5.x
4.1.2
4.0.3
6.0.4
3.2.2
5.5.2
5.1.4
5.4
5.x
5.5
5.1
5
5.5
5.1
5

Android
Android
IOS
IOS
IOS
Windows

OSX
OSX
Windows
Windows
OSX
Windows

Any
Any
Any
ESXi
ESXi
ESXi
ESXi

ESXi
ESXi
ESXi

CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-0076; CVE-2014-0160
CVE-2014-3793
CVE-2014-3793
CVE-2014-3793
CVE-2014-3793
CVE-2014-3793
CVE-2014-3793
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470

CVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVE-

10.x
9.x
6.x
5.x
6.x
5.x
2.5.x
1.x
1.x
2.x
2.x
2.x
2.x
2.x
3.5.1
3.0.1
5.8.x
5.7.x
5.5.1
5.5.1.x
5.1.x
5.5.x
5.1.x
5.0.3.x
5.5
5.1
5
5.5
5.1
5
5.5
5.6
1.0.1
1
2.6.0.0
3.3
5.5
5.1
6.0.x
5.2.0
5.0.0
6.0.x
1.12
5.1.0.1
5.x
5.5.6
5.1.11
5.5.1
5.6
5.5

any
any
OSX
OSX
any
any
OSX
Windows
Android
IOS
OSX
Windows
WinStore

any
any
any
any
any
any
Windows

CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198;
2010-5298; CVE-2014-3470
CVE-2014-0224;
CVE-2014-0198;
2010-5298; CVE-2014-3470

CVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVECVE-

5.5.x
5.1.x
5.0.x
5.8.x
5.7.x
5.5
5.1
4.2
5.5
5.1
5
5.5
5.1
5
5.5
5.1
5.0
5.5
5.5
6
5.5
5.1
4.1
4.0
5.5
5.1
5.0
6.1
6.0
5.4
2.1
2.0
1.8.2
1.8.1
1.8.0
1.5.2
1.5.1
1.5.0
1.1
1.0
4.2
4.1
4.0
6.1
6.0
3.2
5.5
5.1
7.0
5.8.2

any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux

CVE-2014-0224; CVE-2014-0198; CVE2010-5298; CVE-2014-3470


CVE-2014-0224;
CVE-2014-0198; CVE2010-5298;
CVE-2014-3470
CVE-2014-0224; CVE-2014-0198; CVECVE-2014-0429;
CVE-2014-0457; CVE2010-5298; CVE-2014-3470
CVE-2014-0050;
CVE-2014-0094; CVE2014-0456; CVE-2014-2421;
CVE-2014CVE-2014-0429;
CVE-2014-0457;
CVE2014-0112
CVE-2014-0050; CVE-2014-0094; CVE2410; CVE-2014-2397;
CVE-2014-0432;
2014-0456;
CVE-2014-2421;
CVE-20142014-0112
CVE-2014-0050; CVE-2014-0094; CVECVE-2014-0455;
CVE-2014-0461;
CVE2410;
CVE-2014-2397;
CVE-2014-0432;
2014-0112
CVE-2014-0050;
CVE-2014-0094;
CVE2014-0448;
CVE-2014-2428;
CVE-2014CVE-2014-0455; CVE-2014-0461; CVE2014-0112
CVE-2014-0050;
CVE-2014-0094;
CVE2412; CVE-2014-0451;
CVE-2014-0458;
2014-0448;
CVE-2014-2428;
CVE-2014CVE-2014-0114
2014-0112
CVE-2014-2423;
CVE-2014-0452;
CVE2412;
CVE-2014-0451;
CVE-2014-0458;
CVE-2014-0114
2014-2414; CVE-2014-2402;
CVE-2014CVE-2014-2423;
CVE-2014-0452;
CVECVE-2014-0114
CVE-2013-4590;
CVE-2013-4322;CVE0446;
CVE-2014-0454;
CVE-2014-2427;
2014-2414;
CVE-2014-2402;
CVE-20142014-0050
CVE-2013-4590;
CVE-2013-4322;CVECVE-2014-2422;
CVE-2014-2409;
CVE0446;
CVE-2014-0454;
CVE-2014-2427;
2014-0050
CVE-2013-4590;
CVE-2013-4322;CVE2014-0460; CVE-2013-6954;
CVE-2013CVE-2014-2422;
CVE-2014-2409;
CVE2014-0050
6629; CVE-2014-0449;
CVE-2014-2403;
2014-0460;
CVE-2013-6954;
CVE-2013CVE-2013-0242;
CVE-2013-1914
CVE-2014-2401;
CVE-2014-0463;
CVE6629;
CVE-2014-0449;
CVE-2014-2403;
2014-0464;
CVE-2014-0459;
CVE-2014CVE-2013-0242;
CVE-2013-1914
CVE-2014-2401; CVE-2014-0463; CVE2413;
CVE-2014-0453;
CVE-2014-2398;
2014-0464;
CVE-2014-0459;
CVE-2014CVE-2013-0242;
CVE-2013-1914
CVE-2014-1876;
CVE-2014-2420
2413;
CVE-2014-0453;
CVE-2014-2398;
CVE-2014-1876; CVE-2014-2420
CVE-2014-3796
CVE-2014-3796
CVE-2014-3796
CVE-2014-6271; CVE-2014-7169; CVE2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187; CVE-20146277; CVE-2014-6278

5.8.1
5.8.0
5.7.1
5.0.2
5.8
5.7
2.0
2.0
1.5
5.8.3
5.8.2
5.8.1
5.8.0
5.7.3
5.7.2
5.7.1
5.7.0
5.5.2.1
5.1.2
4.2.3
5.5.1.2
5.1.2.1
5.x
6.2
6.0.1
5.2
6.1
6.0.1.2
6.0.1.1
6.0.1
6.2
6.0.1
5.2
5.5.1.3
2.6
5.5.3
5.1.4.x
3.3.x
2.3.2
9.3.5
9.2.9
9.1.14
3.0.1
2.0.x
5.x
2.3.0
3.0
1.x
2.x
1.x

Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux

CVE-2014-6271; CVE-2014-7169; CVE2014-7186; CVE-2014-7187;


CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187; CVE-20146277; CVE-2014-6278

5.8
5.5x
5.1.x
5.5
5.0
5.8.x
5.6.x
5.5.x
5.1.2.x
5.5.x
5.1.x
5.5
5.1
5.5
5.1
5.0
5.5
5.1
5.0
5.5
5.1
5.0
5.5
5.1

Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Linux
Any
any
any
any
any
any
any
any
any
any
any
any
any

5.0
5.1
5.0
5.1
5.0
6.1.1
6.1
6.0.1.2
6.0.1.1
6.0.1
7.3.x.x
10.x
6.x
6.x
5.5
5.1
5.0
10.x
6.x
7.x
6.x
10.x
6.x
5.5
5.1
5.5

any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any

CVE-2014-6271; CVE-2014-7169; CVE2014-7186; CVE-2014-7187;


CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186; CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277; CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271;
CVE-2014-7169;
CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187;
CVE-2014CVE-2014-6271; CVE-2014-7169; CVE6277;
CVE-2014-6278
2014-7186;
CVE-2014-7187; CVE-2014CVE-2014-4626
6277;
CVE-2014-6278
CVE-2014-3797
CVE-2014-8371
CVE-2014-8371
CVE-2014-8371
CVE-2014-0191
CVE-2014-0191
CVE-2014-0191
CVE-2014-0138
CVE-2014-0138
CVE-2014-0138
CVE-2013-4238
CVE-2013-4238
CVE-2013-4238
CVE-2014-4227;CVE-2014-4219;CVE2014-2490;CVE-2014-4216;CVE-2014CVE-2014-4227;CVE-2014-4219;CVE2483;CVE-2014-4223;CVE-20142014-2490;CVE-2014-4216;CVE-2014CVE-2014-4227;CVE-2014-4219;CVE4262;CVE-2014-4209;CVE-20142483;CVE-2014-4223;CVE-20142014-2490;CVE-2014-4216;CVE-2014CVE-2014-4227;CVE-2014-4219;CVE4265;CVE-2014-4220;CVE-20144262;CVE-2014-4209;CVE-20142483;CVE-2014-4223;CVE-20142014-2490;CVE-2014-4216;CVE-2014CVE-2014-8373
4218;CVE-2014-4252;CVE-20144265;CVE-2014-4220;CVE-20144262;CVE-2014-4209;CVE-20142483;CVE-2014-4223;CVE-2014CVE-2014-8373
4266;CVE-2014-4268;CVE-20144218;CVE-2014-4252;CVE-20144265;CVE-2014-4220;CVE-20144262;CVE-2014-4209;CVE-2014CVE-2014-8373
4264;CVE-2014-4221;CVE-20144266;CVE-2014-4268;CVE-20144218;CVE-2014-4252;CVE-20144265;CVE-2014-4220;CVE-2014CVE-2014-8373
4244;CVE-2014-4263;CVE-2014-4208
4264;CVE-2014-4221;CVE-20144266;CVE-2014-4268;CVE-20144218;CVE-2014-4252;CVE-2014CVE-2014-8373
4244;CVE-2014-4263;CVE-2014-4208
4264;CVE-2014-4221;CVE-20144266;CVE-2014-4268;CVE-2014CVE-2014-8372
4244;CVE-2014-4263;CVE-2014-4208
4264;CVE-2014-4221;CVE-2014CVE-2014-8370
4244;CVE-2014-4263;CVE-2014-4208
CVE-2014-8370
CVE-2014-8370
CVE-2014-8370
CVE-2014-8370
CVE-2014-8370
CVE-2015-1043
CVE-2015-1043
CVE-2015-1043
CVE-2015-1043
CVE-2015-1044
CVE-2015-1044
CVE-2015-1044
CVE-2015-1044
CVE-2014-3513;CVE-2014-3567;CVE2014-3566;CVE-2014-3568

5.1
5.0
5.5
5.1
5.0
5.5
5.1
5.0
5.8
5.5
5.1
6.x
5.x
2.1
2.0
6.1
5.4
5.5
2.7
3.3
5.5
5.1.
5.0
6.0
5.5
5.1
5.0
6.0
5.8
5.7
5.5.1
6.2
6.1
6.0
5.2
6.2
6.1
6.0
1.1
1.0
9.3
9.2
9.1
5.8.0
5.6.0
5.5.0
5.1
5.8
5.7
5.0

any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any

CVE-2014-3513;CVE-2014-3567;CVE2014-3566;CVE-2014-3568
CVE-2014-3513;CVE-2014-3567;CVE2014-3566;CVE-2014-3568
CVE-2014-3513;CVE-2014-3567;CVE2014-3566;CVE-2014-3568
CVE-2014-3513;CVE-2014-3567;CVE2014-3566;CVE-2014-3568
CVE-2014-3513;CVE-2014-3567;CVE2014-3566;CVE-2014-3568
CVE-2014-3660
CVE-2014-3660
CVE-2014-3660
CVE-2014-4632
CVE-2014-4632
CVE-2014-4632
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593

1.1
2.1
2.0
6.0
5.8
5.5
5.1
2.7
2.6
8.1
8.0
6.0
1.1
1.0
6.1
4.2.4
5.5
5.6.4
7.0
5.7
5.6
5.8
5.7
6.0
5.5
5.1
2.5
2.0
1.5
1.0
5.5
5.1
6.0
5.5
5.1
5.0
1.2

any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any
any

CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593
CVE-2014-6593

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

Advisory Name
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001

Console
The
ESX Operating
Service
System
Console
Operating
The
ESX(COS)
Service
kernel
is
updated
System
Console
Operating
The
ESX(COS)
Service
to kernel-2.6.18kernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
274.3.1.el5
to fix
to
kernel-2.6.18kernel
is
updated
System
(COS)
Console
Operating
The ESX Service
Vulnerbility
multiple
security
274.3.1.el5
to fix
to
kernel-2.6.18kernel
is(COS)
updated
System
Console
Operating
ESX
Service
Advisory URL Vuln Title The
Description
issues
in
the
multiple
security
274.3.1.el5
toCOS
fix
to
kernel-2.6.18kernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
Adv
kernel.
issues
in
the
COS
multiple
security
ESX third party System
274.3.1.el5
to
fix
to
kernel-2.6.18kernel
is
updated
(COS)
Console
The
ESX Operating
Service
Adv
kernel.
issues
in
the
COS
update
forparty 274.3.1.el5
multiple
security
ESX
third
to
fix
to kernel-2.6.18kernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
Adv
kernel.
Service
issues
in
the
COS
update
for
multiple
security
ESX third party Console
274.3.1.el5
to fix
to
kernel-2.6.18kernel
is(COS)
updated
System
Operating
Console
kernel
Adv
kernel.
Service
issues
in
the
update
for
multiple
security
ESX
third
party kernel
274.3.1.el5
toCOS
fix
to
kernel-2.6.18is
updated
System (COS)
Console
kernel
Adv
kernel.
Service
issues
in
the
COS
update
for
multiple
security
ESX
third
party 274.3.1.el5
to
fix
to kernel-2.6.18kernel
is updated
Console
kernel
Adv
kernel.
Service
issues
in security
thetoCOS
update
forparty The
multiple
ESX
third
274.3.1.el5
fix
to
kernel-2.6.18ESX
Service
The
ESX
Service
Console
kernel
Adv
kernel.
Service
issues
in
the
COS
update
for
multiple
security
274.3.1.el5
to
fix
ESX
third
party Console
(COS)
curl
The
ESX Operating
Service
Console
The
ESX
Service
Console
kernel
Adv
kernel.
Service
issues
in
the
COS
update
for
multiple
security
RPMESX
is updated
to
ESX third party The
Console
(COS)
curl
Service
System
(COS)
rpm
Console
Operating
The
ESX
Service
Console
kernel
Adv
kernel.
issues
in
the COS
Service
cURL-7.15.5.9
update
for
RPM
is
updated
to
ESX
third
party The
Console
(COS)
curl
ESX
Service
packages
are rpm
System
Console
Operating
The
ESX(COS)
Service
kernel
Adv
kernel.
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
RPM
is
updated
to
ESX
third
party Console
(COS)
curl
The
ESX(COS)
Service
updated
toare
poptpackages
System
rpm
Console
The
ESX Operating
Service
kernel
Adv
RPM
security
issue
Service
Console
cURL
resolving
a
update
for
cURL-7.15.5.9
RPM
is updated
to
ESX third party The
Console
(COS)
curl
ESX
Service
1.10.2.3updated
toare
poptpackages
System
rpm
Console
Operating
The
ESX(COS)
Service
kernel
Adv
RPM third
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
RPM
is
updated
to
ESX
party The
Console
(COS)
curl
ESX
Service
22.el5_7.2rpm1.10.2.3updated
toare
poptpackages
System
rpm
Console
Operating
The
ESX(COS)
Service
kernel
Adv
RPM
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
RPM
is
updated
to
ESX third party 22.el5_7.2rpmConsole
(COS)
curl
The
ESX(COS)
Service
4.4.2.31.10.2.3updated
toare
poptpackages
System
rpm
Console
Operating
The
ESX
Service
Adv
RPM
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
RPM
is updated
to
ESX
third
party 22.el5_7.2rpmConsole
(COS)
curl
The
ESX
Service
4.4.2.31.10.2.3updated
toare
poptpackages
System
rpm
Console
Operating
The
ESX(COS)
Service
Adv
RPM third
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
RPM
is
updated
to
ESX
party Console
(COS)
curl
The
ESX(COS)
Service
libs-4.4.2.34.4.2.322.el5_7.2rpm1.10.2.3updated
toare
poptpackages
System
rpm
Console
The
ESX Operating
Service
Adv
RPM
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
forparty 22.el5_7.2rpmRPM
is updated
to
ESX
third
Console
(COS)
curl
22.el5_7.2
and
libs-4.4.2.34.4.2.31.10.2.3updated
toare
poptpackages
System
rpm
Console
Operating
The
ESX(COS)
Service
Adv
RPM third
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
RPM
is
updated
to
ESX
party libs-4.4.2.3rpm-python22.el5_7.2
and
4.4.2.322.el5_7.2rpm1.10.2.3updated
toare
poptpackages
System
rpm
Console
Operating
The
ESX(COS)
Service
Adv
RPM third
security
issue
Console
cURL
resolving
a
Service
cURL-7.15.5.9
update
for
4.4.2.3-22.el5_7.2
ESX
party rpm-python22.el5_7.2
and
libs-4.4.2.34.4.2.322.el5_7.2rpm1.10.2.3updated
toare
poptpackages
System
Console
Operating
The
ESX(COS)
Service
Adv
RPM
security
issue
Console
cURL
a
Service
which
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
third
party resolving
rpm-python22.el5_7.2
libs-4.4.2.322.el5_7.2rpm4.4.2.31.10.2.3updated
to and
poptsamba
packages
System
(COS)
Console
Operating
The
ESX
Service
Adv
RPM third
security
issue
Console
rpm
multiple
security
Service
which
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
party 22.el5_7.2
rpm-pythonand
libs-4.4.2.34.4.2.322.el5_7.2rpm1.10.2.3are
updated
to
samba
packages
System
Console
Operating
The
ESX(COS)
Service
Adv
RPMs
issues.
Console
rpm
multiple
security
Service
which
fixes
update
for
ESX third
party 4.4.2.3-22.el5_7.2
rpm-python22.el5_7.2
and
libs-4.4.2.34.4.2.322.el5_7.2rpmsamba-clientare updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMs
Console
rpm
multiple
security
Service
which
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
third
party issues.
rpm-python22.el5_7.2
and
libs-4.4.2.322.el5_7.2rpm4.4.2.33.0.33samba-clientare
updated
to
samba
packages
System
(COS)
Console
Operating
The
ESX security
Service
Adv
RPMsthird
issues.
Console
rpm
multiple
Service
which
fixesand
update
for
4.4.2.3-22.el5_7.2
ESX
party 22.el5_7.2
rpm-pythonlibs-4.4.2.322.el5_7.2rpm3.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMs
issues.
Console
rpm
multiple
security
Service
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
third
party which
rpm-python22.el5_7.2
and
libs-4.4.2.3-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMsthird
issues.
Console
rpm
multiple
security
Service
which
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
party 3.29.el5_7.4
rpm-python22.el5_7.2
and
and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
packages
System
(COS)
Console
The
ESX Operating
Service
Adv
RPMsthird
issues.
Console
rpm
multiple
security
Service
which
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
party rpm-pythonlibsmbclient3.29.el5_7.4
and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMs
issues.
Console
rpm
security
Service
which
fixes
update
for
4.4.2.3-22.el5_7.2
ESX
third
party multiple
3.0.33libsmbclient3.29.el5_7.4
and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMsthird
issues.
Console
rpm
multiple
security
Service
which
fixes
update
for
3.29.el5_7.4
which
ESX
party libsmbclient3.0.33and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMs
issues.
Console
rpm
multiple
security
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX third party samba-client3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33are updated
to
samba
packages
System
(COS)
Console
Operating
The
ESX
Service
Adv
RPMs
issues.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
which
ESX
third
party -common-3.0.333.0.33libsmbclient3.29.el5_7.4
and
3.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMsthird
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
party libsmbclient3.0.33and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
forparty 3.0.33which
ESX
third
3.0.33libsmbclient3.29.el5_7.4
and
-common-3.0.333.29.el5_7.4samba
samba-clientare
updated
to
samba
packages
System
(COS)
Console
Operating
The
ESX
Service
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
which
ESX
third
party 3.29.el5_7.4
3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
Adv
RPMsthird
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
party 3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
packages
System
(COS)
Console
Operating
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multipleto
update
forparty 3.29.el5_7.4samba
which
ESX
third
3.0.33libsmbclient3.29.el5_7.4
-common-3.0.333.0.33samba-clientare
updated
samba
packages
System
(COS)and
Adv
RPMsthird
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
which
ESX
party 3.29.el5_7.4
3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
packages
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX third party samba-client3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33are updated to
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
which
ESX
third
party -common-3.0.333.0.33libsmbclient3.29.el5_7.4
and
3.29.el5_7.4samba
3.0.33samba-clientAdv
RPMsthird
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
party libsmbclient3.0.33and
-common-3.0.333.29.el5_7.4samba
3.0.33Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
forparty 3.29.el5_7.4samba
which
ESX
third
3.0.33libsmbclient3.29.el5_7.4
and
-common-3.0.33Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
which
ESX
third
party 3.29.el5_7.4
3.0.33libsmbclientand
-common-3.0.33Adv
RPMsthird
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
party 3.0.33libsmbclient- and
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes multiplewhich
update
forparty libsmbclient3.29.el5_7.4
ESX
third
3.0.33Adv
RPMsthird
the Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
party 3.0.33Adv
RPMs for
the Samba
client.
Console
samba 3.29.el5_7.4
security
issues
in
Service
fixes
multiple
update
which
Adv
RPMs
the
Samba
client.
Console
samba
security
issues
Service
fixes multiple in
Adv
RPMs
the Samba
client.
Console
samba security
issues
in
Adv
RPMs
the Samba client.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0001
VMSA-2012-0002
VMSA-2012-0002
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0003
VMSA-2012-0004
VMSA-2012-0004
VMSA-2012-0004
VMSA-2012-0004
VMSA-2012-0004
VMSA-2012-0004
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

3.29.el5_7.4
and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
ESX third party samba-client3.0.33libsmbclient3.29.el5_7.4
and
-common-3.0.333.29.el5_7.4samba
3.0.33are updated
to
samba
System
(COS)
Console
Operating
The
ESXpackages
Service
update
forparty -common-3.0.33which
ESX
third
3.0.33libsmbclient3.29.el5_7.4
and
3.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
packages
System
(COS)
Console
Operating
Service
fixes
multiple
update
forparty libsmbclient3.29.el5_7.4
which
ESX
third
3.0.33and
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
samba
packages
System
(COS)
Console
samba
security
issues
in
Service
fixes
multiple
update
forparty 3.0.33which
ESX
third
3.0.33libsmbclient3.29.el5_7.4
and
-common-3.0.333.29.el5_7.4samba
samba-clientare
updated
to
samba
packages
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
which
ESX
third
party 3.29.el5_7.4
3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientare
updated
to
This
vulnerability
RPMsthird
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
party 3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
3.0.33samba-clientallows
an
This vulnerability
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
forparty 3.29.el5_7.4samba
which
ESX
third
3.0.33libsmbclient3.29.el5_7.4
and
-common-3.0.333.0.33unauthenticated
allows
an
RPMsthird
the
Samba
client.
Console
samba
security
issues
into
Service
fixes
multiple
update
for
which
ESX
party 3.29.el5_7.4
3.0.33libsmbclientand
-common-3.0.333.29.el5_7.4samba
remote
attacker
unauthenticated
RPMs
the
Samba
client.
Console
samba
security
issues
into
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX third party remote
3.0.33- attacker
libsmbclientand
-common-3.0.33download
files
RPMs
the
Samba
client.
Console
samba
security
in
Service
fixes
multiple
update
for
which
ESX
third
party from
3.0.33libsmbclient3.29.el5_7.4
and
The
vCenter
theissues
CBM
download
files
RPMs
the
Samba
client.
Console
samba
security
issues
in
Service
fixes
multiple
update
for
3.29.el5_7.4
which
ESX
third
party
3.0.33libsmbclientChargeback
server
or CBM
conduct
The
vCenter
from
the
RPMs
the
Samba
client.
Console
samba
security
issues
Service
fixes
multiple
update
forparty Oracle
3.29.el5_7.4
which
ESX
third
3.0.33Manager
a
denial-of-service
Chargeback
server
or
conduct
(Sun)
JREinis
RPMs
the
Samba
client.
Console
samba updated
security
issues
Service
fixes
multiple
update
for
3.29.el5_7.4
which
(CBM)
contains
against
the
server.
Manager
a
denial-of-service
to version
Oracle
(Sun)
JREinis
RPMs
the
Samba
client.
Console
samba
security
issues
Service
fixes
multiple
a
flaw in
its
VMware
thanks
(CBM)
contains
against
the
server.
1.5.0_32which
updated
to version
Oracle
(Sun)
JREinis
RPMs
the
Samba
client.
Console
samba
security
issues
inis
handling
of
Joshua (Sun)
Keyes
for
a
flaw in its
VMware
thanks
VirtualCenter
addresses
1.5.0_32which
updated
tomultiple
version
Oracle
JRE
RPMsESXOracle
the
Samba
client.
XML
API of
reporting
this
handling
Joshua
Keyes
for is
and
security
issues
VirtualCenter
addresses
multiple
1.5.0_32which
updated
to
version
Oracle
(Sun)
JRE
requests.
issue
to
us.
XML
API
reporting
this
(Sun)
JRE
that
existed
in
and
ESXOracle
security
issues
VirtualCenter Oracle
addresses
1.5.0_32which
updated
tomultiple
version
(Sun)
JRE is
requests.
issue
toreleases
us.
update
earlier
(Sun)ESXOracle
JRE
that existed
in
and
security
issues
VirtualCenter
addresses
1.5.0_32which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
(Sun)
JRE
that
existed
in
and
ESXOracle
security
issues
VirtualCenter
addresses
1.5.0_32which
updated
tomultiple
version
Oracle
(Sun)
JREofis
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
(Sun)
JRE
that
existed
in
and ESXOracle Oracle
security(Sun)
issues
VirtualCenter
addresses
1.5.0_32which
updated
tomultiple
version
JREofis
and VMware
WDDM
display
The
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
(Sun)
JRE
that
existed
in
and
ESXOracle
security
issues
VirtualCenter
addresses
1.5.0_32which
updated
tomultiple
version
Oracle
(Sun)
JREofis
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
(Sun)
JRE
that
existed
in
and
ESXOracle
security
issues
VirtualCenter
addresses
multiple
1.5.0_32which
updated
to version
Oracle
(Sun)
JREofis
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
ofis
(Sun)ESXOracle
JRE
that
existed
in
and
security
issues
VirtualCenter
addresses
1.5.0_32which
updated
tomultiple
version
Oracle
(Sun)
JRE
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
ofis
(Sun)
JRE
that
existed
in
and
ESXOracle
security
issues
VirtualCenter
addresses
multiple
1.5.0_32which
updated
todisplay
version
Oracle
(Sun)
JRE
ThThe
vShield
the
XPDM
buffer
overflow
vulnerabilities
and
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
ofis
(Sun)
JRE
that
existed
in
and
ESXOracle
security
issues
VirtualCenter Manager
addresses
multiple
1.5.0_32which
updated
to
version
Oracle
(Sun)
JRE
(vSM)
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
of
(Sun)ESXOracle
JRE
that
existed
ina for
and
security
issues
VirtualCenter
addresses
multiple
1.5.0_32which
updated
to
version
interface
has
properly
check
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
of
(Sun)
JRE
that
existed
in for
and
ESXOracle
security
issues
VirtualCenter
addresses
multiple
1.5.0_32which
Cross-Site
Request
NULL
pointers.
properly
check
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
of
(Sun)
JRE
that
existed
in
and ESXOracle Forgery
security
issues
VirtualCenter
addresses
multiple
Exploitation
of and
NULL
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
of
(Sun)
JREVirtual vulnerability.
that
existed
in
and
ESXOracle
security
issues
Ifand
an
VMware
these
issues
may
NULL
pointers.
Exploitation
of
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
buffer
overflow
drivers
contain
and
WDDM
display
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
of
(Sun)
JREVirtual The
that
existed
in
attacker
can
Desktop
lead
to
local
VMware
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32
Oracle(Sun)
JRE
update
earlier
releases
of
convince
an
Display
Driver
privilege
Desktop Virtual NULL
VMware
lead
to
local
these
issues
may
Exploitation
of
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
1.5.0_32Driver these
Oracle(Sun)
JRE
authenticated
user
Privilege
escalation
on
View
Display
Desktop
privilege
lead
to
local
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
to
visit
a
malicious
Escalation
virtual
desktops.
Privilege
View
Display
Driver
privilege
VMware
Tools escalation
on
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
the XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
linkthe
attacker
Escalation
virtual
desktops.
Privilege
on
View
Display Driver
Windows-based
VMware
Tools escalation
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
The
VMware
XPDM
force
the
Escalation
virtual
desktops.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools may
escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
and
buffer
overflow
drivers
contain
and
WDDM
display
to
forward
Escalation
Systems.
Privilege
Guest
Operating
Display
Windows-based
VMware Driver
Tools victim
escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
notand
the
XPDM
display
vulnerabilities
buffer
overflow
drivers
contain
authenticated
Escalation
Systems.
PrivilegeDriver
Guest
Operating
Display
Windows-based
VMware
Tools an
escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
notand
the
XPDM
display
vulnerabilities
buffer
overflow
to
the
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools request
escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
the
XPDM
display
vulnerabilities
and
server.
- See more
Escalation
Systems.
Privilege
Guest
Operating
Display
VMware Driver
Tools Windows-based
escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
driver
does
not for
the
XPDM
display
The
vCenter
at:
The
vShield
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools these
escalation
on
privilege
lead
to
local
issues
may
Exploitation
of
NULL
pointers.
properly
check
for
driver
does
not
Orchestrator
(vCO)
The
vCenter
Manager
(vSM)
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
properly
check
Web
Configuration
Orchestrator
The
vCenter
interface
has (vCO)
a for
Escalation
Systems.
Privilege
Operating
Display Driver
Windows-based
VMware
Tools Guest
escalation
on
privilege
lead
to
local
these
issues
may
Exploitation
of
NULL
pointers.
tool reflects
back
Web
Configuration
Orchestrator
(vCO)
Cross-Site
Request
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools lead
escalation
onback
privilege
to
local
these
issues
may
Exploitation
of
the
vCenter
Server
tool
reflects
Web
Configuration
Forgery
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools escalation
onback
privilege
lead
toissues
local
these
may
password
as
part
the
vCenter
Server
tool
reflects
vulnerability.
If an
Escalation
Systems.
PrivilegeDriver
Guest
Operating
Display
Windows-based
VMware
Tools password
escalation
on
privilege
lead
to
local
of
the
webpage.
as
part
the vCenter
attacker
canServer
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware
Tools privilege
escalation
on
This
might
allow
of
the
webpage.
password
as
part
convince
an
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver
Windows-based
VMware Tools authenticated
escalation
on
the
logged-in
vCO
This
might
allow
of
the
webpage.
user
Escalation
Systems.
Privilege
Guest
Operating
Display
Driver to
Windows-based
vCenter
administrator
to
the
logged-in
vCO
This
might
allow
visit
a malicious
Escalation
Systems.
Privilege
Guest
Operating
Orchestrator
retrieve
the vCO
vCenter
administrator
to
the logged-in
vShield
linkthe
attacker
Escalation
Systems.
Password
vCenter
Server
Orchestrator
retrieve
the
vCenter
administrator
Manager
may
force
the to
Disclosure
password.
Password
vCenter
Server
Orchestrator
retrieve
Cross-Site
victim
tothe
forward
Disclosure
password.
Password
vCenter
Server
Request
an
authenticated
Disclosure
password.
Forgery
request to the
vulnerability
server.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0005
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

to visit (Sun)
a malicious
Oracle
JRE is
Manager
may force
vShield
linkthe
attacker
updated
tothe
version
Oracle
(Sun)
JRE is
Cross-Site
victim
to
forward
Manager
may
force
the
vCenter
1.6.0_30which
updated
to
version
Oracle
(Sun)
JRE is
Request
an
authenticated
Cross-Site
victim
to
forward
Update
addresses
multiple
vCenter
1.6.0_30which
updated
to version
Oracle
(Sun)
JRE is
Forgery
request
to
the
Request
authenticated
ManagerOracle an
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JRE is
vulnerability
server.
Forgery
request
to
the
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
multiple
vCenter
1.6.0_30which
updated
to
version
Oracle (Sun) JRE is
vulnerability
server.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun) JRE
that existed
in
ManagerOracle
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
multiple
vCenter
1.6.0_30which
updated
to version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle Oracle
security(Sun)
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
JREofis
1.6.0_30
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
vCenter
1.6.0_30which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_30
Oracle
(Sun)
JRE.of
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
multiple
vCenter
1.6.0_30which
updated
to version
1.6.0_30
Oracle
(Sun)
JRE.of
update
earlier
releases
(Sun) JRE
that existed
in
ManagerOracle
security
issues
Update
addresses
multiple
vCenter
1.6.0_30which
1.6.0_30
Oracle
(Sun)
JRE.of
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
Update
addresses
multiple
Apache
Tomcat
1.6.0_30
Oracle
(Sun)
JRE.of
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
has been
updated
Apache
Tomcat
1.6.0_30
Oracle
(Sun)
JRE.of
update
earlier
releases
(Sun) JRE
that
existed
in
to
version
6.0.35
has
been
updated
Apache
Tomcat
1.6.0_30Server Apache
Oracle
(Sun)
JRE.of
update
earlier
releases
vCenter
address
to
version
6.0.35
has
been
updated
Tomcat
1.6.0_30Tomcat
Oracle
(Sun)
JRE.
Apache
multiple
security
vCenter
Server to
address
6.0.35
hasversion
been
updated
Apache
Tomcat
update
6.0.35
issues.
Apache Tomcat
multiple
security
vCenter
Server Apache
address
to
version
6.0.35
has
been
updated
Tomcat
update 6.0.35
issues.
Apache
Tomcat
multiple
security
vCenter
Server has
address
to
version
6.0.35
been
updated
Apache Tomcat
update
6.0.35
issues.
Apache
Tomcat
multiple
security
vCenter Server Apache
address
to version
6.0.35
has
been
updated
Tomcat
update 6.0.35
issues.
Apache
Tomcat
multiple
security
vCenter
Server Apache
address
to
version
6.0.35
has
been
updated
Tomcat
flaw
in
the
way
update 6.0.35
issues.
Apache
Tomcat
multiple
security
vCenter
Server A
address
to
version
6.0.35
has been
updated
Apache
Tomcat
port-based
I/O
is
inTomcat
the
way
update
issues.
Apache
Tomcat
multiple
security
vCenter6.0.35
Server A
address
toflaw
version
6.0.35
has
been
updated
Apache
handled
allows
port-based
I/O
isfor
A
flaw
in
the
way
update 6.0.35
issues.
Apache
Tomcat
multiple
vCenter
Server has
address
to
version
6.0.35
beensecurity
updated
modifying
Readhandled
allows
port-based
I/O
isfor
flaw
in security
the
way
update 6.0.35
issues.
Apache
Tomcat
multiple
vCenter
Server A
to
address
version
6.0.35
The
bzip2
library
Only
Memory
that
modifying
Readhandled
port-based
I/O
isfor
flaw
in allows
the
way
update
6.0.35
issues.
Apache
Tomcat
multiple
security
vCenter
Server
to
address
ESXi
update
to A
is
updated
to
The
bzip2
library
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
port-based
I/O
A
flaw
in
the
way
update
6.0.35
issues.
Apache
Tomcat
multiple
security
third
party
version
1.0.6which
ESXi
update
to The
is
updated
to isfor
bzip2
library
Virtual
DOS
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
port-based
I/O
isfor
flaw
in1.0.6which
way
update
6.0.35
issues.
component
resolves
athe
security
third
party
version
ESXi update
to A
is
updated
to
The
bzip2
library
Machine.
Virtual
DOS
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
port-based
I/O
isfor
flaw
way
bzip2update
issue.
-in1.0.6which
component
resolves
athe
security
third
party to A
version
ESXi
is
updated
to
The
bzip2
library
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
for
port-based
I/O
is
A
flaw
in
the
way
bzip2update
issue.
- 1.0.6which
component
resolves
a library
security
third
party to is
version
ESXi
updated
to
The
bzip2
issue
may
lead
to
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
port-based
I/O
isfor
flaw
in1.0.6which
the
way
bzip2
issue.
component
resolves
a
security
third update
party to A
version
ESXi
is
updated
to
The
bzip2
library
privilege
issue
may
lead
to
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
for
port-based
I/O
is
flaw
way
bzip2update
issue.
-in1.0.6which
component
resolves
athe
security
third
party to A
version
ESXi
is
updated
to
The
bzip2
library
escalation
on
privilege
issue
may
lead
to
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to
the
Only
Memory
that
modifying
Readhandled
allows
I/O
isfor
A
flaw
in
the
way
bzip2
issue.
-Operating
component
resolves
a
security
third
party to port-based
version
1.0.6which
ESXi update
is
updated
to
The
bzip2
library
Guest
escalation
on
privilege
issue
may
lead
to
Exploitation
ofthat
this
Machine.
Virtual
DOS
belongs
to
the
Only
Memory
Readhandled
allows
for
port-based
I/O
is
bzip2
issue.
-Operating
component
resolves
a
security
third
party to modifying
version
1.0.6which
ESXi
update
is
updated
to
The
bzip2
library
Systems
that
run
Guest
escalation
on
privilege
issue
may
lead
to
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to
thethat
Only
Memory
modifying
Readallows
for
bzip2update
issue.
-Operating
component
resolves
a
security
third
party to handled
version
1.0.6which
ESXi
is
updated
to
The
bzip2
library
Windows
Systems
that
run
Guest
escalation
on
privilege
issue
may
lead
to
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to Readthethat
Only
Memory
bzip2
issue.
component
resolves
a
security
third
party to modifying
version
1.0.6which
ESXi update
is
updated
to
2000Windows
XP
Windows
Systems
that
run
Guest
Operating
escalation
on
privilege
issue
may
to
Exploitation
ofthat
this
Machine.
Virtual
DOS
belongs
to lead
the
Only
Memory
bzip2party
issue.
-Operating
component
resolves
a
security
third
version
1.0.6which
VMware
ROM Systems
32-bitWindows
2000Windows
XP
Windows
that
run
Guest
escalation
on
privilege
issue
may
lead
Exploitation
of
this
Machine.
Virtual
DOS
belongs
to the to
bzip2
issue.
-Operating
component
resolves
a
security
Overwrite
Server
2003
32-bit
VMware
ROM 32-bitWindows
2000Windows
XP
Windows
Systems
that
run
Guest
escalation
onof
privilege
issue
may
lead
to
Exploitation
this
Machine.
Virtual
DOS
bzip2
issue.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM escalation
32-bitWindows
2000Windows
XP
Windows
Systems
that
run
Guest
Operating
on
privilege
issue
may lead
to
Exploitation
of this
Machine.
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM Windows
32-bitWindows
2000Windows
XP
Systems
that
run
Guest
Operating
escalation
on
privilege
issue
may
lead
to
Exploitation
of
this
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM 32-bitWindows
2000Windows
XP
Windows
Systems
that
run
Guest
Operating
escalation
on
privilege
issue may lead to
Escalation
R2
32-bit.
PrivilegeROM 2003
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
32-bitWindows
2000Windows
XP
Windows
Systems
that
run
Guest
Operating
escalation
on
privilege
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM 2000Windows
32-bitWindows
XP
Windows
Systems
that
Guest
Operating
escalation
on run
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware ROM Guest
32-bitWindows
2000Windows
XP
Windows
Systems
that run
Operating
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Overwrite
Server
2003
32-bit
VMware
ROM Systems
32-bitWindows
2000Windows
XP
Windows
thatServer
run
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM 32-bitWindows
2000Windows XP
Windows
Escalation
2003
R2
32-bit.
Privilege
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM or
32-bitWindows
2000Windows
XP
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
VMware
ROM 32-bitWindows
Escalation
2003
R2
32-bit.
Privilege
or
Windows
Server
Overwrite
Server
2003
32-bit
Escalation
2003
R2
32-bit.
Privilege
or Windows Server
Escalation
2003 R2 32-bit.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0006
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0007
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

VMware ROM
Overwrite
VMware
ROM
Privilege
Overwrite
VMware ROM
Escalation
Privilege
Overwrite
ESX
third party
Escalation
Privilege
update
forparty
ESX
third
Escalation
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX third party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX third party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
VMware
Tools
Console
kernel
Service
update
for
ESX
third
party
Incorrect
VMware
Tools
Console
kernel
Service
update
for
Folder
IncorrectTools
VMware
Console
kernel
Service
Permissions
Folder
Incorrect
VMware
Tools
Console kernel
Privilege
Permissions
Folder
Incorrect
VMware
Tools
Escalation.
Privilege
Permissions
Folder Tools
Incorrect
VMware
Escalation.
PrivilegeTools
Permissions
Folder
Incorrect
VMware
Escalation.
Privilege
Permissions
Folder
Incorrect
VMware Tools
Escalation.
Privilege
Permissions
Folder Tools
Incorrect
VMware
Escalation.
Privilege
Permissions
Folder
Incorrect
VMware
Tools
Escalation.
Privilege
Permissions
Folder
IncorrectTools
VMware
Escalation.
Privilege
Permissions
Folder
Incorrect
VMware
Tools
Escalation.
Privilege
Permissions
Folder
Incorrect
VMware
Tools
Escalation.
Privilege
Permissions
Folder Tools
Incorrect
VMware
Escalation.
PrivilegeTools
Permissions
Folder
Incorrect
VMware
Escalation.
Privilege
Permissions
Folder
Incorrect
Escalation.
Privilege
Permissions
Folder
Escalation.
Privilege
Permissions
ESX
third party
Escalation.
Privilege
update
forparty
ESX
third
Escalation.
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX third party
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX
third
party
Updated ESX
Console
kernel
Service
update for
Updated
ESX
Console kernel
Service
package kernel
Console
libxml2
package
libxml2

Systems
that run
Guest
Operating
Console
Operating
The
ESX
Service
2000Windows
XP
Windows
Systems
that run
System
Console
Operating
The
ESX(COS)
Service
32-bitWindows
2000Windows
XP
Windows
kernel
is
updated
System
(COS)
Console
The
ESX Operating
Service
Server
2003
32-bit
32-bitWindows
2000Windows
XP
to
kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
or
Windows
Server
Server
2003
32-bit
32-bitWindows
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
2003
R2
32-bit.
or
Windows
Server
Server
2003
32-bit
238.4.11.591731
400.2.6.18to
kernelkernel
is
updated
System
Console
Operating
The
ESX(COS)
Service
2003
R2
32-bit.
or
Windows
Server
to
fix
multiple
238.4.11.591731
400.2.6.18kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
2003
R2
32-bit.
security
issues
in
fix
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is
updated
System
(COS)
Console
Operating
The ESX Service
the
COS
kernel.
security
issues
in
fix
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
to
fix
multiple
238.4.11.591731
400.2.6.18kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
fixESX
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
Service
the
COS
kernel.
security
issues
in
fix
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
to
fix
multiple
238.4.11.591731
400.2.6.18kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
fixESX
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
Service
the
COS
kernel.
security
issues
in
to
fix
multiple
238.4.11.591731
400.2.6.18kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
fixESX
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
Service
the
COS
kernel.
security
issues
in
fix
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
to
fix
multiple
238.4.11.591731
400.2.6.18kernelkernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
the
COS
kernel.
security
issues
in
fixaccess
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
ESX
Service
The
control
the
COS
kernel.
security
issues
in
fix
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is(COS)
updated
System
Console
Operating
list
of
the
VMware
The
access
control
the
COS
kernel.
security
issues
to
fix
multiple
238.4.11.591731
400.2.6.18kernelkernel
is(COS)
updated
System
Tools
folder
is in
list
of
the
VMware
The
access
control
the
COS
kernel.
security
fix
multiple
238.4.11.591731
400.2.6.18to
kernelkernel
is issues
updated
incorrectly
set.
Tools
folder
is in
list
of
the
VMware
The
access
control
the
COS
kernel.
security
issues
in
to
fix
multiple
238.4.11.591731
400.2.6.18kernelExploitation
of this
incorrectly
set.
Tools
folder
is
list
of
the VMware
The
access
control
the
COS
kernel.
security
issues
in
to
multiple
238.4.11.591731
400.2.6.18issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
listfix
of
the VMware
The
access
control
the
COS
kernel.
security
issues
in
to
fix
multiple
238.4.11.591731
local
privilege
issue
may
lead
Exploitation
of
this
incorrectly
set.
Tools
folder
is to
list
of
the VMware
The
access
control
the
COS
kernel.
security
issues
in
to
fix
multiple
escalation
on
local
privilege
issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
list
of
the VMware
The
access
control
the
COS
kernel.
security
issues
in
Windows-based
escalation
on
local
privilege
issue
may
lead
Exploitation
of
this
incorrectly
set.
Tools
folder
is to
list
of
the VMware
The
access
control
the
COS
kernel.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
list
of
the VMware
The
access
control
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
list
the VMware
Theof
access
control
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
Exploitation
of
this
incorrectly
set.
Tools
folder
is to
list
of
the VMware
The
access
control
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
list
of
the VMware
The
access
control
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
to
Exploitation
of
this
incorrectly
set.
Tools
folder
is
list of
the VMware
The
access
control
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
Exploitation
of
this
incorrectly
set.
Tools
folder
is to
list
of
the VMware
The
access
control
Systems.
Guest
Operating
Windows-based
escalation
on
local
issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
list
ofprivilege
the VMware
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
to
Exploitation
of this
incorrectly
set.
Tools
folder
is
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
issue
may
lead
to
Exploitationset.
of this
incorrectly
Systems.
Guest
Operating
Windows-based
escalation
onof this
local
privilege
issue
may
lead
to
Exploitation
The
ESX
Service
Systems.
Guest
Operating
Windows-based
escalation
on to
local
privilege
issue
may
lead
Console
Operating
The
ESX
Service
Systems.
Guest
Operating
Windows-based
escalation
on
local
privilege
System
(COS)
Console
Operating
The
ESX
Service
Systems.
Guest
Operating
Windows-based
escalation
on
kernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
Systems.
Guest
Operating
Windows-based
which
addresses
kernel
is
updated
System
(COS)
Console
Operating
The ESX
ESX Console
Service
The
Systems.
Guest
Operating
several
security
which
addresses
kernel
is
updated
System
(COS)
Console
Operating
The
ESX
Operating
System
The
ESX Service
Console
Systems.
issues
insecurity
the COS
several
which
addresses
kernel
is
updated
System
(COS)
Console
Operating
The
ESX
Service
(COS) libxml2
Operating
System
kernel.
issues
insecurity
the
COS
several
which
addresses
kernel
is
updated
System
(COS)
Console
Operating
The
ESX
Service
rpms
are
updated
(COS)
libxml2
kernel.
issues
in
the
COS
several
security
which
addresses
kernel
is(COS)
updated
System
Console
Operating
The
ESX
Service
to
the
following
rpms
are
updated
kernel.
issues
insecurity
the COS
several
which
addresses
kernel
is
updated
System
(COS)
Console
Operating
The
ESX
Service
versions
libxml2to
the
following
kernel.
issues
in
the COS
several
security
which
addresses
kernel
is
updated
System (COS)
Console
Operating
2.6.26versions
libxml2kernel.
issues
in
the COS
several
security
which addresses
kernel
is(COS)
updated
System
2.1.12.el5_7.2
and
2.6.26kernel.addresses
issues
insecurity
the COS
several
which
kernel
is
updated
libxml2-python2.1.12.el5_7.2
and
kernel.
issues
in
the
COS
several
security
which
addresses
2.6.26libxml2-pythonkernel.
issues
the COS
severalinsecurity
2.1.12.el5_7.2
2.6.26kernel.addresses
issues
in the COS
which
2.1.12.el5_7.2
kernel.addresses
several
security
which
issues.
several security
issues.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0008
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

Updated ESX
Service ESX
Updated
Console ESX
Service
Updated
package
Console
Service ESX
Updated
libxml2
package ESX
Console
Service
Updated
libxml2 ESX
package
Console
Service
Updated
libxml2
package
Console ESX
Service
Updated
libxml2 ESX
package
Console
Service
Updated
libxml2
package
Console
Service
VMware host
libxml2
package host
Console
memory
VMware
libxml2 host
package
overwrite
memory
VMware
libxml2
vulnerability
overwrite
memory host
VMware
(data
pointers)
vulnerability
overwrite
memory
VMware
host
(data pointers)
vulnerability
overwrite
memory
VMware
host
(data
pointers)
vulnerability
overwritehost
memory
VMware
(data pointers)
vulnerability
overwrite
memory
VMware
host
(data
pointers)
vulnerability
overwrite
memory
VMware host
(data
pointers)
vulnerability
overwrite
memory
VMware
host
(data pointers)
vulnerability
overwrite
memory
VMware
host
(data
pointers)
vulnerability
overwrite
memory host
VMware
(data
pointers)
vulnerability
overwrite
memory
VMware
host
(data pointers)
vulnerability
overwrite
memory
VMware
host
(data
pointers)
vulnerability
overwritehost
memory
VMware
(data pointers)
vulnerability
overwrite
memory
VMware
host
(data
pointers)
vulnerability
overwrite
memory host
VMware
(data
pointers)
vulnerability
overwrite
memory
VMware
host
(data pointers)
(function
vulnerability
overwrite
memory
VMware
host
pointers)
(function
vulnerability
overwritehost
memory
VMware
pointers)
(functionhost
vulnerability
overwrite
memory
VMware
pointers)
(function
vulnerability
overwrite
memory
VMware host
pointers)
(function
vulnerability
overwritehost
memory
VMware
pointers)host
(function
vulnerability
overwrite
memory
VMware
pointers)
(function
vulnerability
overwrite
memory host
VMware
pointers)
(function
vulnerability
overwrite
memory
VMware
host
pointers)host
(function
vulnerability
overwrite
memory
VMware
pointers)
(function
vulnerability
overwritehost
memory
VMware
pointers)
(functionhost
vulnerability
overwrite
memory
VMware
pointers)
(function
vulnerability
overwrite
memory
pointers)
(function
vulnerability
overwrite
pointers)
(function
vulnerability
pointers)
(function
ESX
NFS traffic
pointers)
parsing
ESX NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
ESX
NFS traffic
vulnerability
parsing
vulnerability

2.1.12.el5_7.2
2.6.26versions
to
following
rpms
updated
(COS)
libxml2
Operating
System
thethe
handler
Due
toare
a libxml2flaw
inand
libxml2-python2.1.12.el5_7.2
2.6.26versions
libxml2to
the
following
rpms
are
updated
(COS)
function
RPC
the
handler
Due
tolibxml2
a for
flaw
inand
libxml2-python2.1.12.el5_7.2
2.6.26versions
libxml2to
the
following
rpms
updated
commandsit
isinand
function
RPC
the
handler
Due
toare
a for
flaw
which
addresses
2.1.12.el5_7.2
2.6.26libxml2-pythonversions
libxml2to
the
possible
to
commandsit
isinand
function
RPC
the
handler
Due
tofollowing
a for
flaw
several
security
which
addresses
libxml2-python2.1.12.el5_7.2
2.6.26versions
libxml2manipulate
data
possible
to
commandsit
isinand
function
RPC
the
handler
Due
to a for
flaw
issues.
several
security
which
addresses
2.6.26libxml2-python2.1.12.el5_7.2
pointers
within
the
manipulate
data
possible
to
commandsit
isinand
function
RPC
the
handler
Due
to a for
flaw
issues.
several
security
which
addresses
2.1.12.el5_7.2
2.6.26libxml2-pythonand
VMX
process.
This
pointers
within
manipulate
data
possible
to
commandsit
is
function
RPC
the
handler
Due
to a for
flaw
inthe
issues.
several
security
which
addresses
2.1.12.el5_7.2
2.6.26libxml2-pythonvulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
isin
function
RPC
the
handler
Due
to a for
flaw
issues.
several
security
which
addresses
2.1.12.el5_7.2
2.6.26allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
isin
function
RPC
the handler
Due
to
a for
flaw
issues.
several
security
which
addresses
2.1.12.el5_7.2
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
manipulate
data
possible
to
commandsit
isinthe
function
RPC
the
handler
Due
to a for
flaw
issues.
several
security
which
addresses
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
is
function
RPC
the
handler
Due
to a for
flaw
in
issues.
several
security
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
manipulate
data
possible
to
commandsit
is
function
RPC
the
handler
Due
to a for
flaw
inthe
issues.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
isin
function
RPC
the
handler
Due
to a for
flaw
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
isin
function
for
RPC
the
handler
Due
to
acode
flaw
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
is
function
for
RPC
the
handler
Due
to acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
manipulate
data
possible
to
commandsit
isinthe
function
for
RPC
the
handler
Due
to acode
flaw
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
manipulate
data
possible
to
commandsit
is
function
for
RPC
the
handler
Due
to
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
manipulate
data
possible
to
commandsit
isinthe
function
for
RPC
the
handler
Due
to acode
flaw
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
data
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
pointers
within
the
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
to acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
VMX
process.
This
within
the
VMX
function
pointers
manipulate
possible
to
commandsit
isin
function
for
RPC
the
handler
Due
to acode
flaw
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
process.
This
within
the
VMX
function
pointers
manipulate
possible
to
commandsit
function
for
RPC
the
handler
Due
to acode
flawis
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
tothe
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
tothe
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
tothe
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
the
handler
Due
tothe
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
is
function
for
RPC
handler
the
handling
of
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
function
for
RPC
NFS
trafficit
isis
the
handling
of
Due
tothe
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
possible
to
commandsit
NFS
trafficit
isis
the
handling
of
Due
tothe
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
manipulate
overwrite
memory.
possible
to
NFS
trafficit
is
the
handling
of
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
process.
This
within
VMX
function
pointers
manipulate
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
ismay
the
handling
of
Due
to
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
may
process.
This
within
VMX
function
pointers
may
allow
a is
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
the
handling
of
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
athe
guest
user
vulnerability
may
process.
This
within
VMX
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
is
the
handling
of
Due
to
a
flaw
in
the
host.
execute
code
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
process.
This
network
to
with
access
to
the
may
allow
a
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
the
handling
Due
to acode
flawisof
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
execute
code
on
network
to
with
access
to
the
mayhandling
allow
a is
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
the
of
Due
to
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
allow
a
guest
user
the
ESXi/ESX
host
execute
code
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
is
the
handling
of
Due
to
acode
flaw
in
the
host.
execute
on
potentially
process
or
to
crash
the
VMX
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
to
the
may
allow
a
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
isof
the
handling
Due
to acode
flaw
in
the
host.
execute
on
potentially
process
or
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
withhandling
access
the
may
allow
a to
user
This
vulnerability
overwrite
possible
tomemory.
NFS
trafficit
is
the
of
the
host.
execute
code
on
potentially
The
issue
isa to
not
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
may
allow
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit is the
the
host.
execute
code
on
present
in
cases
The
issue
is
not
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
the
may
allow
a to
user
This vulnerability
overwrite
possible
tomemory.
the
host.
where
there
is
no
present
in
cases
The
issue
is
not
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with vulnerability
access
the
may
allowmemory.
a to
user
This
overwrite
NFS
traffic.
where
there
ishost
no
present
in
cases
The
issue
not
authentication.
without
the ESXi/ESX
execute
code
on
network
tois
with
access
the
may
allow
a to
user
This
vulnerability
NFS
traffic.
where
there
is
no
present
in
cases
The
issue
is
not
authentication.
without
the
host
execute
code
on
network
toa to
with
access
the
mayESXi/ESX
allow
user
NFS
traffic.
where
there
ishost
no
present
in
cases
The
issue
not
authentication.
without
the
ESXi/ESX
execute
code
on
network
tois
with
access
to
the
NFS
traffic.
where
there
is
no
present
in
cases
The
issue
is
not
authentication.
without
the
ESXi/ESX
execute
code
on
network
to host
NFS
traffic.
where
there
is
no
present
in
cases
The ESXi/ESX
issuecode
is not
authentication.
without
the
host
execute
on
NFSESXi/ESX
traffic.
where
there
ishost
no
present
in is
cases
The
issue
not
authentication.
without
the
NFS
traffic.
where
there
is
present
in
cases
The
issue
is
not
authentication.no
without
NFS
traffic.
where
there
is no
present
in is
cases
The
issue
not
authentication.
NFS issue
traffic.
where
there
is no
present
in is
cases
The
not
NFS traffic.
where
there
is no
present
in cases
NFS
traffic.
where there is no
NFS traffic.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0009
VMSA-2012-0010
VMSA-2012-0010
VMSA-2012-0010
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

the
ESXi/ESX
host
execute
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
is
the
handling
of
Due
to
acode
flaw
in
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
to
may
allow
a
user
Thishandling
vulnerability
overwrite
memory.
possible
NFS
trafficit
isof
the
Due
to
a to
flaw
inthe
The
issue
is
not
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
is
the handling
of
to
ain
flaw
in
ESX NFS traffic Due
present
cases
The
issue
is
not
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
to
may
allow
a
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
isof
the
handling
to there
ain
flaw
inthe
parsing
where
is
no
ESX
NFS traffic Due
present
cases
The
issue
is
not
authentication.
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
to
the
mayhandling
allow
a is
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
the
of
Due
to
a
flaw
in
vulnerability
NFS
traffic.
parsing
where
there
ishost
no
ESX
NFS floppy
traffic the
present
in
cases
VMware
The
issue
is
not
authentication.
without
ESXi/ESX
execute
code
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
is
the
handling
of
Due
to
ain
flaw
in
vulnerability
NFS
traffic.
parsing
where
there
is
no
device
out-ofpresent
cases
VMware
floppy authentication.
The
issue
is
not
without
the
ESXi/ESX
host
execute
code
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
possible
to
NFS
trafficit
is
the
handling
of
Due
to
a
flaw
in
vulnerability
NFS
traffic.
bounds
where
there
is
no
device out-ofpresent
in
cases
VMware
floppy network
The
issue
is
not
authentication.
without
the
host
execute
code
on
to
withESXi/ESX
access
the
may
allow
a to
user
This
vulnerability
overwrite
possible
tomemory.
NFS
trafficit
is
the
handling
of
memory
write the
NFS
traffic.
bounds
where
there
ishost
no
device
out-ofpresent
in
cases
VMware
floppy
The
issue
is
not
authentication.
without
ESXi/ESX
execute
code
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
possible
tomemory.
trafficit
is
memory
write NFS
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware
floppy
The
issue
is
not
authentication.
without
the
host
execute
code
on
network
to
with
access
the
may
allow
a to
user
ThisESXi/ESX
vulnerability
overwrite
possible
tomemory.
memory
write
NFS
traffic.
boundsout-ofwhere
there
ishost
no
device
present
in
cases
VMware
floppy execute
The
issue
is
not
authentication.
without
the
ESXi/ESX
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
overwrite
memory.
Due
to
acode
flaw
in
memory
write without
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware
floppy
The
issue
is
not
authentication.
the
host
execute
on
network
to
with
access
the
may
allow
a to
user
This
vulnerability
the ESXi/ESX
SCSI
device
Due
to
acode
flaw
in
memory
write
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware floppy with
The
issue
isa it
not
authentication.
without
the
host
execute
on
network
to
access
to
mayESXi/ESX
allow
user
registration
isthe
the
SCSI
device
Due
to
acode
flaw
in
memory
write
NFS
traffic.
boundsout-ofwhere
there
ishost
no
device
present
in
cases
VMware
floppy the
The
issue
is
not
authentication.
without
ESXi/ESX
execute
on
network
to
with
access
to
possible
registration
it
isthe
the
SCSI
device
Due
to
acode
flaw
in
memory
write authentication.
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware
floppy
The
issue
is
not
without
the
execute
on
network
to
perform
an
possible
registration
it host
is
the ESXi/ESX
SCSI
device
Due
to acode
flaw
in
memory
write
NFS
traffic.
bounds
where
there
is
no
device out-ofpresent
in
cases
VMware
floppy unchecked
The
issue
is
not
authentication.
without
the
ESXi/ESX
host
execute
on
write
perform
an
possible
to
registration
it
is
the
SCSI
device
Due
to acode
flaw
in
memory
write the
NFS
traffic.
bounds
where
there
ishost
no
device
out-ofpresent
in
cases
VMware
floppy
The
issue
is
not
authentication.
without
into
memory.
This
unchecked
write
perform
possible
to
registration
it
is
the
SCSI
device
DueESXi/ESX
to a an
flaw
in
memory
write The
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware
floppy
issue
is
not
authentication.
without
vulnerability
into
memory.
This
unchecked
write
perform
possible
to
registration
itmay
is
the
SCSI
device
Due
to a an
flaw
in
memory
write
NFS
traffic.
bounds
where
there
is
no
device out-ofpresent
in
cases
VMware
floppy into
The
issue
is
not
authentication.
allow
user
vulnerability
may
memory.
This
unchecked
write
perform
an
possible
to
registration
it
is
the
SCSI
device
Due
toa aguest
flaw
in
memory
write allow
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware
floppy
The
issue
is
not
to
crash
the
VMX
user
vulnerability
may
into
memory.
This
unchecked
write
perform
an
possible
to
registration
it
is
the
SCSI
device
Due
toa aguest
flaw
in
memory
write
NFS
traffic.
bounds
where
there
is
no
device
out-ofpresent
in
cases
VMware SCSI perform
process
or
to
crash
the
allow
user
vulnerability
may
into
memory.
This
unchecked
write
an
possible
to
registration
itVMX
is
the
SCSI
device
Due
toa aguest
flaw
in
memory
write
NFS
traffic.
bounds SCSI into
where
there
is
no
device
potentially
VMware
process
or
to
crash
the
allow
user
vulnerability
may
memory.
This
unchecked
write
perform
an
possible
to
registration
itVMX
is
the
SCSI
device
Due
toa aguest
flaw
in
memory SCSI
write to
NFS
traffic.
unchecked
execute
code
on
device
potentially
VMware
process
or
crash
the
VMX
allow
user
vulnerability
into
memory.
This
unchecked
write
perform
an
possible
to
registration
itmay
is
the SCSI
device
Due
toa aguest
flaw
in
memory
write execute
the
host.
unchecked
code
on
device SCSI
potentially
VMware
process
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
into
memory.
This
unchecked
write
perform
possible
to
registration
it in
is
the
SCSI
device
Due
to a an
flaw
memory SCSI
write vulnerability
the
host.
unchecked
execute
code
on
device
potentially
VMware
process
or
to
crash
the
VMX
allow
a
guest
user
may
into
memory.
This
unchecked
write
perform
an
possible
to
registration
it
is
the
SCSI
device
Due to a flaw in
memory SCSI
write process
the
host.
unchecked
execute
code
on
device
potentially
VMware
or
to
crash
the
VMX
allow
a
guest
user
vulnerability
may
into
memory.
This
unchecked
write
perform
an
possible
to
registration
it is
the
SCSI device
memory
write execute
the
host.
unchecked
code
on
device SCSI
potentially
VMware
process
or
to
crash
the
allow
a guest
user
vulnerability
may
into
memory.
This
unchecked
perform
an
possible
to write
registration
itVMX
is
memory SCSI
write allow
the
host.
unchecked
execute
code
on
device
potentially
VMware
process
or
to
crash
the
VMX
a guest
user
vulnerability
may
into
memory.
This
unchecked
perform
an
possible
to write
memory
write potentially
the
host.
unchecked
execute
code
on
device
VMware SCSI
process
or
to
crash
thewrite
VMX
allow
a guest
user
vulnerability
may
into
memory.
This
unchecked
perform
an
memory
write
the
host.
unchecked
execute
code
on
device
potentially
VMware
SCSI into
process
or
to
crash
thewrite
VMX
allow
a guest
user
vulnerability
may
memory.
This
unchecked
memory SCSI
write to
the
host.
unchecked
execute
code
on
device
potentially
VMware
process
or
crash
the
VMX
allowmemory.
a guestmay
user
vulnerability
into
This
memory
write
the
host.
unchecked
execute
code
on
device
potentially
VMware SCSI vulnerability
process
or
to
crash
the
allow
a guest
user
may
Input
data
is VMX
not
memory SCSI
write allow
the
host.
unchecked
execute
code
on
device
potentially
VMware
process
or
to
crash
the
a guest
user
properly
validated
Input
data
is VMX
not
memory SCSI
write process
the
host.
unchecked
execute
code
on
device
potentially
VMware
or
to crash
the
when
loading
properly
validated
Input
data
is VMX
not
memory
write
the
host.
unchecked
execute
code
on
device SCSI when
potentially
process
VMware
A
flawdata
inor
the
way
Checkpoint
loading
properly
validated
Input
isfiles.
not
memoryfile
write A
the
host.
unchecked
execute
code
onan
device
potentially
Library
library
files
VMware
flaw
in
the
way
This
may
allow
Checkpoint
files.
when
loading
properly
validated
Input
data
isare
not
memory
write
the
host.
unchecked
execute
code
onan
loading
loaded
could
allow
Library
file is
library
files
VMware
A
flaw
in
the
way
Input
data
attacker
with
the
This
may
allow
Checkpoint
files.
when
loading
properly
validated
Input
data
isare
not
memory
write
the
host.
Privilege
for
privilege
loading
loaded
could
allow
Library
file is
library
files
not
properly
ability
to
load
aan
Input
data
attacker
with
the
This
may
allow
Checkpoint
files.
when
loading
properly
validated
Input
data
isare
not
Escalation
escalation.
Privilege
for
privilege
loading
loaded
could
allow
validated
when
specially
crafted
not
properly
ability
to
load
aan
Input data is
attacker
with
the
This
may
allow
Checkpoint
when
loading
properly
validated
Input
data
isfiles.
not
Escalation
escalation.
Privilege
for
privilege
loading
Checkpoint
file
to
validated
specially
crafted
not
properly
ability
to with
load
aan
Input
datawhen
is
attacker
the
This
may
allow
Checkpoint
when
loading
properly
validated
Input
data
isfiles.
not
Escalation
escalation.
Checkpoint
execute
loading
Checkpoint
to
validated
specially
crafted
not
properly
ability
toarbitrary
load
aan
Input
datawhen
is
attacker
with
the
This
may
allow
Checkpoint
files.
when
loading
properly
validated
Input
data
isfile
not
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
to
validated
when
specially
crafted
not properly
ability
to with
load
aan
Input
data is
attacker
the
This
may
allow
Checkpoint
when
loading
properly
validated
Input
data
isfiles.
not
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
to
validated
specially
crafted
not
properly
ability
to with
load
aan
Input
datawhen
is
attacker
the
This
may
allow
Checkpoint
when
loading
properly
validated
Input
data
isfiles.
not
files.properly
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
to
validated
specially
crafted
not
ability
to
load
a
Input
datawhen
is
attacker
with
the
This may
allow
Checkpoint
when
loading
properly
validated
Input
data
isfiles.
notan
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
to
validated
when
specially
crafted
not properly
ability
to with
load
aan
Input
data is
attacker
the
This
allow
Checkpoint
when
loading
properly
validated
Inputmay
data
isfiles.
not
files.
code
on
the
host.
Checkpoint
execute
loading
Checkpoint
file
to
validated
specially
crafted
not
properly
ability
toarbitrary
load
aan
Input
datawhen
is
attacker
with
the
This
allow
Checkpoint
files.
whenmay
loading
properly
validated
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
to
validated
when
specially
crafted
not
properly
ability
to
load
a
Input data is
attacker
with
the
This
may
allow
an
Checkpoint
files.
when
loading
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
to
validated
specially
crafted
not
properly
ability
to with
load
aan
Input
datawhen
is
attacker
the
This
may
allow
Checkpoint
files.
files.properly
codemay
on
the
host.
Checkpoint
execute
loading
Checkpoint
file
to
validated
specially
crafted
not
ability
toarbitrary
load
aan
Input
datawhen
is
attacker
with
the
This
allow
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
file
validated
when
specially
crafted
not properly
ability to with
load the
ato
Input
data is
attacker
files.
code
on
the
host.
Checkpoint
execute
arbitrary
loading
Checkpoint
fileato
validated
when ability
specially
not
properly
to crafted
load
files.
code on arbitrary
the
host.
Checkpoint
execute
loading
Checkpoint
file
to
validated
when specially
crafted
files.
code on arbitrary
thefile
host.
Checkpoint
execute
loading
Checkpoint
to
files.
code
on
the
host.
Checkpoint
execute arbitrary
files.
code on the host.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0011
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0012
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

who
is
capable
of
allow
an
attacker
handled.
This
may
incorrectly
virtual
devices
is
from
remote
Traffic
coming
remote
device.
referred
to
as
machine
is
not
run
the
virtual
system
that
does
connected
to
aa
while
physically
a
virtual
machine
not properly
ability
to
load
a
manipulating
the
who
is
capable
of
allow
an
attacker
handled.
This
may
incorrectly
virtual
devices
is
from
remote
Traffic
coming
remote
device.
referred
to
as
machine
is to
not
run
the
virtual
system
that
does
connected
aa
physically
validatedVirtual
when while
specially
crafted
VMware
traffic
from
a
manipulating
the
who
is
capable
of
allow
an
attacker
handled.
This
may
incorrectly
virtual
devices
from
remote
Traffic
coming
remote
device.
referred
to
as
machine
is
not
run
the
virtual
system
that
does
to
aais
loading Virtual connected
Checkpoint
file
to
Machine
remote
virtual
VMware
traffic
from
a
manipulating
the
who
is
capable
of
allow
an
attacker
handled.
This
may
incorrectly
virtual
devices
from
remote
Traffic
coming
remote
device.
referred
to
as
ais
machine
is
not
run
the
virtual
system
that
does
Checkpoint
execute
arbitrary
Remote
Device
device
to
crash
Machine Virtual incorrectly
remote
virtual
VMware
traffic
from
a the
manipulating
who
is
capable
of
allow
an
attacker
handled.
This
may
virtual
devices
from
remote
Traffic
coming
remote
device.
referred
to
as
ais
machine
is
not
run
the
virtual
files.
on
the
host.
Denial ofDevice
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual code
traffic
from
a
manipulating
the
who
is
capable
of
allow
an
attacker
handled.
This
incorrectly
virtual
devices
from
remote
Traffic
coming
remote
device.
referred
to
as may
ais
machine
is
ServiceofDevice
machine.
Denial
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual traffic
from
a
manipulating
who
is
capable
of
allow
an
attacker
handled.
This
may
incorrectly
virtual
devices
from
remote
Traffic
coming
remote
device.
referred
to
as the
ais
Service
machine.
Denial
virtual
RemoteofDevice
device
to
crash
Machine
remote
virtual
VMware
Virtual the
traffic
from
a
manipulating
the
who
is
capable
of
allow
an
attacker
handled.
This
may
incorrectly
virtual
devices
from
remote
Traffic
coming
remote
device. is
ServiceofDevice
machine.
Denial
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual who
traffic
from
a
manipulating
the
is
capable
of
allow remote
an
attacker
handled.
This may
incorrectly
virtual
devices
is
from
Traffic
coming
Service
machine.
Denial
of
the
virtual
Remote
Device
device
to
crash
Machine
remote
virtual
VMware Virtual virtual
traffic
from
a the
manipulating
who
capable
of
allow
an
attacker
handled.
This
may
incorrectly
devices
is
from is
remote
Service
Denial ofDevice
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual machine.
traffic
from
a
manipulating
the
who
is
capable
of
allow
an
attacker
handled.
This may
incorrectly
virtual
devices
is
ServiceofDevice
machine.
Denial
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual manipulating
traffic
from
a
the
who isan
capable
of
allow
attacker
handled.
This may
incorrectly
Service
machine.
Denial
ofDevice
the
virtual
Remote
to
crash
Machine
remote
virtual
VMware
Virtual device
traffic
from
a the
manipulating
who
isan
capable
of
allow
attacker
handled.
This
may
Service
Denial ofDevice
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual machine.
traffic
from
a
manipulating
the
who
is
capable
of
allow an attacker
ServiceofDevice
machine.
Denial
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual traffic
from
a
manipulating
the
who
is capable
of
Service
machine.
Denial
virtual
RemoteofDevice
device
to
crash
Machine
remote
virtual
VMware
Virtual the
traffic
from
a the
manipulating
ServiceofDevice
machine.
Denial
the
virtual
Remote
device
to
crash
Machine
remote
virtual
VMware
Virtual The
traffic
from
athird
libxml2
ServiceofDevice remote
machine.
Denial
the
virtual
Remote
device
to
crash
Machine
virtual
partylibxml2
librarythird
has
The
The
Oracle (Sun)
Service
machine.
Denial
ofDevice
virtual
Remote
device
to crash
ESXi
update
to the
been
updated
party
library
has
The
libxml2
third
JRE is
updated
to
The
Oracle
(Sun)
Service
machine.
Denial
of
the
virtual
third
party
which
addresses
ESXi
update
to The
been
updated
party
library
has
libxml2
third
version
JRE is
updated
to
The
Oracle
(Sun)
Service
machine.
component
multiple
security
third
party to which
addresses
ESXi update
been
updated
party
library
has
The
libxml2
third
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
component
multiple
security
third
party to issues
which
addresses
ESXi
update
been
updated
party
library
has
The
libxml2
third
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle (Sun)
libxml2
issues
component
multiple
security
third
party to party
which
addresses
ESXi
update
been
updated
library
has
The
libxml2
third
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
issues
component
security
third update
party to multiple
which
addresses
ESXi
been
updated
party
library
has
The
libxml2
third
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
issues
component
multiple
security
third
party to The
which
addresses
ESXi
update
been
updated
party
library
has
libxml2
third
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE is
updated
to
The
Oracle
(Sun)
libxml2
issues
component
multiple
security
third
party to been
which
addresses
ESXi
update
updated
party
library
has
The
libxml2
third
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
issues
component
security
third update
party to multiple
which
addresses
ESXi
been
updated
party
library
has
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
issues
component
multiple
security
third
party to that
which
addresses
ESXi
update
been
updated
by
this
update
in
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE is
updated
to
The
Oracle
(Sun)
libxml2
issues
component
multiple
security
third
party
which
addresses
vCenter and
the
Oracle
Java
SE
by
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
component
multiple
security
ESX
update
Critical
Patch
vCenter
andto issues
the
Oracle
Java
SE
by
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
libxml2
issues
JRE
1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
vCenter
andto by
the
Oracle
Java
SE
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
to
Critical
Patch
vCenter and
the
Oracle
Java
SE
by
this
update
in
that
are
addressed
CVE
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
version
JRE
isidentifiers
updated
to
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
vCenter
andto CVE
the
Oracle
Java
by
this
update
inSE
that
arehas
addressed
identifiers
documented
the
Oracle
security
issues.
addresses
multiple
1.6.0_31which
version
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
vCenter
andto the
Oracle
Java
SE
by
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
addresses
multiple
1.6.0_31which
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX update
Critical
Patch
vCenter
andto Oracle
the
Oracle
Java
SE
by
this
update
in
that
are
addressed
CVE
identifiers
documented
the
has
security
issues.
addresses
1.5.0_36
tomultiple
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
vCenter
andto that
the
Oracle
SE
by
update
in
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
toJava
JRE
is
updated
to
Thethis
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
to
Critical
Patch
vCenter and
the
Oracle
SE
by
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
toJava
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE 1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
vCenter
andto documented
the
Oracle
SE
by
this
update
in
that
are
addressed
CVE
identifiers
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
toJava
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
vCenter
andto by
the
Oracle
Java
SE
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
to (Sun)
JRE is
updated
to
The
Oracle
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
to
Critical
Patch
vCenter and
the
Oracle
SE
by
this
update
in
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
toJava
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX
update
Critical
Patch
andto CVE
the
Oracle
SE
by
this
update
in
vCenter
that
are
addressed
identifiers
documented
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
toJava
JRE
is
updated
to
The
Oracle
(Sun)
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
ESX
update
to
Critical
Patch
vCenter
and
the
Oracle
Java
SE
Update
in
JRE
1.5.0_36
inof
that
are
addressed
CVE
identifiers
documented
the
Oracle
has
security
issues.
address
multiple
1.5.0_36
to (Sun)
JRE
is
updated
to
The
Oracle
Update
31
February
2012.
JRE
1.6.0
Update
Advisory
of
ESX update to Oracle
Critical
Patch
Manager
the
Oracle
SE
Update
in
JRE
1.5.0_36
in
vCenter
that
are
addressed
CVE
identifiers
documented
the
has
security
issues.
address
multiple
1.5.0_36
toJava
JRE
is
updated
to
Update
31JRE that
February
2012.
JRE
1.6.0
Update
Advisory
of
update
to
Critical
Patch
Manager
the
Oracle
SE
Update
in
JRE
1.5.0_36
vCenter
are
addressed
CVE
identifiers
documented
thein
Oracle
has
security
issues.
address
multiple
1.5.0_36
toJava
Update
31
February
2012.
1.5.0
Update
Update
Advisory
update
to
JRE
Critical
Patch
Manager
the
Oracle
Java
SE
Update
in
JRE
1.5.0_36
vCenter
that
are
addressed
CVE
identifiers
documented
thein
Oracle
has
security
issues.
address
multiple
36
June
2012.
1.5.0 Update
Update
Advisory
update
to JRE for
Critical
Patch
Manager
the
Oracle
Java
SE
Update
in
JRE
1.5.0_36
vCenter
that
are
addressed
CVE
identifiers
documented
thein
Oracle has
security
issues.
36
for
June
2012.
1.5.0
Update
Update
Advisory
update
to
JRE
Critical
Patch
Manager
the
Oracle
Java
Update
in
JRE
1.5.0_36
in
vCenter
that identifiers
arehas
addressed
CVE
documented
theSE
Oracle
36
for
June
2012.
1.5.0
Update
Update
Advisory
update
to
JRE
Critical
Patch
Manager
theJRE
Oracle
Java
SE
Update
in
1.5.0_36
vCenter
that
are
addressed
CVE
identifiers
documented
thein
36
forJRE
June
2012.
1.5.0
Update
Update
Advisory
update
to JRE CVE
Critical
Patch
Manager
the
Oracle
Java in
SE
Update
in
1.5.0_36
vCenter
that
are
addressed
identifiers
36
for
June
2012.
1.5.0
Update
Update
Advisory
update
to
JRE
Critical
Patch
Manager
the
Oracle
Java
SE
Update
in JRE
1.5.0_36
in
vCenter
that
are
addressed
36
for
June
2012.
1.5.0
Update
Update
Advisory
update to JRE in
Critical
Patch
Manager
the
Oracle
Java in
SE
Update
JRE
1.5.0_36
36
for June
2012.
1.5.0
Update
Update
Advisory
update
to JRE the
Critical
Patch
Manager
Oracle
Java SE
36
for JunePatch
2012.
1.5.0
Update
Update
Advisory
update
to JRE Critical
36
for
June
2012.
1.5.0 Update Update Advisory
36
for June 2012.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

CVE identifiers
documented
Oracle
has the
Update
in JRE
1.5.0_36
vCenter
that
are
addressed
CVE
identifiers
documented
thein
Manager
theJRE
Oracle
Java in
SE
Update
in
1.5.0_36
vCenter
that
are
addressed
CVE
identifiers
The
ESX/ESXi
update to JRE that
Critical
Patch
Manager
the
Oracle
Java
Update
in
JRE
1.5.0_36
in
vCenter
are
addressed
userworld
The
ESX/ESXi SE
1.5.0
Update
Update
Advisory
update
to
JRE
Critical
Patch
Manager
theJRE
Oracle
Java in
SE
Update
in
1.5.0_36
OpenSSL
library
is
userworld
The
ESX/ESXi
36
for
June
2012.
1.5.0 Update
Update
Advisory
update
to JRE userworld
Critical
Patch
Manager
the
Oracle
Java
SE
Update
updated
from
OpenSSL
library
is
The ESX/ESXi
36
for
June
2012.
1.5.0
Update
Update
Advisory
update
to JRE updated
Critical
Patch
ESX/ESXi
version
0.9.8p
to
Update
from
OpenSSL
library is
userworld
The
ESX/ESXi
36
for
June
2012.
1.5.0
Update
Update
Advisory
userworld
0.9.8t
to
ESX/ESXi
version
0.9.8p
tois
Update
to
updated
from
OpenSSL
library
userworld
The
ESX/ESXi
36
for
June
2012.
OpenSSL
resolve
multiple
userworld
0.9.8t
to
ESX/ESXi
version
0.9.8p
Update
to
updated
from
OpenSSL
library
userworld
The ESX/ESXi tois
library
security
issues.
OpenSSL
resolve
userworld
0.9.8t
to
ESX/ESXi
version
0.9.8p
tois
Update to
updatedmultiple
from
OpenSSL
library
userworld
library
security
issues.
OpenSSL
resolve
multiple
userworld
0.9.8t
to
ESX/ESXi
version
0.9.8p
tois
Update
to
updated
from
OpenSSL
library
The
service
library to
security
issues.
OpenSSL
resolve
multiple
userworld
0.9.8t
to
ESX/ESXi
version
0.9.8p
to
Update
updated
from
console
OpenSSL
The service
library
security
issues.
OpenSSL
resolve
multiple
userworld
version
0.9.8t
to
ESX/ESXi
0.9.8p
toto
RPMservice
is updated
console
OpenSSL
The
library
security
issues.toto
OpenSSL
resolve
multiple
userworld
0.9.8t
version
0.9.8eRPM
is updated
console
OpenSSL
The
service
library to ESX RPM
security
issues.
OpenSSL
resolve
multiple
Update
22.el5_8.3
to
version
0.9.8eis updated
to
console
OpenSSL
The
service
library
security
issues.
service
console
resolve
a
security
Update to ESX The
22.el5_8.3
to
version
0.9.8eRPM
is updated
to
console
OpenSSL
service
OpenSSL
issue.
service
console
resolve
a
security
Update
toRPM
ESX The
22.el5_8.3
to
version
0.9.8eRPM
is updated
to
console
OpenSSL
service
OpenSSL
issue.
service
console
resolve
a
security
Update
toRPM
ESX version
22.el5_8.3
to
0.9.8eRPM is updated
to
console
OpenSSL
OpenSSL
issue.
service
a
security
Update console
toRPM
ESX resolve
22.el5_8.3
to
version
0.9.8eRPM
is updated
to
OpenSSL
issue.
service
console
resolve
security
Update
toRPM
ESX The
22.el5_8.3
to
version
0.9.8eESXa
service
OpenSSL
issue.
service
console
resolve
security
Update
toRPM
ESX 22.el5_8.3
to is
console
The
ESXakernel
service
OpenSSL
RPM
issue.
service console
resolve
security
Update
to ESX The
updated
to
resolve
console
is
ESXakernel
service
OpenSSL
issue.
service
console
multiple
security
Update
toRPM
ESX The
updated
to resolve
console
is
ESXkernel
service
kernel
issues
service
console
multiple
security
Update to ESX The
updated
to resolve
console
is
ESXkernel
service
kernel console
issues
service
multiple
security
Update
to ESX The
updated
to resolve
console
is
ESXkernel
service
kernel console
issues
service
multiple
security
Update
to ESX console
updated
to
resolve
kernel
is
RPM
The ESXPerl
service
kernel
issues
service
console
multiple
security
Update to ESX The
updated
to to
resolve
kernel
is
is
updated
perlconsole
RPM
ESXPerl
service
kernel console
issues
service
multiple
security
Update
to ESX console
updated
to
resolve
5.8.8.32.1.8999.v
is
updated
to
perlPerl
RPM
The ESX service
kernel console
issues
service
multiple
security
Update
to ESX mw
to
resolve
5.8.8.32.1.8999.v
is
updated
toRPM
perlconsole
Perl
The
ESX
service
kernel
issues
service console
multiple
security
Update
to ESX The
mw
to
resolve
5.8.8.32.1.8999.v
is
updated
to
perlconsole
Perl
RPM
ESX
service
libmxl2
Perl RPMconsole
issues.
service
multiple
security
Update
to ESX is
mw
to
resolve
5.8.8.32.1.8999.v
updated
to
perlPerl
RPM
RPMsESX
arelibmxl2
updated
console
The
service
Perl RPMconsole
issues.
service
multiple
security
Update
to ESX mw
to
resolve
5.8.8.32.1.8999.v
is
updated
toRPM
perlPerl
to
libxml2-2.6.26RPMs
arelibmxl2
updated
console
The
ESX
service
Perl RPMconsole
issues.
service
multiple
security
Update
to ESX to
mw
to
resolve
5.8.8.32.1.8999.v
is
updated
to
perl2.1.15.el5_8.2
and
libxml2-2.6.26RPMsESX
arelibmxl2
updated
console
The
service
Perl RPMconsole
issues.
service
multiple
security
Update
to ESX 5.8.8.32.1.8999.v
mw
to
resolve
libxml2-python2.1.15.el5_8.2
and
to
libxml2-2.6.26RPMs
arelibmxl2
updated
console
The
ESX
service
Perl
RPMconsole
issues.
service
security
Update
to ESX multiple
mw
to
resolve
2.6.26libxml2-python2.1.15.el5_8.2
and
to
libxml2-2.6.26RPMs
are
updated
console
libmxl2
The ESX service
Perl RPMconsole
issues.
service
multiple
security
Update
to ESX 2.1.15.el5_8.2
to
2.6.26libxml2-pythonand
to libxml2-2.6.26RPMs
arelibmxl2
updated
console
Perl RPMconsole
issues.
service
resolve
a
security
Update
to ESX 2.1.15.el5_8.2
to
2.6.26libxml2-pythonand
to
libxml2-2.6.26RPMs
are updated
libxml2
RPM
issue.
service console
resolve
a security
Update
to ESX to
to
2.6.26libxml2-python2.1.15.el5_8.2
and
libxml2-2.6.26libxml2 console
RPM
issue.
service
resolve
a
security
Update
to
ESX libxml2-python2.1.15.el5_8.2
to
2.6.26and
The ESX service
libxml2 console
RPM
issue.
service
resolve
a
security
Update
to
ESX 2.1.15.el5_8.2
to
2.6.26libxml2-pythonconsole
RPM
The
ESXglibc
service
libxml2 console
RPM
issue.
service
resolve
security
Update
to
ESX The
2.1.15.el5_8.2
to
2.6.26is
updated
to RPM
console
ESXaglibc
service
libxml2 console
RPM
issue.
service
resolve
a
security
Update
to
ESX version
2.1.15.el5_8.2
to
glibc-2.5is updated
to RPM
console
The
ESXglibc
service
libxml2
RPM
issue.
service
console
resolve
a
security
Update to ESX The
81.el5_8.1
to RPM
version
is
updated
console
glibc
ESXglibc-2.5service
libxml2 console
RPM
issue.
service
resolve
multiple
Update
to
ESX console
81.el5_8.1
to RPM
version
glibc-2.5is
updated
glibc
The ESX service
glibc RPM
security
issues.
service
console
resolve
multiple
Update
to ESX version
81.el5_8.1
to RPM
glibc-2.5is updated
console
The
ESXglibc
service
glibc
RPM
security
issues.
service console
resolve
Update
to ESX The
81.el5_8.1
to RPM
version
glibc-2.5is
updated
console
glibc
ESXmultiple
service
glibc RPM
security
issues.
service
console
resolve
multiple
Update
to ESX is
81.el5_8.1
to RPM
version
glibc-2.5updated
console
The
ESXglibc
service
glibc RPM
security
issues.
service
console
resolve
multiple
Update
to ESX 81.el5_8.1
to RPM
version
is
updated
console
glibc
The
ESXglibc-2.5service
glibc RPM
security
issues.
service
console
resolve
Update
to ESX The
81.el5_8.1
to RPM
version
glibc-2.5is
updated
console
glibc
ESXmultiple
service
glibc RPM
security
issues.
service
console
resolve
multiple
Update
to ESX version
81.el5_8.1
to RPM
glibc-2.5is updated
console
glibc
glibc
RPM
security
issues.
service
console
resolve
multiple
Update to ESX is
81.el5_8.1
to
version
glibc-2.5updated
glibc RPM
securitymultiple
issues.
service
console
resolve
Update
to ESX version
81.el5_8.1
to
glibc-2.5glibc RPM
securitymultiple
issues.
service
console
resolve
Update
to ESX 81.el5_8.1
to
glibc
RPM
security
issues.
service console resolve multiple
glibc RPM
security issues.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0013
VMSA-2012-0014
VMSA-2012-0014
VMSA-2012-0014
VMSA-2012-0014
VMSA-2012-0014
VMSA-2012-0014
VMSA-2012-0014
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

The
The ESX
ESX service
service
is updated
to RPM
console
glibc
The
console
The ESX
ESX service
service
version
glibc-2.5is
updated
to RPM
console
glibc
The
ESX
service
poptrpmrpmconsole
The ESX service
Update to ESX console
81.el5_8.1
to
version
glibc-2.5is
updated
GnuTLS
The
ESX
service
libsand
poptrpmrpmconsole
The
ESXrpmservice
service console
resolve
multiple
Update
to ESX 81.el5_8.1
to areto
version
glibc-2.5RPM
is
updated
console
GnuTLS
The
ESX
service
python
RPMS
libsand
rpmpoptrpmrpmconsole
ESX
service
The
installer
of the
glibc
RPM
security
issues.
service console
resolve
multiple
Update
to ESX The
81.el5_8.1
to
version
1.4.1RPM
is updated
to
console
GnuTLS
ESX
service
updated
to
the
python
RPMS
are
libsand
rpmpoptrpmrpmconsole
VMware
Movie
installer
of
the
glibc RPM
security
issues.
service
console
resolve
multiple
Update
to ESX The
7.el5_8.2
to
version
1.4.1RPM
is
updated
to
console
GnuTLS
The
ESXRPMS
service
following
versions
updated
to
the
python
libsand
rpmpoptrpmrpmDecoder
has
aare
VMware
Movie
The
installer
of
the
glibc
RPM
security
issues.
service
console
resolve
multiple
Update to ESX to
7.el5_8.2
to
version
1.4.1RPM
is planting
updated
to
console
GnuTLS
The
ESX
service
resolve
multiple
following
versions
updated
to
the
python
RPMS
libsand
rpmbinary
Decoder
has
aare
VMware
Movie
GnuTLS console
RPM
security
issues.
service
resolve
multiple
Update
to
ESX The
7.el5_8.2
to
version
1.4.1RPM
is
updated
console
GnuTLS
ESX
service
security
issues:
to
resolve
multiple
following
versions
updated
to
the
python
RPMS
areto
vulnerability.
binary
planting
Decoder
has
aAn
The
vCenter
GnuTLS console
RPM
security
issues.
service
resolve
multiple
Update
to
ESX version
7.el5_8.2
to
1.4.1RPM
is planting
updated
console
GnuTLS
popt-1.10.2.3security
issues:
to
to
resolve
multiple
following
versions
updated
to
the
attacker
who
can
vulnerability.
An
binary
Operations
server
The
vCenter
GnuTLS
RPM
issues.
service console
resolve
multiple
Update
to
ESX security
7.el5_8.2
to
version
1.4.1RPM
is
updated
28.el5_8
rpmpopt-1.10.2.3security
issues:
to
to resolve
multiple
following
write
their
attacker
who
can
vulnerability.
An
contains
aversions
crossOperations
server
GnuTLS console
RPM
security
issues.
service
resolve
multiple
7.el5_8.2
to
version
1.4.1Update
to
ESX 28.el5_8
4.4.2.3-28.el5_8
rpmpopt-1.10.2.3security
issues:

to
malicious
write
their
attacker
who
can
siteresolve
scripting
contains
a multiple
crossGnuTLS console
RPM
security
issues.
service
resolve
multiple
Update
to
ESX 7.el5_8.2
to
rpm-libs-4.4.2.34.4.2.3-28.el5_8
28.el5_8
rpmpopt-1.10.2.3security
issues:

executable
to
the
malicious
writescripting
their that
vulnerability
site
GnuTLS
RPM
issues.
resolve
multiple
poptrpmrpmservice
console
rpm-libs-4.4.2.3Update
to
ESX security
4.4.2.3-28.el5_8
28.el5_8
rpmpopt-1.10.2.3same
folder
as
executable
to
the
malicious
allows
an
attacker
vulnerability
that
Certain
processes
GnuTLS console
RPM
security
issues.
libsand
rpmpython-4.4.2.3poptrpmrpm28.el5_8
rpmservice
rpm-libs-4.4.2.3Update
to
ESX 4.4.2.3-28.el5_8
where
the
installer
same
folder
as
executable
to
the
to
steal
an
allows
an
attacker
when created
Certain
processes
python
RPMS.
28.el5_8
libsand
rpmpoptrpmrpm28.el5_8
rpmservice
console
rpm-libs-4.4.2.3Update
to ESX python-4.4.2.34.4.2.3-28.el5_8
of
the
Movie
where
the
installer
same
folder
as
administrator's
to steal
an
have
weak
when
created
Certain
processes
python RPMS.
28.el5_8
libsand
rpmpython-4.4.2.3poptrpmrpm28.el5_8
service
console
rpm-libs-4.4.2.3VMware
Movie where
Decoder
isrpmlocated
of
the
Movie
the
installer
session
cookie.
To
administrator's
vCenter
security
have
weak
when created
Certain
processes
python
RPMS.
28.el5_8
libsand
rpmpython-4.4.2.3poptrpmrpm28.el5_8
rpmDecoder
may
be
able
to
run
VMware Movie permissions
Decoder
is
located
of
the
Movie
exploit
this
session
cookie.
To
CapacityIQ
vCenter
security
have
weak
when
created
Certain
processes
python
28.el5_8
libsand
rpmInstallerRPMS.
binary python-4.4.2.3their
code
when
Decoder
may
be
able
to
run
VMware
Movie
Decoder
is
located
vulnerabilitythe
exploit
this
contains
a
path
CapacityIQ
assigned.
It is
permissions
security
have
weak
when
created
Certain
processes
python RPMS.
28.el5_8
planting
the
installation
Installer
binary vulnerabilitythe
their
code
Decoder
may
be
able
run
Center
attacker
must
traversal
contains
a
path
possible
to
assigned.
Itwhen
isto is
permissions
security
have
weak
when created
Certain
processes
vulnerability
started.
planting
the
installation
is
Installer
binary
their
code
when
Operations
convince
the
Center
attacker
must
vulnerability
traversal
VMware
commandeer
possible
to
assigned.
It isthat
permissions
security
have
weak
when
created
Certain
processes
vulnerability
started.
planting
the
installation
cross-site
administrator
tois
Operations
convince
the
allows
vulnerability
Workstation
these
process
VMware
commandeer
possible
toIt isthat
assigned.
permissions
security
have
weak
when
created
Certain
processes
vulnerability
started.
scripting
click
on
a
cross-site
administrator
vCenter
unauthenticated
allows
and Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is to
assigned.
permissions
security
have weak
when
created
Certain
processes
vulnerability
malicious
link.
scripting
click
on
a
CapacityIQ
attackers
vCenter
unauthenticated
Weak
could
result
in
and
Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toto
assigned.
It is
permissions
security
have
weak
when
created
Certain
processes
vulnerability
malicious
link.
path
traversal
download
arbitrary
CapacityIQ
attackers
to
permissions
on
Elevation
of
Weak
could
result
in
and
Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
have
when weak
created
Certain
processes
vulnerability
files.
path
traversal
download
arbitrary
process
Privilege
in
the
permissions
on
Elevation
of
Weak
could
result
in
and
Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
have
weak
when
created
Certain
processes
vulnerability
files.
threads
of
the
process
Privilege
in
the
permissions
Elevation
of
Weak
could
result
in
and
Player on context
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
have
weak
when
created
Certain
processes
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
on
Elevation
of
Weak
could
result
in
and
Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
have
when weak
created
Certain
processes
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
Weak
could
result
in
and
Player on assigned.
threadswhich
Workstation
these
process
VMware
commandeer
possible
toof
It is
permissions
security
have
weak
when
created
Certain
processes
vulnerability.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
of
Weak
could
result
in
and
Player on host.
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
have
weak
when
created
Certain
processes
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
on
Elevation
of
Weak
could
result
in
and Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
have weak
when
created
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
Weak
could
result
in
and
Player on possible
threadswhich
Workstation
these
process
VMware
commandeer
toof
assigned.
It is
permissions
security
have
weak
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
on
Elevation
of
Weak
could
result
in
and
Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
toIt is
assigned.
permissions
security
Workstation
and
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
on
Elevation
of
Weak
could
result
in
and
Player
threadswhich
Workstation
these
process
VMware
commandeer
possible
to
assigned.
It
is
permissions
Player have a
Workstation
and
vulnerability.
host.
threads
of
process
Privilege
in
the
permissions
Elevation
of
Weak
could
result
in
and
Player on context
threadswhich
Workstation
these
process
VMware
commandeer
possible
to
assigned.
Itthe
is
binary
planting
Player
have
a
Workstation
and
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
of
Weak
could
in
and
Player on threadswhich
Workstation
these result
process
VMware
commandeer
possible
to
vulnerability.
An
binary
planting
Player
have
a
Workstation
and
vulnerability.
host.
threads
context
of
the
process
in
the
permissions
Elevation
of
Weak
could
result
in
and
Player on Privilege
threadswhich
Workstation
these
process
VMware
commandeer
attacker
who
can
vulnerability.
An
binary have
planting
Player
a
Workstation
and
vulnerability.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
of
Weak
could
result
in
and
Player on host.
threadswhich
Workstation
these
process
write
their
attacker
whoa
can
vulnerability.
An
binary
planting
Player
have
Workstation
and
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
of
Weak
result
in
and Player on could
threadswhich
malicious
write
their
attacker
who
can
vulnerability.
An
binary
planting
Player
have
a
Workstation and
vulnerability.
host.
threads
context
of
the
process
in
the
permissions on Privilege
Elevation
of
Weak
could
result
in
executable
to
a
malicious
write
their
attacker
who
can
vulnerability.
An
binary
planting
Player
have
a
Workstation
and
vulnerability.on malicious
host.
threads
context
of
the
process
Privilege
in
the
permissions
Elevation
of
VMware
system
folder
on
executable
to
a
write their
attacker
whoa
can
vulnerability.
An
binary
planting
Player
have
Workstation
and
vulnerability.
host.
threads
context
of
the
process
Privilege
in
the
Workstation
the
hostmay
be
VMware
system
folder
on
executable
to
a
malicious
write
attacker
who
can
vulnerability.
An
binary
planting
Playertheir
have
a
Workstation
and
vulnerability.
host.
threads
of
the
and Player DLL context
able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
executable
to
a
malicious
write
their
attacker
who
can
vulnerability.
An
binary
planting
Player
have
a
Workstation
and
vulnerability.
host.
binary
planting
under
certain
and
Player
DLL executable
able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
to
a
malicious
write
their
attacker
whoaAn
can
vulnerability.
binary
planting
Player
have
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL
able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
executable
toAn
a
malicious
write
attacker
who
can
vulnerability.
binarytheir
planting
vulnerability.
binary
planting
under
certain
and
Player
DLL circumstances
able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
executable
to
a
malicious
write
their
attacker who An
can
vulnerability.
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL system
able
to
run
code
Workstation
the
hostmay
be
VMware
folder
on
executable
tocan
a
malicious
write
their
attacker
who
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL
able
to
run
code
Workstation
the hostmay
VMware
system
folder
on
executable
tobe
a
malicious
write
their
vulnerability.
circumstances
binary
planting
under
and
Player
DLL malicious
able
tocertain
run
code
Workstation
the
hostmay
VMware
system
folder
on
executable
tobe
a
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL
able
to
run
code
Workstation
the
hostmay
be
VMware
system folder
on
executable
to a
vulnerability.
circumstances
binary
planting
and Player
DLL under
ablehostmay
tocertain
run
code
Workstation
the
be
VMware
system
folder
on
vulnerability.
circumstances
binary
planting
under
and
Player
DLL the
able
tocertain
run code
Workstation
hostmay
be
vulnerability.
circumstances
binary
planting
under
and
Player
DLL able
tocertain
run code
vulnerability.
circumstances
binary planting under certain
vulnerability.
circumstances

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0015
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

malicious
write
their
attacker
whohas
cana
vulnerability.
An
binary
planting
format
string
The
OVFTool
VMware
system
folder
on a
executable
to
a
malicious
write
their
attacker
who
can
An
vulnerability.
format
stringhas
The
OVFTool
Workstation
the
hostmay
be
VMware
system
folder
on
executable
to
a
malicious
write
their
attacker
whoof
can
Exploitation
this
vulnerability.
format
string
The
OVFTool
has
a
and Player DLL executable
able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
to
a
malicious
write
their
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The OVFTool has a
binary
planting
under
certain
and
Player
DLL able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
executable
to
a
malicious
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has
a
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL order
able
to
run
code
Workstation
the
hostmay
be
VMware
system
folder
on
executable
to
a
to
exploit
codeOVFTool
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
has
a
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL system
able
to
run
code
Workstation
the
hostmay
be
VMware
folder
on
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The OVFTool has a
vulnerability.
circumstances
binary
planting
certain
and Player
DLL under
able
to
run
code
Workstation
hostmay
bethis
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
vulnerability.
format
string
The
OVFTool
has
a
vulnerability.
circumstances
binary
planting
under
certain
and
Player
DLL order
able
to
run
code
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
to
exploit
codeOVFTool
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
has
a
vulnerability.
circumstances
binary
planting
under
certain
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
stringhas a
The
OVFTool
vulnerability.
circumstances
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
tostring
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
The
OVFTool
has
a
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has a
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
tostring
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
The
OVFTool
has
a
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
codeOVFTool
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
has
a
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has a
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
tostring
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
The
OVFTool
has
a
vulnerability.
This
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has
issue
allows
an
vulnerability.
Thisa
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has
a
unauthenticated
issue
allows
an
vulnerability.
This
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has
user
to
send
a
unauthenticated
issue
allows
an
vulnerability.
Thisa
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
The
OVFTool
has
a
maliciously
crafted
user
to
send
aThis
unauthenticated
issue
allows
an
vulnerability.
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
format
string
API
request
and
maliciously
crafted
user
to
send
aThis
unauthenticated
issue
allows
an
vulnerability.
of
service
contains
aloading
denial
vSphere
API
The
VMware
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
vulnerability.
disable
the
host
API
request
and
maliciously
crafted
user
to
send
aThis
unauthenticated
issue
allows
an
vulnerability.
of
service
contains
a
denial
vSphere
API
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
tosend
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
this
daemon.
disable
the
host
API
request
and
maliciously
crafted
user
to
aThis
unauthenticated
issue
allows
an
vulnerability.
of
service
contains
aloading
denial
vulnerability.
OVF
file.
string
their
malicious
Tool format
user
into
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
may
lead
to
Exploitation
of
the
daemon.
disable
the host
API
request
and
maliciously
crafted
user
to
send
aThis
unauthenticated
issue
allows
an
vulnerability.
of
service
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
code
execution.
In
issue
would
Exploitation
of
the
daemon.
disable
the host
API
request
and
maliciously
crafted
user
to
send
aThis
unauthenticated
issue
allows
an
vulnerability.
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
order
to
exploit
prevent
issue
would
Exploitation
of
the
daemon.
disable
the host
API
request
and
maliciously
crafted
user
to
send
a
unauthenticated
issue
allows
an
vulnerability.
OVF
file.
string
their
malicious
Tool format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
the
issuethe
management
prevent
issue
would
Exploitation
of
daemon.
disable
the
host
API
request
and
maliciously
crafted
user
to
send
a the
unauthenticated
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
VMware
OVF
need
to
trick
the
attacker
would
activities
on
the
management
prevent
issue
would
Exploitation
of
daemon.
disable
the host
API
request
and
maliciously
crafted
user
to
send
a the
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
need
to
trick
the
VMware OVF
host
but
any
activities
onhost
the
management
prevent
issue
would
Exploitation
of
the
daemon.
disable
the
API
request
and
maliciously
crafted
vulnerability.
OVF
file.
string
their
malicious
Tool
format
user
into
loading
vSphere
API
virtual
machines
VMware
host
but
any
activities
on
the
management
prevent
issue
would
Exploitation
of the
daemon.
disable
the host
API
request
and
vulnerability.
OVF
file.
string
their
malicious
denial
of API
running
on
vSphere
virtual
machines
VMware
host
but
any
activities
onthe
thethe
management
prevent
issue
would
Exploitation
of
daemon.
disable
the
host
vulnerability.
OVF
file.
service
host
would
be
denial
of API
running
on
the
vSphere
virtual
machines
VMware
but
any
activities
on
thethe
management
prevent
issue
would
Exploitation of
daemon.
vulnerability
unaffected.
service
would
be
denial
of API
running
on
the
vSphere
virtual
machines
VMware
host
but
any
activities
on
thethe
management
prevent
issue
would of
Exploitation
vulnerability
unaffected.
service
host
would
be
denial
of
running
on
the
vSphere
API
virtual
machines
VMware
but
any
activities
on the
management
prevent
issue
would
vulnerability
unaffected.
service
host
would
be
denial of API
running
on
vSphere
virtual
machines
VMware
but
any
activities
onthe
the
management
prevent
The
ESX
service
vulnerability
unaffected.
service
would
be
denial
of API
running
on
the
vSphere
virtual
machines
VMware
host
but
any
activities
on
the
management
console
The
ESXbind
service
vulnerability
unaffected.
service
host
would
be
denial
of
running
on
the
vSphere API
virtual
machines
VMware
but
any
activities
on
packages
arethe
console
bind
The
ESX
service
vulnerability
unaffected.
serviceof API
would
be
denial
running
on
the
vSphere
virtual
machines
VMware
host
but
any
updated
to
packages
are
console
bind
The ESX service
vulnerability
unaffected.
service
host
would
be
denial
of API
running
on
the
vSphere
virtual
machines
VMware
following
versions:
updated
toare
packages
console
The
ESXbind
service
vulnerability
unaffected.
service
host
would
be
denial
of
running
on
the
vSphere API
bind-libs-9.3.6VMware
following
versions:
updated
to
packages
are
console
The
ESXbind
service
vulnerability
unaffected.
service
host
would
be
denial
of API
20.P1.el5_8.2
vSphere
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
bind
The
ESX
service
vulnerability
unaffected.
service
bind-utils-9.3.6denial
of
20.P1.el5_8.2
vSphere
API
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
vulnerability
20.P1.el5_8.2
service
bind-utils-9.3.6denial of API
vSphere
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
vulnerability
service
bind-utils-9.3.6denial
of API
20.P1.el5_8.2
vSphere
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
vulnerability
service
bind-utils-9.3.6denial
of
20.P1.el5_8.2
vSphere
API
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
vulnerability
20.P1.el5_8.2
serviceof API
bind-utils-9.3.6denial
vSphere
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
Python
The ESX service
vulnerability
service
bind-utils-9.3.6denial
of API
20.P1.el5_8.2
vSphere
bind-libs-9.3.6VMware
following
versions:
updated
toare
the
packages
console
The
ESXPython
service
vulnerability
service
bind-utils-9.3.6denial
of API
20.P1.el5_8.2
vSphere
bind-libs-9.3.6VMware
following
versions:
updated
to
the
packages
are
console
Python
vulnerability
service
bind-utils-9.3.6denial
of API
20.P1.el5_8.2
vSphere
bind-libs-9.3.6following
versions:
updated
to
the
packages
are
vulnerability
service
bind-utils-9.3.6denial
ofto ESX python-2.4.320.P1.el5_8.2
Update
followingto
versions:
updated
the
vulnerability
20.P1.el5_8.2
service
46.el5_8.2.x86_64
Update console
to ESX bind-utils-9.3.6python-2.4.3following
versions:
vulnerability
20.P1.el5_8.2
python
python-libs-2.4.3service
console
46.el5_8.2.x86_64
Update
to ESX python-2.4.3packages
python
python-libs-2.4.3service
console 46.el5_8.2.x86_64
packages
46.el5_8.2.x86_64
python
python-libs-2.4.3packages
46.el5_8.2.x86_64

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0016
VMSA-2012-0017
VMSA-2012-0017
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

packages
are
console
The
ESXPython
service
following
versions:
updated
to
the
packages
are
console
The
ESXPython
service
Update to ESX console
python-2.4.3following
versions:
updated
to
the
packages
are
Python
The ESX service
service console
46.el5_8.2.x86_64
Update
to ESX updated
python-2.4.3following
versions:
to
the
packages
are
console
The
ESXPython
service
python
python-libs-2.4.3service
console
46.el5_8.2.x86_64
Update to ESX console
python-2.4.3following
versions:
updated
to
the
packages
are
Python
packages
python console
python-libs-2.4.3service
Update
to ESX 46.el5_8.2.x86_64
python-2.4.3following
versions:
updated
to
the
packages
are
packages
python
python-libs-2.4.3service
console
46.el5_8.2.x86_64
Update
to ESX following
python-2.4.3versions:
updated to the
packages
46.el5_8.2.x86_64
python
service console
Update
to ESX python-libs-2.4.3python-2.4.3following
versions:
packages
python
python-libs-2.4.3service
console
46.el5_8.2.x86_64
Update
to ESX The
python-2.4.3ESX service
packages
python
python-libs-2.4.3service
console console
46.el5_8.2.x86_64
expat
The
service
This ESX
patch
packages
46.el5_8.2.x86_64
python to ESX The
python-libs-2.4.3Update
package
is
console
expat
ESX
service
updates
the
ESX
This
patch
packages
46.el5_8.2.x86_64
service
console
updated
to
Update
to ESX The
package
is expatconsole
expat
ESX
service
service
console
updates
the ESX
This
patch
expat package
1.95.8-11.el5_8.
service
console
updated
to
expatUpdate
to ESX package
isPortable
console
expat
The
ESX
service
Netscape
service
console
updates
the
ESX
This
patch
expat
package
1.95.8-11.el5_8.
service console
updated
to
expatUpdate
to ESX The
package
isPortable
console
expat
ESX
service
Runtime
and
Netscape
service
console
updates
the
ESX
This
patch
expat package
1.95.8-11.el5_8.
service
console
updated
to
expatUpdate
to ESX The
package
isPortable
console
expat
ESX
service
Network
Security
Runtime
and
Netscape
service
console
updates
the ESX
This
patch
expat
1.95.8-11.el5_8.
service
console
to
expatUpdatepackage
to ESX updated
package
isPortable
console
expat
The
ESX
service
Services
RPMs
to
Network
Security
Runtime
and
Netscape
service
console
updates
the
ESX
This
patch
expat package
1.95.8-11.el5_8.
service
console
updated
to
expatUpdate
to ESX versions
package
is
console
expat
The
ESX
service
nsprServices
RPMs
to
Network
Security
Runtime
and
Netscape
Portable
service
console
updates
the
ESX
This patch
expat package
1.95.8-11.el5_8.
service
console
updated
to
expatUpdate
to ESX console
package
is
expat
The
ESX
service
4.9.1.4.el5_8
and
versions
nsprServices
RPMs
to
Network
Security
Runtime
and
Netscape
Portable
service
console
updates
the ESX
This
patch
expat
1.95.8-11.el5_8.
service
console
to
expatUpdatepackage
to ESX updated
package
is
console
expat
nss4.9.1.4.el5_8
and
versions
nsprServices
RPMs
to
Network
Security
Runtime
and
Netscape
Portable
service
console
updates
the
ESX
This
patch
VMware
View
expat package
1.95.8-11.el5_8.
service
console
updated
to
expatpackage
is
Update
to ESX 4.9.1.4.el5_8
3.13.5.4.9834resp
nssand
versions
nsprServices
RPMs
to
Network
Security
Runtime
and
Netscape
service
updates
the
ESX
containsconsole
aPortable
critical
VMware
View
expat
1.95.8-11.el5_8.
updated
to
expatservice
console
resolve
Updatepackage
to ESX ectivelyto
3.13.5.4.9834resp
nss4.9.1.4.el5_8
and
versions
nsprServices
RPMs
to
Network
Security
Runtime
and
Netscape
Portable
service
console
directory
contains
atraversal
critical
expat
package
nspr and
multiple
security
service
console
ectivelyto
resolve
Update
tonss
ESX 1.95.8-11.el5_8.
3.13.5.4.9834resp
nss4.9.1.4.el5_8
and
versions
nsprServices
RPMs
to
Network
Security
Runtime
and
Netscape
Portable
vulnerability
that
directory
traversal
The
vCenter
packages
issues.
nspr
andconsole
multiple
security
service
ectivelyto
resolve
Update
tonss
ESX nss3.13.5.4.9834resp
4.9.1.4.el5_8
and
versions
nsprServices
RPMs
to
Network
Security
Runtime
and
allows
an
vulnerability
that
Server
Appliance
The
vCenter
packages
issues.
nspr
andconsole
security
service
ectivelyto
resolve
Update
tonss
ESX multiple
3.13.5.4.9834resp
nss4.9.1.4.el5_8
and
versions
nsprServices
RPMs
Network
Security
unauthenticated
allows
an
(vCSA)
containstoa
Server
Appliance
The
vCenter
packages
issues.
nspr
andconsole
multiple
security
service
ectivelyto
resolve
Update
tonss
ESX versions
3.13.5.4.9834resp
nss4.9.1.4.el5_8
and
nsprServices
RPMs
toa
remote
attacker
to
unauthenticated
directory
traversal
(vCSA)
contains
Server
Appliance
The vCenter
packages
issues.
nspr
andconsole
multiple
security
service
ectivelyto
resolve
Update
tonss
ESX 3.13.5.4.9834resp
nss4.9.1.4.el5_8
and
versions
nsprretrieve
arbitrary
remote
attacker
to
vulnerability
that
directory
traversal
(vCSA) Appliance
contains an
Server
packages
issues.
nspr
andconsole
security
service
ectivelyto
resolve
Update
tonss
ESX multiple
3.13.5.4.9834resp
nss4.9.1.4.el5_8
and
files
from
affected
retrieve
arbitrary
allows
an
vulnerability
thatan
XML
parsing
(vCSA)
contains
packages
issues.
nspr
andconsole
multiple
service
ectivelyto
resolve
Update
tonss
ESX View
3.13.5.4.9834resp
nssServers.
files from
affected
authenticated
allows
ansecurity
vulnerability
that
XML
parsing
vCenter
packages
issues.
nspr
andconsole
multiple
security
service
ectivelyto
resolve
Update
tonss
ESX The
3.13.5.4.9834resp
Exploitation
of
this
View
Servers.
remote
user
to
authenticated
allows
an
vulnerability
that
Server
and
The
vCenter
packages
issues.
nspr andconsole
nss
multiple
security
service
ectivelyto
resolve
VMware
View
issue
may
expose
Exploitation
of
retrieve
arbitrary
remote
user
to
authenticated
allows
anServerthis
vCenter
Server
and
The
vCenter
packages
issues.
nspr
andView
nss
multiple
security
Server
sensitive
VMware
issue
may
expose
files.
Exploitation
retrieveuser
arbitrary
remote
to
authenticated
Appliance
(vCSA)
vCenter
Server
Server
and
The
vCenter
packages
issues.
directory
information
stored
Server
sensitive
vCenter Server remote
of thisExploitation
issue
may
files.
retrieve
arbitrary
user
to
contain
a
Appliance
(vCSA)
vCenter
Server
Server
and
The
vCenter
traversalServer both
on this
the
server.
directory
information
stored
Appliance
expose
sensitive
vCenter
of
issue
may
files.
Exploitation
retrieve
arbitrary
The
ESX
glibc
vulnerability
that
both
contain
a
Appliance
(vCSA)
vCenter
Server
Server
and
vCenter
traversalServer The
on
the
server.
directory
information
Appliance
expose
sensitive
vCenter
of
this
issue
may
files.
Exploitation
package
is stored
The
ESX
glibc
allows
vulnerability
that
both
contain
a
Appliance
(vCSA)
vCenter
Server
Server
and
vCenter
traversal
on
the
server
directory
information
stored
Appliance
expose
sensitive
vCenter
Server The
of
this
issue
may
updated
to
package
is version
The
ESX
glibc
unauthenticated
allows
vulnerability
that
both
contain
a
Appliance
(vCSA)
vCenter
Server
Server
and
The
vCenter
traversal file
on
the
server
arbitrary
information
stored
Appliance
expose
sensitive
glibc-2.5updated
to
package
is version
The
ESX
glibc
remote
users
unauthenticated
allows
vulnerability
that
both
contain
ato
Appliance
(vCSA)
vCenter
Server
Server
and
The
vCenter
downloadfile
on
the
server.
arbitrary
information
stored
81.el5_8.1
to
glibc-2.5updated
to
version
package
is
The
ESX
glibc
create
abnormally
remote
users
unauthenticated
allows
vulnerability
that
both
contain
ato
(vCSA)
vCenter
Server
Server
and
download
on
the
server.
Update to ESX Appliance
resolve
multiple
81.el5_8.1
to
glibc-2.5updated
to
version
package
is
The
ESX
glibc
large
log
entries.
create
abnormally
remote
users
unauthenticated
allows
vulnerability
that
both
contain
ato
Appliance
(vCSA)
Server
glibc package
security
issues.
Update
to ESX vCenter
resolve
multiple
81.el5_8.1
to
glibc-2.5updated
to
version
package
is
The
ESX
glibc
Exploitation
of
large
log
entries.
create
abnormally
remote
users
unauthenticated
allows
vulnerability
that
both
contain
atothis
(vCSA)
glibc package
security
issues.
Update
to ESX Appliance
resolve
multiple
81.el5_8.1
to
glibc-2.5updated
to
version
package
is
The
ESX
glibc
issue
may
allow
Exploitation
of
large contain
log
entries.
create
abnormally
remote
users
unauthenticated
allows
vulnerability
that
atothis
glibc package
security
issues.
Update
to ESX both
resolve
multiple
81.el5_8.1
to
glibc-2.5updated
to
version
package
is
an
attacker
to
fill
issue
may
allow
Exploitation
of
this
large
log
entries.
create
abnormally
remote
users
to
unauthenticated
allows
vulnerability
that
glibc package
security
issues.
Update
to ESX glibc-2.5resolve
multiple
81.el5_8.1
to
updated
to
version
the
system
an
attacker
to
fill
issue
may
allow
Exploitation
of
large
log
entries.
create
abnormally
remote users tothis
unauthenticated
allows
glibc
package
security
issues.
Update
to
ESX resolve
multiple
81.el5_8.1
to
glibc-2.5vCenter
Server
volume
of
the
the
system
an
attacker
to
fill
issue
may
allow
Exploitation
ofto
this
large
log
entries.
create
abnormally
remote
users
unauthenticated
glibcvCSA
package
security
issues.
Update
to
ESX the
resolve
multiple
81.el5_8.1
to
and
vCenter
host
or
vCenter
Server
volume
of
the
system
an attacker
to
fill
issue
may
allow
Exploitation
ofto
this
large
log
entries.
create
abnormally
remote
users
glibc
package
security
issues.
Update
to
ESX vCenter
resolve
multiple
webservice
appliance
VM
and
and
vCSA
host
or
vCenter
Server
volume
of
the
the
system
an
attacker
to
fill
issue
may
allow
Exploitation
of
this
large
log
entries.
create abnormally
glibc
package
issues.
logging
denial
create
a
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
or
vCenter
Server security
volume
of
the
the
system
an
attacker
to
fill
issue
may
allow
Exploitation
of this
large
log entries.
of service
service
logging
denial
create
acondition.
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
vCenter
Server volume
of
the
theattacker
system
an
to
fill
issue
may
allow
Exploitation
ofor
this
of
service
service
condition.
logging
denial
create
a
denial-ofwebservice
appliance
VM
and
and vCSA
vCenter
host
vCenter
Server issue
volume
of
the
the
system
an
attacker
toor
fill
may
allow
of service
service
logging
denial
create
acondition.
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
vCenter
Server an
volume
of
the
the
system
attacker
toor
fill
of
service
service
condition.
logging
denial
create
a
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
or
vCenter Server the
volume
of the
system
of
service
service
logging
denial
acondition.
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
vCenter
Server create
volume
of
theor
of service
serviceacondition.
logging
denial vCenter
create
denial-ofwebservice
appliance
VM or
and
and
vCSA
host
of service
serviceacondition.
logging
denial appliance
create
denial-ofwebservice
VM and
of
service
logging
denial service
create acondition.
denial-ofof service
service condition.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2012-0018
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0001
VMSA-2013-0002
VMSA-2013-0002

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

an
attacker
to
issue
may
allow
Exploitation
of fill
this
large
log
entries.
create
abnormally
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in the
a
Clientand
ESX
ServervSphere
VMware
vCenter
vCenter Server contain
volume
of
the
the
system
an
attacker
to
fill
issue
may
allow
Exploitation
of
this
large
log
entries.
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
a
Clientand
ESX
ServervSphere
vCenter
and vCSA
vCenter
host
or
vCenter
Server VMware
volume
of
the
the
system
an
attacker
to
fill
issue
may
allow
Exploitation
of this
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
a
Clientand
ESX
ServervSphere
vCenter
webservice
appliance
VM
and
and
vCSA
vCenter
host
or
vCenter
Server VMware
volume
of
the
the
system
an
attacker
to
fill
issue
may
allow
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
Clientand
ESX
ServervSphere
vCenter
logging
denial
create
aa
denial-ofwebservice
appliance
VM
and
and vCSA
vCenter
host
or
vCenter
Server VMware
volume
of
the
the
system
an
attacker
to
fill
Client
or
ESX
to
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
the
contain
a
Clientand
ESX
ServervSphere
vCenter
of
service
service
logging
denial
create
acondition.
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
or
vCenter
Server VMware
volume
of
thein
the
system
VMware
interact
with
a
Client
or
ESX
to
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
a
Clientand
ESX
ServervSphere
vCenter
of
service
service
logging
denial
create
acondition.
denial-ofwebservice
appliance
VM
and
and
vCSA
vCenter
host
or
vCenter
Server
volume
of
thea
vSphere
client- VMware
malicious
server
VMware
interact
with
Client
or
ESX
to
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
the
contain
ahost
Clientand
ESX
ServervSphere
vCenter
of
service
service
logging
denial
create
acondition.
denial-ofwebservice
appliance
VMin
and
and
vCSA
vCenter
or
side
as
a client.
vSphere
client- VMware
malicious
server
VMware
interact
with
a
Client
or
ESX
to
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
a
Clientand
ESX
ServervSphere
of service
service
logging
denial
create
acondition.
denial-ofwebservice
appliance
VMof
and
authentication
Exploitation
the
side
as
a client.
vSphere
client- interact
malicious
server
VMware
with
ato
Client
or
ESX
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
a
ESX
of
service
service
logging
denial
create
acondition.
denial-ofmemory
issue
may
lead
to
authentication
Exploitation
of
side
as
a client.
vSphere
client- Clientand
malicious
server
VMware
interact
with
atothe
Client
or
ESX
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in
the
contain
a
of
service
service
condition.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
a client.
vSphere
client- Client
malicious
server
VMware
interact
atothe
orwith
ESX
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
in the
the
vulnerability
the
client
system.
corruption
code
execution
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
a
client.
vSphere
clientmalicious
server
VMware
interact
ato on
Client
orwith
ESX
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
handling
of
the
vulnerability
the
client
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
a client.
vSphere
client- vCenter
malicious
server
VMware
interact
atothe
Client
orwith
ESX
ServervSphere
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
management
vulnerability
the
client
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
a client.
vSphere
client- interact
malicious
server
VMware
atothe
Client
orwith
ESX
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
this
protocol.
To
exploit
authentication
vulnerability
the
client
system.
corruption
code
execution
memory
issue
may
lead
to
authentication
Exploitation
of
the
side
as
a
client.
vSphere client- attacker
malicious
server
VMware
interact
ato on
Client
orwith
ESX
ServervSphere
vCenter
convince
either
must
vulnerabilityan
this
protocol.
To
exploit
The
ESX/ESXi
vulnerability
the
client
system.
corruption
code
execution
on
memory client- ServervSphere
issue
may
lead
to
authentication
Exploitation
of
side
as
a client.
vSphere
malicious
server
VMware
interact
atothe
Client
orwith
ESX
vCenter
convince
either
attacker
must
vulnerabilityan
this
userworld
libxml2
The
ESX/ESXi
vulnerability
the
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
aclient
client.
vSphere
client- interact
malicious
server
VMware
with
atothe
Client
or
ESX
ServervSphere
vCenter
convince
either
attacker
must
vulnerabilityan
library
has
been
userworld
libxml2
The
ESX/ESXi
VMware
vulnerability
the
client
system.
corruption
code
execution
memory
issue
may
lead
to
authentication
Exploitation
of
the
side
as
a client.
vSphere
client- convince
malicious
server
VMware
interact
with
ato on
Client
or
ESX
ServervSphere
vCenter
either
attacker
must
updated
to
resolve
library
has
been
userworld
libxml2
ESXWorkstationFu
The
ESX/ESXi
VMware
vulnerability
the
client
system.
corruption
code
execution
on
memory client- Client
issue
may
lead
to
authentication
Exploitation
of
side
as
a client.
vSphere
malicious
server
VMware
interact
with
atothe
or
ESX
ServervSphere
vCenter
convince
either
multiple
security
updated
to
resolve
library
has
been
sionand
View
userworld
libxml2
ESXWorkstationFu
The
ESX/ESXi
vulnerability
the
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
aclient
client.
vSphere
server
VMware client- malicious
interact
atothe
Client
or
ESX
ServervSphere
vCenter
issues.
Alsothe
multiple
security
updated
to
resolve
contain
awith
library
has
been
sionand
View
userworld
libxml2
The
ESX/ESXi
vulnerability
the
client
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
a service
client.
vSphere
client- ESX
malicious
server
VMware
interact
atothe
Client
or
ESX
ServervSphere
issues.
Alsothe
multiple
security
vulnerability
in
the
updated
to
resolve
contain
awith
library
has
been
userworld
libxml2
The
ESX/ESXi
vulnerability
the
client
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of
side
as
a service
client.
vSphere
client- Client
malicious
server
VMware
interact
with
atothe
or
ESX
console
libxml2
ESX
issues.
Alsothe
handling
of
control
multiple
security
vulnerability
in
the
updated
to
resolve
library
has
been
userworld
libxml2
The
ESX/ESXi
vulnerability
the
client
system.
corruption
code
execution
memory
issue
may
lead
to
authentication
Exploitation
of
the
side
as
a
client.
vSphere client- handling
malicious
server
VMware
interact
with
a on
packages
are
console
libxml2
ESX
service
code
inhas
vmci.sys.
issues.
Alsothe
of
control
multiple
security
updated
to
resolve
library
been
userworld
libxml2
vulnerability
the
client
system.
corruption
code
execution
on
memory client- A
issue
may
lead
to
authentication
Exploitation
of the
side
as
a service
client.
vSphere
malicious
server
updated
to
the
packages
console
libxml2
local
malicious
ESX
code
in
vmci.sys.
issues.
Alsothe
multiple
security
updated
toare
resolve
library
has
been
vulnerability
the
system.
corruption
code
execution
on
memory
issue
may
lead
to
authentication
Exploitation
of the
side
as
aclient
client.
following
versions:
updated
to
the
packages
are
user
may
exploit
console
libxml2
A
local
malicious
ESX
service
issues.
Alsothe
multiple
security
updated
to
resolve
vulnerability
the
client
system.
corruption
code
execution
memory
issue
may
lead
to
authentication
Exploitation
of
the
Update to
libxml2-2.6.26following
versions:
updated
to
the on
this
vulnerability
packages
are
user
may
exploit
console
libxml2
ESX
service
issues.
Alsothe
multiple
security
vulnerability
the
client
system.
corruption
code
execution
on
memoryto
issue
may
lead
to
ESX/ESXi
2.1.15.el5_8.5libx
Update
libxml2-2.6.26following
versions:
to
manipulate
updated
to
thethe
this
vulnerability
packages
are
console
libxml2
ESX
service
issues.
Alsothe
vulnerability
the
client
system.
corruption
code
execution
on
libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.5libx
Update
to
libxml2-2.6.26memory
allocation
following
versions:
to
manipulate
updated
to
thethe
packages
are
console
libxml2
ESX
service
vulnerability
the
client
system.
userworld
and
2.6.26libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.5libx
through
the
Virtual
Update
to
libxml2-2.6.26memory
allocation
following
versions:
updated
to
the
packages
are
console
libxml2
service
console
userworld
2.6.26libxml2
ml2-pythonMachine
ESX/ESXi
2.1.15.el5_8.5libx
through
the
Virtual
Update
to and 2.1.15.el5_8.5
libxml2-2.6.26following
versions:
updated
to
the
packages
are
The ESX service
service console
2.1.15.el5_8.5
userworld
2.6.26Communication
libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.5libx
Update
to and Machine
libxml2-2.6.26following
versions:
updated
to
the
console
The
ESXbind
service
service
console
2.1.15.el5_8.5
Interface
(VMCI)
userworld
2.6.26libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.5libx
Update
to and Communication
libxml2-2.6.26following
versions:
packages
are
console
The
ESXbind
service
This
could
service console
2.1.15.el5_8.5
Interface
(VMCI)
userworld
2.6.26libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.5libx
Update
to and code.
libxml2-2.6.26updated
to
the
packages
are
console
bind
The
ESX
service
result
in
a
This
could
service console
2.1.15.el5_8.5
userworld
and code.
2.6.26libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.5libx
following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
privilege
in a
service
2.1.15.el5_8.5
userworld
and result
2.6.26libxml2 console
ml2-pythonbind-libs-9.3.6following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
escalation
on
service console
2.1.15.el5_8.5
userworld
2.6.26Update
to and
ESX privilege
20.P1.el5_8.2bindbind-libs-9.3.6following
versions:
updated
to
the
packages
are
console
The
ESXbind
service
escalation
on
2.1.15.el5_8.5
service console
utils-9.3.6Update
to ESX Windows-based
20.P1.el5_8.2bindbind-libs-9.3.6following
versions:
updated
to
the
packages
are
console
bind
The
ESX
hosts
andservice
on
bind
packages
20.P1.el5_8.2
service
console
utils-9.3.6Update
to ESX Windows-based
20.P1.el5_8.2bindbind-libs-9.3.6following
versions:
updated
to
the
packages
are
console
bind
Windows-based
and on
bind packages
20.P1.el5_8.2
service
console
utils-9.3.6Update
to ESX hosts
20.P1.el5_8.2bindbind-libs-9.3.6following
versions:
updated
toare
the
packages
The
ESX
service
Guest
Operating
bind packages
20.P1.el5_8.2
service
console
utils-9.3.6Update
to ESX Windows-based
20.P1.el5_8.2bindbind-libs-9.3.6following
versions:
updated
to
the
console
libxslt
The
ESX
service
Systems.The
Guest
Operating
bind packages
20.P1.el5_8.2
service
console
utils-9.3.6Update
to ESX console
20.P1.el5_8.2bindbind-libs-9.3.6following
versions:
package
is
libxslt
The
ESX service
vulnerability
does
Systems.The
bind packages
20.P1.el5_8.2
service
console
utils-9.3.6Update
to ESX bind-libs-9.3.620.P1.el5_8.2bindupdated
to
version
package
is
console
libxslt
The
ESX
service
not allow for does
vulnerability
bind
packages
20.P1.el5_8.2
service
console
Update
to ESX utils-9.3.620.P1.el5_8.2bindlibxslt-1.1.17updated
to
package
isforversion
console
The
ESXlibxslt
service
privilege
not
allow
bind packages
20.P1.el5_8.2
service
console
utils-9.3.6Update
to ESX package
4.el5_8.3
libxslt-1.1.17updated
to
version
istofrom
console
The
ESXlibxslt
service
escalation
privilege
bind packages
20.P1.el5_8.2
service
console
resolve
multiple
Update
to ESX libxslt-1.1.174.el5_8.3
to
updated
to
version
package
is from
console
The
ESXlibxslt
service
the
Guest
escalation
libxslt
issues.
servicepackage
console
resolve
multiple
Update
to ESX security
4.el5_8.3
to
libxslt-1.1.17updated
to
version
package
is
console
libxslt
The
ESX
service
Operating
the
Guest System
libxslt package
security
issues.
service
console
resolve
multiple
Update
to ESX updated
4.el5_8.3
to
libxslt-1.1.17to
version
package
isSystem
console
libxslt
to
the host
(and
Operating
libxslt package
security
issues.
service
console
resolve
multiple
Update
to ESX 4.el5_8.3
to
libxslt-1.1.17updated
to
version
package
is (and
vice
versa).
This
to
the
host
libxslt package
security
issues.
service
console
resolve
multiple
Update
to ESX vice
4.el5_8.3
toversion
libxslt-1.1.17updated
to
means
that
host
versa).
This
libxslt package
security
issues.
service
console
resolve
multiple
Update
to ESX libxslt-1.1.174.el5_8.3
to
memory
canhost
not
means
that
libxslt
security
issues.
service
console
multiple
Updatepackage
to ESX resolve
4.el5_8.3
to not
be
manipulated
memory
can
libxslt package
security
issues.
service
console
resolve
VMware
VMCI be
from
themultiple
Guest
manipulated
libxslt package
security
privilege
Operating
System
VMware
VMCI from
theissues.
Guest
escalation
(and
vice
versa).
privilege
Operating System
escalation
(and vice versa).

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0002
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0003
VMSA-2013-0004
VMSA-2013-0004
VMSA-2013-0004
VMSA-2013-0004

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
Systems.The
Guest
Operating
Windows-based
ESX
contain
adoes
ServerESXi
and
VMware
vCenter
memory
can
not
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
does
Systems.The
Guest
Operating
vulnerability
the
ESX
contain
ain
ServerESXi
and
VMware
vCenter
be
manipulated
memory
can
not
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Systems.The
handling
of and
the
ESX
contain
ain the
ServerESXi
vCenter
VMware VMCI VMware
from
the
Guest
be
manipulated
memory
can
not
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
does
Network
File
Copy
handling
of
the
vulnerability
in
the
ESX
contain
a
ServerESXi
and
VMware
vCenter
privilegeVMCI from
Operating
System
VMware
the
Guest
be
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
(NFC)
protocol.
Network
File
Copy
handling
of
the
vulnerability
in
ESX
contain
a the
ServerESXi
and
vCenter
escalation
(and
vice
versa).
privilegeVMCI VMware
Operating
System
VMware
from
the
Guest
be
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
privilege
exploit
this
(NFC)
protocol.
Network
File
handling
of
the
vulnerability
in the
ESX
contain
aCopy
ServerESXi
and
vCenter
escalation
(and
vice
versa).
privilege
Operating
System
VMware
VMCI VMware
from
the
Guest
be
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
the
Guest
escalation
from
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
Copy
handling
of
the
vulnerability
in
the
ESX
contain
a
ServerESXi
and
VMware
vCenter
escalation
(and
vice
versa).
privilege
Operating
System
VMware VMCI Operating
from
the
Guest
be
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
to
the
host
(and
System
the
Guest
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
Copy
handling
of
the
vulnerability
ESX
contain
ain the
ServerESXi
and
vCenter
escalation
(and
vice
versa).
privilege
Operating
System
VMware
VMCI VMware
from
the
Guest
be
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
to
the
host
(and
Operating
System
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
handling
of
the
vulnerability
in the
ESX
contain
aCopy
ServerESXi
and
VMware
vCenter
escalation
(and
vice
versa).
privilege
Operating
System
VMware
VMCI be
from
the
Guest
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
to
the
host
(and
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
handling
of
the
in the
ESX
contain
aCopy
ServerESXi
and
VMware
vCenter
escalation
(and
vice
versa).
privilegeVMCI vulnerability
Operating
System
VMware
from
the
Guest
be
manipulated
memory
can
notTo
means
that
host
vice
versa).
This
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
handling
of
the
vulnerability
in the
ESX
contain
aCopy
ServerESXi
and
VMware
vCenter
escalation
(and
vice
versa).
privilege
Operating
System
VMware
VMCI
from
the
Guest
be
manipulated
memory
can
notTo
means
that
host
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
Copy
handling
of
the
vulnerability
in the
ESX
contain
a
ServerESXi
and
escalation
(and
vice
versa).
privilege
Operating
System
VMware
VMCI
from
the
Guest
be
manipulated
memory
can
not
vCenterESXi
and
the
client
orTo
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
handling
of
the
vulnerability
in the
ESX
contain
aCopy
escalation
vice
versa).
privilege
Operating
System
VMware
from
the
Guest
be
manipulated
and
ESX VMCI
NFC (and
ESXi/ESX
and
the
vCenterESXi
and
the
client
orTo
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
Copy
handling
of
the
vulnerability
in the
escalation
(and
vice
versa).
privilege
Operating
System
VMware
VMCI
from
the
Guest
protocol
client.
Exploitation
and
ESX
NFC
ESXi/ESX
and
the
vCenterESXi
and
the
client
orTo
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
Copy
handling
of
the
escalation
(and
vice
versa).
privilege
System
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX NFC Operating
ESXi/ESX
and
the
vCenterESXi
and
the
client
orTo
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
andCopy
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
Network
File
escalation
(and
vice
versa).
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX NFC vCenter
ESXi/ESX
and
the
vCenterESXi
and
the
client
VMware
Server
traffic
between
modify
the
NFCorTo
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC) protocol.
vulnerability
execution.
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and ESX NFC attacker
ESXi/ESX
and
the
vCenterESXi
and
the
client
or
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
and
must
vulnerabilityan
exploit
this
vulnerability
execution.
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX NFC traffic
ESXi/ESX
and
the
vCenterESXi
and
the
client
VMware
vCenter
Server
between
modify the
NFCor
intercept
and
attacker
must
vulnerabilityan
vulnerability
execution.
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX
NFC
ESXi/ESX
and
the
vCenterESXi
and
the
client
or
VMware
vCenter
Server
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerability
execution.
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX NFC intercept
ESXi/ESX
and
the
vCenterESXi
and
the
client
or
VMware
vCenter
Server
traffic
between
modify
the
NFC
and
vulnerability
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX NFC execution.
ESXi/ESX
and
the
vCenterESXi
and
the
client
VMware
vCenter
Server
traffic
between
modify the NFCor
vulnerability
execution.
corruption
lead
tobetween
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX
NFC
ESXi/ESX
and
the
vCenterESXi
and
the
client
or
VMware
vCenter
Server
traffic
vulnerability
execution.
corruption
lead
to
code
memory
of the
issue
may
protocol
client.
Exploitation
and
ESX NFC Oracle
ESXi/ESX
and
the
vCenterESXi
and
the
client
or is
VMware
vCenter
Server
(Sun)
JRE
vulnerability
execution.
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and
ESX NFC updated
ESXi/ESX
and
the
vCenterESXi
and
the
client
or is
to
version
Oracle (Sun) JRE
vulnerability
execution.
corruption
lead
to
code
memory
of
the
issue
may
protocol
client.
Exploitation
and ESX NFC Oracle
ESXi/ESX
and
theis
1.5.0_38which
updated
to
version
(Sun)
JRE
vulnerability
execution.
corruption
lead
code
memory
of thetoissue
may
protocol
client.
Exploitation
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
(Sun)
JRE is
vulnerability
execution.
corruption
lead
code
memory
of
thetoissue
may
SX
and ESXi
security
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
(Sun)
JRE is
vulnerability
execution.
corruption
lead
to
code
Oracle
(Sun)
that
existed
in
SX and ESXi
security(Sun)
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
JRE is
vulnerability
execution.
JREand
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
ESXi
security
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
and
ESXi
security
issues
VirtualCenterE
addresses
multiple
1.5.0_38which
updated
to version
Oracle
(Sun)
JREofis
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX and ESXi
security(Sun)
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
JREofis
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
and
ESXi
security
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
and
ESXi
security
issues
VirtualCenterE Oracle
addresses
1.5.0_38which
updated
tomultiple
version
(Sun)
JREofis
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
Oracle
that existed
in
SX
and (Sun)
ESXi
security
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
and
ESXi
security
issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.5.0_38
Oracle
(Sun)
JRE.of
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX and ESXi
security issues
VirtualCenterE
addresses
1.5.0_38which
updated
tomultiple
version
The
ESX/ESXi
1.5.0_38
Oracle
(Sun)
JRE.of
JREand
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
ESXi
security
issues
VirtualCenterE
addresses
multiple
1.5.0_38which
The
service
userworld
libxml2
The
ESX/ESXi
1.5.0_38
Oracle
(Sun)
JRE.of
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX
and
ESXi
security
issues
VirtualCenterE
addresses
multiple
console
OpenSSL
The
service
library
has
been
userworld
libxml2
The
ESX/ESXi
1.5.0_38
Oracle
(Sun)
JRE.of
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
SX and ESXi
security
issues
RPM
is has
updated
to
console
OpenSSL
The
service
updated
tolibxml2
resolve
library
been
userworld
The
ESX/ESXi
1.5.0_38
Oracle
(Sun)
JRE.of
JRE
update
earlier
releases
Oracle
(Sun)
that
existed
in
version
opensslRPM
is
updated
to
console
OpenSSL
The
service
a
security
updated
toissue.
resolve
library
has
been
userworld
libxml2
1.5.0_38
Oracle
(Sun)
JRE.
JRE
update
earlier
releases
of
Update
to ESX version
0.9.7a.33.28.i686
opensslRPM
is has
updated
to
console
OpenSSL
The
service
Alsothe
ESX
a security
updated
toissue.
resolve
library
been
1.5.0_38
Oracle
(Sun)
JRE.
service
resolve
multiple
Update console
to ESX to
0.9.7a.33.28.i686
version
opensslRPM
is
updated
to
console
OpenSSL
The
service
service
console
Alsothe
ESX
a
security
updated
toissue.
resolve
OpenSSL
security
issues
service
console
to
resolve
multiple
Update
toRPM
ESX console
0.9.7a.33.28.i686
version
opensslRPM
is
updated
OpenSSL
The
service
libxml2
packages
service
console
Alsothe
ESX
a
security
issue.to
OpenSSL
security
issues
service
console
to
resolve
multiple
Update
toRPM
ESX version
0.9.7a.33.28.i686
opensslRPM
is updated
to
console
OpenSSL
The
service
are
updated
to the
libxml2
packages
service
console
Alsothe
ESX
OpenSSL
RPM
security
issues
service console
to
resolve
multiple
Update
to ESX are
0.9.7a.33.28.i686
version
opensslRPM
is
updated
to
console
OpenSSL
following
updated
to
the
libxml2 console
packages
service
OpenSSL
security
issues
service
console
to
resolve
multiple
Update
toRPM
ESX RPM
0.9.7a.33.28.i686
version
opensslis
updated
to
versions:libxml2following
are
updated
to the
libxml2
packages
OpenSSL
security
issues
service
console
to
resolve
multiple
Update
toRPM
ESX 0.9.7a.33.28.i686
version
openssl2.6.26versions:libxml2following
are
updated
to the
OpenSSL
security
issues
service
console
to
resolve
multiple
ESX following
0.9.7a.33.28.i686
ESX/ESXi
2.1.15.el5_8.6libx
Update
toRPM
2.6.26versions:libxml2OpenSSL
security
issues
service
to
resolve
multiple
libxml2
ml2-pythonESX/ESXi
Update console
toRPM 2.1.15.el5_8.6libx
2.6.26versions:libxml2OpenSSL
RPM
security
issues
userworld
and
2.6.26libxml2 to
ml2-pythonESX/ESXi
2.1.15.el5_8.6libx
Update
service console
2.1.15.el5_8.6
userworld
and 2.1.15.el5_8.6libx
2.6.26libxml2
ml2-pythonESX/ESXi
service console
2.1.15.el5_8.6
userworld
and ml2-python2.6.26libxml2
service
console
userworld and 2.1.15.el5_8.6
2.6.26service console 2.1.15.el5_8.6

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2013-0004
VMSA-2013-0004
VMSA-2013-0005
VMSA-2013-0005
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0006
VMSA-2013-0007
VMSA-2013-0007
VMSA-2013-0007
VMSA-2013-0007
VMSA-2013-0007
VMSA-2013-0007
VMSA-2013-0008
VMSA-2013-0008

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

following
VMware
vFabric
possibility
toto an
removing
the
Update
1Server
by
vCenter
5.1
attackerfiles
with
authenticated
upload
remote
attacker
to
Update to
2.6.26versions:libxml2Postgres
has
been
VMware
vFabric
authenticate
using
possibility
to
removing
the
Update to
1with
byto an
access
attacker
arbitrary
location
upload
files
ESX/ESXi
2.1.15.el5_8.6libx
Update
to
2.6.26updated
to
resolve
Postgres
has
been
blank
passwords.
authenticate
using
possibility
to
removing
Virtual
Appliance
access
tonew
the
creating
files
arbitrary
location
libxml2
ml2-pythonESX/ESXi
2.1.15.el5_8.6libx
VMware
several
security
updated
to
resolve
This
change
in
the
blank
passwords.
authenticate
using
possibility
to
Management
Virtual
Appliance
or overwriting
creating
new files
userworld
and ml2-python2.6.26libxml2
vFabric
issues
that
were
VMware
several
security
authentication
This
change
in
blank
passwords.
authenticate
using
Interface
(VAMI)
Management
existing
files. the
or
overwriting
service
console
userworld
and 2.1.15.el5_8.6
2.6.26Postgres
found
to
be
vFabric
issues
that
were
vCenter
Server
mechanism
is
authentication
This
change
in the
blankrun
passwords.
may
an
Interface
(VAMI)
Replacing
certain
existing
files.
service
console
2.1.15.el5_8.6
security
in
Postgres
found
to
be
AD
anonymous
present
regardless
vCenter
Server mechanism
is
authentication
This
change
in the
existing
as
may
run file
an
files
may
result
in
Replacing
certain
vulnerabilities
Postgres.
security
in
LDAP
binding
if
anonymous
AD
anonymous
regardless
vCenter
Server present
mechanism
is
authentication
root.
In
the
default
existing
file
as
a
denial
of
service
files may result in
vulnerabilities
Postgres.
credential
by- root.
binding
is
enabled
LDAP
binding
if
anonymous
AD
anonymous
present
regardless
vCenter
Server
mechanism
is
vCSA
In the
default
condition
code
a
denial
ofor
service
pass
or
not
credential
by- present
binding
is
enabled
LDAP
binding
if
anonymous
AD
anonymous
regardless
setupauthenticatio
vCSA
execution.
the
condition
orIncode
pass
not
credential
by- or
binding
is enabled
LDAP
binding
if
anonymous
vCenter
Server
n
to
vCSA
is
setupauthenticatio
default
vCSA
execution.
In JRE
the is
Oracle
(Sun)
pass
or
not
credential
by- default
binding
is
enabled
Appliance
limited
to
root
vCenter
Server
n
to
vCSA
is
setupauthenticatio
vCSA
updated
to version
Oracle
(Sun)
JRE is
pass
or
not
arbitrary
file
since
root
isversion
the
Appliance
limited
totoroot
vCenter Server
n to
vCSA
setupauthenticatio
1.6.0_37which
updated
Oracle
(Sun)
JRE is
execution
only
defined
user.
arbitraryServer
file
since
root
the
Appliance
limited
to
root
vCenter
n
to
vCSA
is
vCenterUpdate
addresses
multiple
1.6.0_37which
updated
to
version
Oracle (Sun) JRE is
executionfile
only
defined
user.
arbitrary
since
root
is
the
Appliance
limited
toissues
ManagerOracle
security
vCenterUpdate
addresses
multiple
1.6.0_37which
updated
toroot
version
Oracle
(Sun)
JRE is
upload
only
defined
user.
arbitrary
file
since
root
is
the
(Sun) JRE
that existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JRE is
uploadJRE
only
defined
user.
update
earlier
releases
(Sun)
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
multiple
1.6.0_37which
updated
to
version
Oracle (Sun) JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
issues
vCenterUpdate security
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun) JRE
that existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle Oracle
security(Sun)
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
multiple
1.6.0_37which
updated
to version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun) JRE
that existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
1.6.0_37which
updated
tomultiple
version
Oracle
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate Oracle
addresses
1.6.0_37which
updated
tomultiple
version
(Sun)
JREofis
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
ofis
(Sun) JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
multiple
1.6.0_37which
updated
to
version
Oracle
(Sun)
JRE
tc-server
has
been
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
of
(Sun)
JRE
that
existed
in
ManagerOracle
security
issues
vCenterUpdate
addresses
multiple
1.6.0_37which
updated
to
version
tc-server
has
been
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
of
(Sun)
JRE
that
existed
in
ManagerOracle tc-server
security
issues
vCenterUpdate
addresses
multiple
1.6.0_37which
2.8.1
to address
updated
to
version
has
been
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
of
(Sun)
JRE
that
existed
inbeen
ManagerOracle
security
issues
vCenterUpdate
addresses
multiple
multiple
security
2.8.1
toreleases
address
updated
to
version
tc-server
has
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
of
(Sun)
JREServer issues.
that
existed
in
ManagerOracle
security
issues
vCenter
This
multiple
security
2.8.1
to address
updated
to
version
tc-server
has
been
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
of
(Sun)
JRE
that
existed
in
tc-serverServer tc-server
version
of
tcvCenter
issues.
multiple
security
2.8.1
toThis
address
updated
to
version
has
been
1.6.0_37
Oracle
(Sun)
JRE.
update
earlier
releases
of
2.8.1
/ Apache
server
tc-server
version
of
tcvCenter
Server 2.8.1
issues.
This
multiple
security
toincludes
address
updated
to
version
tc-server
has
been
1.6.0_37
Oracle
(Sun)
JRE.
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/
Apache
server
includes
tc-server
version
of
tcvCenter Server tc-server
issues.
multiple
security
2.8.1
toThis
address
updated
to
version
has
been
update
6.0.36
Tomcat
6.0.36
Tomcat
2.8.1 / Apache
servertoincludes
tc-server
version
of
tcvCenter
Server Apache
issues.
This
multiple
security
2.8.1
address
updated
to
version
tc-server
has
been
update
6.0.36
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/ Apache
server
includes
tc-server
version
of
tcvCenter
Server multiple
issues.
This
security
2.8.1 to address
updated
to
version
tc-server
has
been
update
6.0.36
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/ Apache
tc-server
version
of
tcvCenter
Server server
issues.
This
multiple
security
2.8.1
toincludes
address
updated
to
version
tc-server
has
been
update
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/ Apache
server
includes
tc-server
version
of
tcvCenter
Server 6.0.36
issues.
This
multiple
security
2.8.1
to
address
updated
to
version
tc-server has been
update
6.0.36
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/ Apache
server
tc-server
version
of
tcvCenter
Server issues.
This
multiple
security
2.8.1
toincludes
address
updated
to
version
tc-server
has
been
update
6.0.36
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/
Apache
server
includes
tc-serverServer updated
version
of
vCenter
issues.
multiple
security
2.8.1
toThis
address
totcversion
update
6.0.36toincludes
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/ Apache
server
tc-server
version
of
tcvCenter
Server 2.8.1
issues.
This
multiple
security
address
update
6.0.36
Tomcat
6.0.36
Apache
Tomcat
2.8.1
/
Apache
server
includes
tc-server
version
of
tcvCenter Server multiple
issues.
This
security
The vCenter
update
6.0.36
Tomcat
6.0.36
Apache
Tomcat
2.8.1 / Apache
server
includes
tc-server
version
of tcvCenter
Server issues.
This
Chargeback
The
vCenter
update
6.0.36
Tomcat
6.0.36 The
Apache
Tomcat
2.8.1
/ Apache
server
includes
tc-server
version
tcservice
Managerof
(CBM)
Chargeback
update
6.0.36
Tomcat
6.0.36 console
Apache
Tomcat
2.8.1
/ Apache
server
includes
Service
package
The
service
contains
a(CBM)
flaw in
Manager
update
Tomcat 6.0.36 6.0.36
Apache
Tomcat
Console
sudo
is
updated
Service
console
package
The
service
its handling
of file
contains
a flaw
into
6.0.36
update for
version
1.7.2p1Console
sudo
is
updated
to
Service
console
package
The
service
uploads.
its
handling of file
sudo
14.el5_8.3
update
for
version
1.7.2p1Console
sudo
is
updated
to
Service
console
package
The
service
Exploitation
of this
uploads.
sudo for
14.el5_8.3
update
version
1.7.2p1Console
sudo
is
updated
to
Service
console
package
The
service
issue
may
allow
Exploitation
of this
sudo
14.el5_8.3
update
for
version
1.7.2p1Console
sudo
is
updated
Service
console
package
vCenter
an
issue
may allow to
sudo
14.el5_8.3
update
for
version
1.7.2p1- to
Console
sudo is updated
Chargeback
unauthenticated
vCenter
an
sudo for
14.el5_8.3
update
version
1.7.2p1Manager
attacker
to
Chargeback
unauthenticated
sudo
14.el5_8.3
Remote
Code attacker
execute
code
Manager
to
Execution
remotely.
Remote Code execute code
Execution
remotely.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0009
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0010
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0011
VMSA-2013-0012

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

and ESX Server


vCenter
userworld
and
ESX Server
vCenter
update
userworld
and
ESXfor
vCenter
Server
OpenSSL
update
for
userworld
and
ESX Server
vCenter
library
OpenSSL
update
userworld
and
ESXfor
vCenter
Server
library
OpenSSL
update
for
userworld
and
ESX
vCenter Server
library
OpenSSL
update
userworld
and
ESXfor
vCenter
Server
library
OpenSSL
update
userworld
and
ESXfor
vCenter
Server
library
OpenSSL
update
for
userworld
and ESX Server
vCenter
library
OpenSSL
update
userworld
and
ESXfor
library
OpenSSL
update
for
userworld
ESX
Userworld
library
OpenSSL
update
for
and Service
ESX
Userworld
library
OpenSSL
Console
(COS)
and
Service
ESX
Userworld
library
update
for
Console
(COS)
and
Service
ESX
Userworld
libxml2
library
update
for
Console
(COS)
and
Service
ESX
Userworld
libxml2
library
update
for
Console
(COS)
and
Service
ESX
Userworld
libxml2
library
update
for
Console
(COS)
and
Service
libxml2
library
update
for
Console (COS)
Service
libxml2 for
library
update
Console
(COS)
Service
libxml2
library
update
for
Console
Service (COS)
GnuTLS
library
update for
Console
(COS)
Service
GnuTLSfor
library
update
Console
(COS)
Service
GnuTLS
library
update
for
Console (COS)
Service
GnuTLS
library
update
for
Console
(COS)
ESX
third
party
GnuTLS
library
update
for
ESX
third
party
GnuTLS
library
Service
update
forparty
ESX
third
Console
kernel
Service
update
for
ESX
third
party
Console
kernel
Service
update
for
ESX third party
Console
kernel
Service
update
for
ESX
third
party
Consolefor
kernel
Service
update
Console kernel
Service
VMware
mount
Console kernel
privilege
VMware
mount
escalation
privilege
VMware
mount
escalation
privilege
VMware mount
escalation
privilege
VMware
mount
escalation
privilege
VMware
mount
escalation
privilegemount
VMware
escalation
privilege
VMware
mount
escalation
privilege
VMware
mount
escalation
privilege
mount
VMware
ESXi
escalation
privilege
VMware
and
ESX mount
NFC
ESXi
escalation
privilege
Protocol
and
ESX ESXi
NFC
VMware
escalation
Unhandled
Protocol
and
ESX ESXi
NFC
VMware
Exception
Unhandled
Protocol
and
ESX
NFC
VMware ESXi
Exception
Unhandled
Protocol
and
ESX ESXi
NFC
VMware
Exception
Unhandled
Protocol
and
ESX ESXi
NFC
VMware
Exception
Unhandled
Protocol
and ESX ESXi
NFC
VMware
Exception
Unhandled
Protocol
and
ESX ESXi
NFC
VMware
Exception
Unhandled
Protocol
and
ESX
NFC
VMware ESXi
Exception
Unhandled
Protocol
and
ESX ESXi
NFC
VMware
Exception
Unhandled
Protocol
and
ESX
Exception
Unhandled
contain
a
Exception
vulnerability in
hostd-vmdb.

OpenSSL
library is
The
userworld
updated
to
version
OpenSSL
is
The
userworld
VMware library
openssl-0.9.8y
to
updated
to
version
OpenSSL
library
The
userworld
Workstation and is
VMware
resolve
multiple
openssl-0.9.8y
updated
to
version
OpenSSL
library
The
Player
contain
atois
Workstation
and
VMware
The userworld
ESX
Userworld
security
issues.
resolve
multiple
openssl-0.9.8y
updated
to
version
OpenSSL
library
is
The
vulnerability
inato
the
Player
contain
Workstation
and
VMware
and userworld
Service
The
ESX
Userworld
security
issues.
resolve
multiple
openssl-0.9.8y
to
updated
to
version
OpenSSL
library
is
The ESX
userworld
handling
of the
vulnerability
inathe
Player
contain
Workstation
and
Console
libxml2
VMware
and
Service
The
Userworld
security
issues.
resolve
multiple
openssl-0.9.8y
updated
to
version
OpenSSL
library
is
vmware-mount
The
userworld
handling
of
the
vulnerability
inato
the
Player
contain
library
islibxml2
updated
Workstation
and
Console
VMware
and
Service
The
ESX
Userworld
security
issues.
resolve
multiple
openssl-0.9.8y
to
updated
to
version
command.
A
local
OpenSSL
library
is
vmware-mount
The
userworld
handling
of
the
vulnerability
inathe
to version
Player
contain
library
islibxml2
updated
Workstation
and
Console
VMware
and
Service
The
ESX
Userworld
security
issues.
resolve
multiple
openssl-0.9.8y
to
malicious
user
updated
to
version
command.
A
local
OpenSSL
library
is
vmware-mount
The
userworld
handling
of
the
libxml2-2.6.26vulnerability
inathe
to
version
Player
contain
library
islibxml2
updated
Workstation
and
Console
VMware
and
Service
The
ESX
Userworld
security
issues.
resolve
multiple
may
exploit
this
openssl-0.9.8y
to
malicious
user
updated
to
version
command.
A
local
OpenSSL
library
vmware-mount
2.1.21.el5_9.1
and
handling
of
the
libxml2-2.6.26vulnerability
in
the
to
version
Player
contain
a
library
islibxml2
updated
Workstation
and is
Console
VMware
and
Service
security
issues.
vulnerability
to
resolve
multiple
may
exploit
this
openssl-0.9.8y
malicious
user
updated
to
version
command.
A
local
libxml2-pythonvmware-mount
2.1.21.el5_9.1
and
handling
of the
libxml2-2.6.26vulnerability
in
the
to
version
Player
contain
ato
library
islibxml2
updated
Workstation
and
Console
VMware
escalate
their
security
issues.
vulnerability
to
resolve
multiple
may
exploit
this
openssl-0.9.8y
malicious
user
2.6.26command.
local
libxml2-pythonvmware-mount
2.1.21.el5_9.1
and
handling
ofAthe
libxml2-2.6.26vulnerability
in
the
to
version
Player
contain
ato
library
is updated
Workstation
and
VMware
privileges
to
root
escalate
their
security
issues.
vulnerability
to
resolve
multiple
may
exploit
this
2.1.21.el5_9.1.
to
malicious
user
2.6.26command.
A
local
libxml2-pythonvmware-mount
2.1.21.el5_9.1
and
handling
of
the
libxml2-2.6.26vulnerability
in
to version
Player
contain
athe
Workstation
and
on
the
host
OS.
privileges
to
root
escalate
their
security
issues.
vulnerability
to
resolve
a
security
may
exploit
this
2.1.21.el5_9.1.
malicious
user
2.6.26command.
A
local
libxml2-pythonvmware-mount
2.1.21.el5_9.1
handling
of the
libxml2-2.6.26vulnerability
inand
the
Player
contain
ato
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
vulnerability
to
resolve
a
security
may
exploit
this
2.1.21.el5_9.1.
to
malicious
user
2.6.26command.
Athe
local
libxml2-pythonvmware-mount
2.1.21.el5_9.1
and
handling
of
The
ESX service
vulnerability
in
the
present
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
vulnerability
to
resolve
awhen
security
may
exploit
this
2.1.21.el5_9.1.
to
malicious
user
2.6.26command.
Athe
local
libxml2-pythonvmware-mount
console
GnuTLS
handling
of
The
ESX
service
Workstation
or
present
The
issue
is
on
the
host
privileges
to
root
escalate
their
issue.
vulnerability
to
resolve
awhen
security
may
exploit
this
2.1.21.el5_9.1.
to
malicious
user
2.6.26command.
AOS.
local
RPM
is
updated
to
vmware-mount
console
GnuTLS
The
ESX
service
Player
are
Workstation
or
present
when
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
vulnerability
to
resolve
a
security
may
exploit
2.1.21.el5_9.1.
to
malicious
user
version
gnutlscommand.
Athis
local
RPM
is
updated
to
console
GnuTLS
The
ESX
service
installed
on
a
Player
are
Workstation
or
present
when
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
vulnerability
to
resolve
a
security
may
exploit
this
1.4.1-10.el5_9.1
to
malicious
user
version
gnutlsRPM
is
updated
to
console
GnuTLS
service
The
ESX
Service
Debian-based
installed
on
a
Player
are
Workstation
or
present
when
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
vulnerability
to
resolve
a
security
may
exploit
this
1.4.1-10.el5_9.1
to
version
gnutlsRPM
is updated
to
console
GnuTLS
service
Console
Operating
The
ESX
Service
version
of
Linux.
Debian-based
installed
on
a
Player
are
Workstation
or
present
when
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
vulnerability
to to
resolve
a
security
1.4.1-10.el5_9.1
to
version
gnutlsRPM
is updated
console
GnuTLS
System
(COS)
Console
Operating
The
ESX
Service
The
vulnerability
version
of
Linux.
Debian-based
installed
on
aor
Player
are
Workstation
present
when
The
issue
is
on
the
host
OS.
privileges
to
root
escalate
their
issue.
resolve
a
security
1.4.1-10.el5_9.1
to
version
gnutlsRPM
is
updated
to
kernel
isof
updated
System
(COS)
Console
Operating
The
ESX
Service
does
not
allow
for
The
vulnerability
version
Linux.
Debian-based
installed
on
aor
Player
are
Workstation
present
when
The
issue
is
on
the
host
OS.
privileges
to
root
issue.
resolve
a
security
1.4.1-10.el5_9.1
to
version
to
kernel-2.6.18kernel
isgnutlsupdated
System
(COS)
Console
Operating
The
ESX
Service
privilege
does
not
allow
The
vulnerability
version
of
Linux.
Debian-based
installed
on
aor for
Player
are
Workstation
present
when
The
issue
is
on
the
host
OS.
issue.
resolve
a
security
1.4.1-10.el5_9.1
to
348.3.1.el5
which
to
kernel-2.6.18kernel
is
updated
System
(COS)
Console
Operating
The
ESX
Service
escalation
from
privilege
does
not
allow
The
vulnerability
version
of
Linux.
Debian-based
installed
on
aor for
Player
are
Workstation
present
when
The
issue
is
issue.
resolve
a
security
addresses
several
348.3.1.el5
which
to
kernel-2.6.18kernel
isof
updated
System
(COS)
Console
Operating
the
Guest
escalation
from
privilege
does
not
allow
The
vulnerability
version
Linux.
Debian-based
installed
on
aor for
Player
are
Workstation
present
when
issue.
security
issues
in
addresses
several
348.3.1.el5
which
to
kernel-2.6.18kernel
is
updated
System
(COS)
Operating
System
the
Guest
escalation
from
privilege
does
not
allow
for
The
vulnerability
version
of
Linux.
Debian-based
installed
on
a
Player
are
Workstation
or
the
COS
kernel.
security
issues
in
addresses
several
348.3.1.el5
which
to
kernel-2.6.18kernel
isof
updated
the
host
or
viceOperating
System
the
Guest
escalation
from
privilege
does
not
allow
for
The
vulnerability
version
Linux.
Debian-based
installed
on
a and
Player
are
VMware
ESXi
the
COS
kernel.
security
issues
in
addresses
several
348.3.1.el5
which
kernel-2.6.18versa.
This
means
to
the
host
or
viceOperating
System
the
Guest
escalation
from
privilege
does
not
allow
for
The
vulnerability
version
of
Linux.
Debian-based
installed
on
a
ESX
contain
a
VMware
ESXi
and
the
COS
kernel.
security
issues
in
addresses
several
348.3.1.el5
which
that
host
memory
versa.
This
means
to
the
host
or
viceOperating
System
the
Guest
escalation
from
privilege
does
not
allow
for
The
vulnerability
version
of
Linux.
Debian-based
vulnerability
the
ESX
contain
ain
VMware
ESXi
and
the
COS
kernel.
security
issues
in
addresses
several
can
not
be
that
host
memory
versa.
This
means
to
the
host
orinviceOperating
System
the
Guest
escalation
from
privilege
does
not
allow
for
The
vulnerability
version
of
Linux.
handling
of
vulnerability
the
ESX
contain
a
VMware
ESXi
and
the
COS
kernel.
security
issues
in
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the
host
orCopy
viceOperating
System
the
Guest
escalation
from
privilege
does
not
allow
for
The
vulnerability
Network
File
handling
of
vulnerability
in
the
ESX
contain
afrom
VMware
ESXi
and
COS
kernel.
the
Guest
manipulated
can
not
be
that
host
memory
versa.
This
means
to
the
host
or
viceOperating
System
the
Guest
escalation
from
privilege
does
not
allow
for
(NFC)
protocol.
To
Network
File
Copy
handling
ofSystem.
vulnerability
the
ESX
contain
ain
VMware
ESXi
and
Operating
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the
host
or
viceOperating
System
the
Guest
escalation
from
privilege
exploit
this
(NFC)
protocol.
To
Network
File
handling
ofSystem.
vulnerability
in
the
ESX
contain
aCopy
VMware
ESXi
and
Operating
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the
host
or
viceOperating
System
the
Guest
escalation
from
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Network
File
Copy
handling
of
the
vulnerability
ESX
contain
ain
VMware
ESXi
and
Operating
System.
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the
host
or
viceOperating
System
the
Guest
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Network
File
handling
ofSystem.
vulnerability
in
the
ESX
contain
aCopy
VMware
ESXi
and
Operating
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the
host
orCopy
viceOperating
System
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Network
File
handling
of
vulnerability
in
the
ESX
contain
a
VMware
ESXi
and
Operating
System.
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the
host
or
vicemodify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Network
File
Copy
handling
ofSystem.
vulnerability
the
ESX
contain
ain
Operating
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC) protocol.
To
Network
File
Copy
handling
ofSystem.
vulnerability
in the
Operating
the
Guest
manipulated
from
can
not
be
that
host
memory
ESXi/ESX
the
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Network
File
Copy
handling
of
the
Operating
System.
the
Guest
manipulated
from
can
not
be
client.
ESXi/ESX
and
the
traffic
between
modify
the
NFC
intercept
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Network
File
Copy
Operating
System.
the
Guest
manipulated
from
Exploitation
of
the
client.
ESXi/ESX
the
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
protocol.
To
Operating
System.
the
Guest
issue
may
Exploitation
oflead
the
client.
ESXi/ESX
the
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
Operating
System.
to
aissue
Denial
ofoflead
may
Exploitation
the
client.
ESXi/ESX
and
the
traffic
between
modify
the
NFC
intercept
attacker
must
vulnerabilityan
To
exploit
this
Service.
to
a
Denial
of
issue
may
lead
Exploitation
of
the
client.
ESXi/ESX
the
traffic between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
Service.
to
aissue
Denial
ofoflead
may
Exploitation
the
client.
ESXi/ESX
and
the
traffic
between
modify
the
NFC
intercept
attacker
must
Service.
to
a
Denial
of
issue
may
lead
Exploitation
of
the
client.
ESXi/ESX
the
traffic between
modify
the
NFC
intercept
and
Service.
to
a
Denial
of
issue
may
lead
Exploitation
the
client.
ESXi/ESX
andofthe
traffic between
modify
the
Service.
to
aissue
Denial
ofoflead
may
Exploitation
the
client.
ESXi/ESX
and
the
management
Service.
to
a
Denial
of
issue
may
lead
Exploitation
of
the
client. Exploitation
traffic.
Service.
to
a
Denial
of
issue
may
Exploitation
oflead
the
of
the
issue
may
Service.
to
aissue
Denial
of lead
lead
to a may
Denial
of
Service.
to
a Denial
of
Service
of the
Service.
hostd-vmdb
service.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0012
VMSA-2013-0013
VMSA-2013-0013
VMSA-2013-0013
VMSA-2013-0013
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0014
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

management
modify
the
intercept
and
attacker
must
vulnerabilityan
To
exploit
this
vSphere
Web
The
VMware
VMware ESXi vulnerabilityan
of
the
issue
may
traffic.
Exploitation
management
modify
the
intercept
and
attacker
must
To exploit
this
Client
Server
vSphere
Web
The
VMware
and ESX ESXi modify
lead
to
a
Denial
VMware
of
the
issue
mayof
traffic.
Exploitation
management
the
intercept
attacker
must
vulnerabilityan
To
exploit
this
contains
aand
Client
Server
vSphere
Web
The
VMware
contain
Service
of
the
and
ESXaESXi traffic.
lead
to
a
Denial
of
VMware
of
the
issue
may
Exploitation
management
modify
the
intercept
attacker
must
vulnerabilityan
To
exploit
this
vulnerability
in the
contains
aand
Client
Server
vSphere
Web
VMware
The
VMware
vulnerability
in
hostd-vmdb
contain
a
Service
of
the
and ESX ESXi attacker
lead
a must
Denial
of
VMware
of
thetoissue
may
traffic.
Exploitation
management
modify
the
intercept
and
vulnerabilityan
handling
vulnerability
in the
contains
aof
Client
Server
ESXWorkstation
vSphere
Web
VMware
hostd-vmdb.
vulnerability
hostd-vmdb
contain
Service
of
the
and
ESXaESXi in service.
lead
to
a
Denial
of
VMware
of
the
issue
may
traffic.
Exploitation
management
modify
the
intercept
and
attacker
must
session
IDs.
To
handling
vulnerability
in the
contains
aof
and
Fusion
contain
Client
Server
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
hostd-vmdb
contain
Service
of
the
and
ESXaESXi in of
lead
to
a
Denial
of
VMware
the
issue
may
traffic.
Exploitation
management
modify
the
intercept
and
exploit
this
session
IDs.
To
handling
vulnerability
inin
the
a
vulnerability
contains
aof
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
in
hostd-vmdb
contain
Service
the
and
ESXaESXi vulnerabilityan
lead
toissue
aof
Denial
of
VMware
of
the
may
traffic.
Exploitation
management
modify
the
exploit
this
session
IDs.
To
handling
of
the
handling
ofin
vulnerability
in
the
a
vulnerability
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
hostd-vmdb
contain
Service
of
the
and
ESXaESXi in management
lead
to
a
Denial
VMware
of
the
issue
may
traffic.
Exploitation
attacker
must
vulnerabilityan
exploit
this
session
IDs.
To
control
code
in
handling
of contain
the
handling
ofinof
a
vulnerability
and
Fusion
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
in
hostd-vmdb
contain
a
Service
of
the
and
ESX
lead
to
a
Denial
VMware ESXi lgtosync.sys.
of
the
may
traffic.
Exploitation
know
aissue
valid
attacker
must
vulnerabilityan
exploit
this
Ainof
session
IDs.
To
control
code
in
the
handling
of
a
vulnerability
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
hostd-vmdb
contain
Service
of
the
and
ESXaESXi in attacker
lead
to
a
Denial
of
the
may
VMware
session
ID
of
an
know
aissue
valid
must
vulnerabilityan
local
malicious
exploit
this
lgtosync.sys.
Ainof
control
code
in
the
handling
of
a
vulnerability
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
hostd-vmdb
contain
Service
of
the
and
ESXaWebin session
lead
to
a
Denial
vSphere
authenticated
VMware
ID
of
an
know
a code
valid
attacker
must
user
may
exploit
vulnerabilityan
local
malicious
lgtosync.sys.
Ainof
control
in
the
handling
of
a vulnerability
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
service.
vulnerability
in
hostd-vmdb
contain
a
Service
of
the
Client Server
user.
Exploitation
vSphere
Web lgtosync.sys.
authenticated
VMware
session
ID
of
an
know
a
valid
this
vulnerability
attacker
must
user
may
exploit
local
malicious
Ain
control
code
in
the
handling
of
a
vulnerability
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
vulnerability
hostd-vmdb
Session
of
the
issue
may
Client
Server
user.
Exploitation
vSphere
Webin service.
authenticated
VMware
session
ID
of
an
to
manipulate
know
a
valid
this
vulnerability
Oracle
JRE
is
user
may
exploit
local
malicious
lgtosync.sys.
Athe
control
code
in
the
handling
of
a
vulnerability
in
and
Fusion
contain
ESXWorkstation
VMware
hostd-vmdb.
service.
Fixation
lead
to
Elevation
Session
of
the
issue
may
Client
Server
user.
Exploitation
vSphere
Web
authenticated
memory
VMware
session
ID
of
an
to
manipulate
the
updated
to
version
this
vulnerability
Oracle
JRE
is
user
may
exploit
local
malicious
lgtosync.sys.
A
control
code
in
the
handling
ofin
a
vulnerability
and
Fusion contain
ESXWorkstation
VMware
Vulnerability
of
Privilege
Fixation
to
Elevation
Session
the
issue
may
Client
Server
user.
Exploitation
allocation.
This
vSphere
Web lead
authenticated
memory
1.6.0_51which
to
manipulate
updated
toexploit
version
this
vulnerability
Oracle
JRE
is
user
may
local
malicious
lgtosync.sys.
Athe
control
code
in
the
handling
of
a
vulnerability
in
and
Fusion
contain
ESXWorkstation
Vulnerability
Privilege
Fixation
lead
to
Elevation
Session
of
the
issue
may
could
result
in
a
Client
Server
user.
Exploitation
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
the
updated
to
version
this
vulnerability
Oracle
JRE
is
user
may
exploit
local
malicious
lgtosync.sys.
A
control
code
in
the
handling
of
a
vulnerability
in
and
Fusion contain
VMware
Vulnerability
Privilege
Fixation
lead
to
Elevation
privilege
Session
of
the
issue
may
could
result
in
a
Update
security
issues
allocation.
This
vCenter and
addresses
multiple
memory
1.6.0_51which
to
manipulate
the
updated
to
version
this
vulnerability
Oracle
JRE
is
user
may
exploit
local
malicious
lgtosync.sys.
A
control
code and
in
the
handling
ofin
a
vulnerability
Workstation
VMware
Vulnerability
of
Privilege
escalation
on
Fixation
lead
to
Elevation
privilege
ManagerOracle
that
existed
in
could
result
in
a
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
the
updated
toexploit
version
this
vulnerability
Oracle
JRE
is
user
may
local
malicious
lgtosync.sys.
A32control
code
in
the
handling
of
Player
Workstation
and
VMware
bit
Guest
Vulnerability
of
Privilege
escalation
on
32JRE
update
earlier
releases
privilege
ManagerOracle
that
existed
in
could
result
in
aof
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
updated
toexploit
version
this
vulnerability
Oracle
JRE
is
user
may
local
malicious
lgtosync.sys.
Athe
control
code
in
contain
a
VMware
Player
Workstation
and
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
32JRE
update
earlier
releases
privilege
ManagerOracle
that
existed
in
could
result
in
aof
Update and
security
issues
allocation.
This
vCenter
addresses
multiple
memory
1.6.0_51which
to
manipulate
updated
toexploit
version
this
vulnerability
Oracle
JRE
is
user
may
local
malicious
lgtosync.sys.
Athe
vulnerability
in
contain
a
VMware
Player
Workstation
and
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE update
earlier
releases
of
privilege
ManagerOracle
that
existed
in32could
result
in
athe
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
the
updated
to
version
this
vulnerability
Oracle
JRE
is
user
may
exploit
local
malicious
handling
of
shared
vulnerability
in32the
contain
aPlayer
VMware
Windows
2000
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE
update
earlier
releases
of
privilege
ManagerOracle
that
existed
in
could
result
in
a
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
the
updated
to
version
this
vulnerability
Oracle
JRE
is
user
may
exploit
libraries.
This
handling
of
shared
vulnerability
in
the
contain
a
ServerWindows
XP
Windows
2000
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
32JRE
update
earlier
releases
privilege
ManagerOracle
that
existed
in the
could
result
in
aof
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
updated
to
version
this
vulnerability
Oracle
JRE
is
issue
may
allow
a
libraries.
This
handling
of
shared
vulnerability
in
the
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE
update
earlier
releases
privilege
ManagerOracle
that
existed
in32could
result
in
aof
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
to
manipulate
the
updated
to
version
Oracle
JRE
is
local
malicious
issue
may
allow
a
libraries.
This
handling
of
shared
Server
onrunning
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE
update
earlier
releases
privilege
ManagerOracle
that
existed
in32could
result
in
aof
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
memory
1.6.0_51which
updated
to
version
Oracle
JRE
is
user
to
escalate
local
malicious
issue
may
allow
a
libraries.
This
and
ESX;
or
Server
on
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE
update
earlier
releases
of
privilege
ManagerOracle
that
existed
in32could
result
in
ato
Update
security
issues
allocation.
This
vCenter
and
addresses
multiple
1.6.0_51which
updated
to
version
Oracle
JRE
is
their
privileges
user
to
escalate
local
malicious
issue
may
allow
a
Windows
XP
on
and
ESX;
or
Server
onrunning
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE
update
earlier
releases
of
privilege
ManagerOracle
that
existed
in32could
result
in
ato
Update
security
issues
vCenter
and
addresses
multiple
1.6.0_51which
updated
to
version
Oracle
JRE
is
root
on
the
host
their
privileges
user
to
escalate
local
malicious
Workstation
and
Windows
XP
on XP
and
ESX;
or
Server
onrunning
ESXi
or
Windows
2003
ServerWindows
Windows
2000
Systems
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
JRE
update
earlier
releases
of
privilege
ManagerOracle
that
existed
in32Update
security
issues
vCenter
and
addresses
multiple
1.6.0_51which
updated
to
version
Oracle
JRE
is
OS.
The
root
on
the
host
their
privileges
to
user
to
escalate
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
escalation
on
32JRE update
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
1.6.0_51which
updated
to
version
vulnerability
does
OS.
The
root
on
the
host
their
privileges
to
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
running
Operating
bit
Guest
1.6.0_51
Oracle
JRE.
JRE
update
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
1.6.0_51which
not
allow
for
vulnerability
does
OS.
The
root
on
the
host
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
running
Operating
1.6.0_51
Oracle
JRE.
JRE
update
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
privilege
not
allow
for
vulnerability
does
OS.
The
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
onrunning
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
Systems
1.6.0_51
Oracle
JRE.
JRE
update
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
escalation
from
privilege
not
allow
for
vulnerability
does
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
or
Windows
2003
ServerWindows
XP
Windows
2000
1.6.0_51
Oracle
JRE.
JRE
update
earlier
releases
of
ManagerOracle
that
existed
in
VMware
shared the
Guest
escalation
from
privilege
not
allow
for
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
or
Windows
2003
ServerWindows
XP
1.6.0_51
Oracle
JRE.System
JRE
update
releases
of
library
Operating
System
VMware
shared earlier
the
Guest
escalation
from
privilege
Operating
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
or
Windows
2003
1.6.0_51shared to
Oracle
JRE.System
privilege
to
the
host
or
vicelibrary
Operating
VMware
the
Guest
escalation
from
the
host.
This
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
Server
on
ESXi
escalation
versa.
privilege
to
the
host
or
vicelibrary
Operating
System
VMware shared privilege
the
Guest
means
that
host
to
host.
This
Operating
System
the
Guest
escalation
from
notthe
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
and
ESX;
or
escalation
versa.
privilege
to
the
host
or
vicelibrary
Operating
System
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
Windows
XP
on
escalation
versa.
privilege
to
the
host
or
viceLGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
Workstation
and
escalation
versa.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
vulnerability
does
Fusion.
The
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
the allow
Guestfor
escalation
from
privilege
not
vulnerability
does
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
the
Guest
escalation
from
privilege
not
allow
for
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
the
Guest
escalation
from
privilege
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
the
Guest System
escalation
from
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
thatSystem
host
to
the
host.
This
Operating
the
Guest
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to
the
host.
This
Operating
System
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
means
that
host
to the host. This
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
VMware
memory
canhost
not
means
that
escalation
Operating
System.
privilege
from
the service
Guest
LGTOSYNC
be
manipulated
VMware
memory
can
not
The
ESX
escalation
Operating
System.
privilege
from
the
Guest
LGTOSYNC
be
manipulated
console
kernel
The ESX serviceis
escalation
Operating
System.
privilege
thekernel
Guest
Update to ESX from
updated
to
resolve
console
is
The
ESX
service
escalation
Operating
service
console
multiple
security
Update
to ESX console
updated
toSystem.
resolve
kernel
is
kernel console
issues. security
service
multiple
Update
to ESX updated
to resolve
kernel
service console issues.
multiple security
kernel
issues.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0015
VMSA-2013-0016
VMSA-2013-0016
VMSA-2013-0016
VMSA-2013-0016
VMSA-2013-0016
VMSA-2013-0016
VMSA-2013-0016
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0001
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

updates
theServer
ESX
This
patch
users
orfiles
groups
ed
vCenter
reboot.Unpriviledg
host
execution
after
allow
for
code
certain
maya
The
ESX
service
service
console
updates
the
ESX
This
patch
that
are
users
or assigned
groups
ed
vCenter
Server
reboot.Unpriviledg
host
execution
after
allow
for
code
console
kernel
isa
The
ESX
service
Netscape
Portable
service
console
updates
theServer
ESX
This
patch
the
predefined
that
are
users
or assigned
groups
ed vCenter
reboot.Unpriviledg
host
execution
after
Update to ESX Runtime
updated
to
resolve
console
kernel
isa
The
ESX
service
(NSPR)
Netscape
Portable
service
updates
the
ESX
This
patch
role
"Virtual
thevCenter
predefined
that
are
assigned
users
orconsole
groups
ed
Server
reboot.Unpriviledg
host
service console
multiple
security
Update
to ESX updated
to
resolve
console
kernel
is
and
Network
Runtime
(NSPR)
Netscape
Portable
service
updates
the
ESX
This
patch
Machine
Power
role
"Virtual
the
predefined
that
are
assigned
users
orconsole
groups
ed
vCenter
Server
reboot.Unpriviledg
VMware
ESXi
and
kernel
issues.
service console
multiple
security
Update
to ESX Netscape
updated
to
resolve
Security
Services
and
Network
Runtime
(NSPR)
Portable
service
updates
the
ESX
User"
orconsole
"Resource
Machine
Power
role
"Virtual
the
predefined
that
are
assigned
users
or
groups
ed
vCenter
Server
ESX
contain
a
ESXi
and
kernel console
issues.
service
multiple
security
Update
to ESX VMware
(NSS)
RPMs
to
Security
Services
and
Network
Runtime
(NSPR)
Netscape
Portable
service
console
Pool
User"
or
"Resource
Machine
Power
role
"Virtual
the predefined
that
are
assigned
users
or
groups
NULL
pointer
ESX
contain
a
VMware
ESXi
kernel
issues.
service
multiple
Update console
to ESX resolve
(NSS)
RPMs
toand
Security
Services
and
Network
Runtime
(NSPR)
Netscape
Portable
Administrator"
Pool
User"
or
"Resource
Machine
Power
role
"Virtual
the
predefined
that
are
assigned
dereference
inand
the
NULL
pointer
ESX
contain
a
ESXi
NSPR and
NSS
security
issues.
service
console
resolve
multiple
Update
to
ESX VMware
(NSS)
RPMs
to
Security
Services
and
Network
Runtime
(NSPR)
VMware
ESXi
have
the
privilege
Administrator"
Pool
User"
or
"Resource
Machine
Power
role
"Virtual
the
predefined
handling
of the
dereference
inand
the
NULL
pointer
ESX
contain
a
ESXi
NSPR
and
NSS
security
issues.
service
console
resolve
multiple
Update
to
ESX VMware
(NSS)
RPMs
to
Security
Services
and
Network
and ESX
"Add
Existing
VMware
ESXi
have
the
privilege
Administrator"
Pool
User"
or
"Resource
Machine
Power
role
"Virtual
Network
File
Copy
handling
of
the
dereference
in
the
NULL
pointer
ESX
contain
a
VMware
ESXi
and
NSPR
and
NSS
issues.
service
console
resolve
multiple
Update
to
ESX security
(NSS)
RPMs
toTo
Security
Services
unauthorized
Disk".The
issue
and
ESX
"Add
Existing
VMware
ESXi
have
the
privilege
Administrator"
Pool
User"
or
"Resource
Machine
Power
(NFC)
traffic.
Network
File
Copy
handling
of
the
dereference
in
the
NULL
pointer
ESX
contain
aand
ESXi
NSPR
and
NSS
security
issues.
service
console
resolve
multiple
Update
to
ESX VMware
(NSS)
RPMs
to
file
access
cannot
be
unauthorized
Disk".The
issue
and
ESX
"Add
Existing
VMware
ESXi
have
the
privilege
Administrator"
Pool
User"
or
"Resource
exploit
this
(NFC)
traffic.
To
Network
File
Copy
handling
of the
dereference
in
the
NULL
pointer
contain
a
NSPR
and
NSS ESX
security
issues.
service
console
resolve
multiple
through
exploited
through
file access
cannot
be
unauthorized
Disk".The
issue
and
ESX
"Add
Existing
VMware
ESXi
have
the
privilege
Administrator"
Pool
vulnerabilityan
exploit
this
(NFC)
traffic.
Tothe
Network
File
Copy
handling
of
the
dereference
in
NULL
pointer
NSPR
and
NSS security
issues.
vCenter
Server
VMware
vCloud
through
exploited
through
file
access
cannot
be
unauthorized
Disk".The
issue
and
ESX
"Add
Existing
VMware
ESXi
have
the
privilege
Administrator"
attacker
must
vulnerabilityan
exploit
this
(NFC)
traffic.
Tothe
Network
File
Copy
handling
of
the
dereference
in
and
ESX
Director.
vCenter
Server
VMware
vCloud
through
exploited
through
file
access
cannot
be
unauthorized
Disk".The
issue
and ESX ESXi (NFC)
"Add
Existing
VMware
have
the
privilege
intercept
and
attacker
must
vulnerabilityan
exploit
this
traffic.
To
Network File
Copy
handling
of the
and
ESX
Director.
vCenter
vCloud
through
exploited
through
file
access
cannot
be
unauthorized
Disk".The
issue
and
ESX Server VMware
"Add
Existing
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
traffic.
To
Network
File Copy
andaccess
ESX Server modify
Director.
vCenter
VMware
vCloud
through
exploited
through
file
cannot
be
unauthorized
Disk".The
issue
traffic
between
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
(NFC)
To
Due
totraffic.
a
flaw
in
andaccess
ESX Server cannot
Director.
vCenter
VMware
vCloud
through
exploited
through
file
be
ESXi/ESX
the
traffic
between
modify
the
NFC
intercept
and
attacker
must
vulnerabilityan
exploit
this
the handling
Due
to a flawof
in
and
ESX Server
Director.
vCenter
vCloud
through
exploited
through
VMware
ESXi VMware
client.
Exploitation
ESXi/ESX
the
traffic
between
modify
the
NFC
intercept
and
attacker
vulnerabilityan
invalid
is
the
handling
Due
to portsit
a must
flawof
in
Director.
vCenter
VMware
vCloud
and
ESX Server
NFC traffic
of
the
issue
may
VMware
ESXi
client.
Exploitation
ESXi/ESX
and
the
between
modify
the
NFC
intercept
attacker
must
possible
to
cause
invalid
is
the
handling
of
Due
to portsit
a
flaw
in
Director.
NULL
pointer
lead
to
a
Denial
and
ESX
NFC of
the
issue
may
VMware
ESXi
client.
Exploitation
ESXi/ESX
the
traffic
between
modify
the
NFC
intercept
and
the
VMX
process
possible
to
cause
invalid
is of
handling
Due
to portsit
a flawof
in
dereference
Service.
NULLESX
pointer
lead
toissue
ato
Denial
and
NFC to
of
the
may
VMware
ESXi
client.
Exploitation
ESXi/ESX
and
the
traffic
modify
the
NFC
fail.
This
VMX
process
possible
cause
invalid
portsit
is of
the
handling
of
Due
tobetween
a
flaw
in
dereference
Service.
NULL
pointer
lead
to
a
Denial
and
ESX
NFC ESXi/ESX
of
the
issue
may
VMware
ESXi
client.
Exploitation
and
the
traffic
vulnerability
may
to
fail.
This
VMX
process
possible
cause
invalid
portsit
is of
the
handling
of
Due
tobetween
a to
flaw
in
dereference
Service.
NULL
pointer
lead
to
a
Denial
and ESX ESXi
NFC the
of
the
issue
may
VMware
client.
ESXi/ESX
and
the
allow
user
vulnerability
may
to
fail.
This
VMX
process
possible
to
cause
invalid
portsit
is of
handling
of
Due
toaExploitation
aguest
flaw
in
dereference
Service.
NULL
pointer
lead
toissue
ato
Denial
and
ESX
NFC vulnerability
of
the
may
VMware
ESXi
client.
to
affect
the
VMX
allow
user
may
fail.
This
VMX
process
possible
cause
invalid
portsit
is of
the
handling
of
Due
toaExploitation
aguest
flaw
in
vCloud
dereference
Service.
NULL
pointer
lead
to
a
Denial
and
ESX
NFC VMware
of
the
issue
may
VMware
VMX
process
resulting
affect
the
VMX
allow
user
vulnerability
may
to
fail.
the
VMX
process
possible
to
cause
invalid
portsit
is ofa
handling
of
Due
toaThis
aguest
flaw
in
Director
contains
VMware
vCloud
dereference
Service.
NULL
pointer
lead
to
a
Denial
of
process denial
in
a
partial
denial
VMware
VMX to
process
resulting
affect
the
VMX
allow
user
vulnerability
may
fail.
VMX
process
possible
to
cause
invalid
portsit
isthe
the
handling
of
Due
toaThis
aguest
flaw
in
vulnerability
in
Director
contains
a
dereference
Service.
of
service
of
service
on
the
process
denial
in
a
partial
denial
VMware
VMX allow
process
resulting
to
affect
the
VMX
user
vulnerability
may
fail.
This
VMX
process
possible
to
cause
invalid
portsit
isthe
the
handling
of
Due
toaText
aguest
flaw
in
Hyper
vulnerability
in
vulnerability
host.
of
service
of
service
on
the
process
denial
a
partial
denial
VMware
VMX in
process
resulting
affect
the
VMX
allow
user
vulnerability
may
to
fail.
This
the
VMX
process
possible
to
cause
invalid
portsit
is
handling
of
Due
toaText
aguest
flaw
in
Transfer
Protocol
Hyper
vulnerability
host.
of service
of
service
on
the
process
denial
in
a
partial
denial
VMware
VMX to
process
resulting
affect
the
VMX
allow
a
guest
user
vulnerability
may
fail.
This
VMX
process
possible
to
cause
invalid
portsit
is
the
handling
of
(http)
session
Transfer
Protocol
The
NTP daemon
vulnerability
host.
of
service
of
service
on
the
process
denial
in
a
partial
denial
VMware
VMX to
process
resulting
affect
the
VMX
allow
a
guest
user
vulnerability
may
fail.
This
the
VMX
process
possible
to
cause
invalid
portsit
is
management.
An
(http)
session
has
a
DDoS
The
NTP
daemon
vulnerability
host.
of
service
of
service
on
the
process
denial
a
partial
denial
VMware
VMX in
process
resulting
affect
the
VMX
allow
a
guest
user
vulnerability
may
to
fail.
This
the
VMX
process
possible
to
cause
attacker
may
trick
management.
An
vulnerability
in
the
has
a
DDoS
The
NTP
daemon
vulnerability
host.
of
service
of
service
on
the
process
denial
in
a
partial
denial
VMware
VMX vulnerability
process
resulting
to
affect
the
VMX
allow
a
guest
user
may
fail.
This
the
VMX
process
an
authenticated
attacker
may
trick
handling
of
the
vulnerability
in
the
has
a
DDoS
The
NTP daemon
vulnerability
host.
of
service
of
service
on
the
process
denial
in
a
partial
denial
VMware
VMX process
resulting
affect
the
VMX
allow
a
guest
user
vulnerability
may
to
fail.
This
user
to
click
a
an
authenticated
"monlist"
handling
of the
vulnerability
in the
has
a
DDoS
The
NTP
daemon
vulnerability
host.
of
service
service
on
the
process
denial
in
a
partial
denial
VMware
VMX of
process
resulting
to
affect
the
VMX
allow
a
guest
user
vulnerability
may
malicious
user
to
click
a
command.
"monlist"
handling
ofAn
the
vulnerability
in
the
has
a
DDoS
The
NTP
daemon
vulnerability
host.
of
service
of
service
on
the
process
denial
in
a
partial
denial
VMware
VMX allow
process
resulting
to
affect
the
VMX
a
guest
user
linkwhich
would
malicious
attacker
may
send
command.
An
"monlist"
handling
of
the
vulnerability
in
the
has a
DDoS
The
NTP
daemon
vulnerability
host.
of
service
of
service
on
the
process
denial
a
partial
denial
VMware
VMX in
process
resulting
to
affect
the
VMX
result
in
the
user
linkwhich
would
a
forged
request
attacker
may
send
command.
An
"monlist"
handling
of the
vulnerability
in the
has
a
DDoS
The
NTP
daemon
vulnerability
of service
of
service
on
the
process
denial
in
a
partial
denial
VMX host.
process
resulting
VMware
being
logged
out.
result
in
the
user
to
a
vulnerable
a
forged
request
attacker
may
send
command.
An
"monlist"
handling
of
the
vulnerability
in
the
has
a
DDoS
The
NTP daemon
vulnerability
host.
of
service
of
service
on
the
process
denial being
in
a
partial
denial
vCloud
The
user
is
able
to
VMware
logged
out.
NTP
server
to
a
vulnerable
a
forged
request
attacker
may
send
command.
An
"monlist"
handling
of
the
vulnerability
in the
has
a
DDoS
The
NTP
daemon
vulnerability
host.
of
service
of
service
on
the
Director
Cross
immediately
log
vCloud
The
user
is
able
to
resulting
inAn
an
NTP
server
to
aa
vulnerable
a
forged
request
attacker
may
send
command.
"monlist"
handling
of
the
vulnerability
in
the
has
DDoS
vulnerability
host.
Site
Request
back
into
the
Director
Cross to
immediately
log
DDoS
amplified
response
resulting
in
an
NTP
server
a
vulnerable
a forged may
request
attacker
send
command.
"monlist"
handling
ofAn
the
vulnerability
in
the
Forgery
(CSRF)
system.
Site
Request
back
into
the
vulnerability
in amplified
to
the
intended
DDoS
response
resulting
in
an
NTP
server
to
a
vulnerable
a
forged
request
attacker
may
send
command.
An
"monlist"
handling of the
Forgery
system.
NTP
third(CSRF)
party
of may
the
DDoS
vulnerability
in target
to
the
intended
DDoS
amplified
response
resulting
in
an
NTP
server
to
a
vulnerable
a
forged
request
attacker
send
command.
An
"monlist"
libraries
attack.
NTP
third party
target
of
the
DDoS
vulnerability
in NTP
to
the
intended
DDoS
amplified
response
resulting
in
an
server
toforged
a vulnerable
a
request
attacker
may
command.
Ansend
libraries
attack.
NTP
third party
target
of may
the
DDoS
vulnerability
in amplified
to
the
intended
DDoS
response
resulting
in
an
NTP
server
to
a vulnerable
a
forged
request
attacker
send
libraries
attack.
NTP third party
target
of request
the
DDoS
vulnerability
in a
to
the
intended
DDoS
amplified
response
resulting
in
an
NTP
server
to
a
vulnerable
forged
libraries
attack.
NTP
third party
target
of the
DDoS
vulnerability
in resulting
to
the
intended
DDoS
amplified
response
in
an
NTP
server
to
a vulnerable
libraries
attack.
NTP
third
party
target
of
the
DDoS
vulnerability
in
to
the
intended
DDoS
amplified
response
resulting
in
an
NTP
server
The
ESXi
glibc
libraries
attack.
NTP
third party
target
of is
the
DDoS
vulnerability
in The
to
the
intended
DDoS
amplified
response
resulting
in
an
package
ESXi
glibc
libraries
attack.
NTP
third party
target
of
the
DDoS
vulnerability
in amplified
to
the
intended
DDoS
response
updated to
package
is version
libraries
attack.
NTP
third
party
target
of
the
DDoS
vulnerability in updated
to the intended
glibc-2.5to version
libraries
attack.of the DDoS
NTP
third party glibc-2.5target
118.el5_10.2
to
librariesto ESXi 118.el5_10.2
attack. a security
Update
resolve
to
glibc
package
issue.
Update to ESXi resolve a security
glibc package issue.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0002
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0003
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

The ESXi glibc


updated
version
package
is
The
ESXi to
glibc
glibc-2.5updated
to
version
package
is
The
ESXi
glibc
Oracle JRE is
118.el5_10.2
to
glibc-2.5updated
to
version
package
is
The ESXi
Oracle
JREglibc
is
Update to ESXi 118.el5_10.2
resolve
a
security
to
glibc-2.5package
is is
JRE
1.7 JRE
Update
updated
to
version
Oracle
glibc
package
issue.
Update to ESXi JRE
resolve
ato
security
118.el5_10.2
to
glibc-2.5updated
version
45which
1.7 JRE
Update
Oracle
is
glibc package
issue.
Update
to
ESXi addresses
resolve
a
security
118.el5_10.2
to
glibc-2.5vCenter
and
multiple
45which
JRE
1.7 JRE
Update
updated
tois
version
Oracle
glibc
package
issue.
Update
to
ESXi
resolve
a
security
118.el5_10.2
to
security
issues
vCenter and
addresses
45which
JRE
1.7 JRE
Update
updated
tomultiple
version
Oracle
is
Client
glibc package
issue.
to
ESXi vSphere
resolve
a
security
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
1.7
Update
updated
tois
version
Oracle
JRE
contains
a in of
vSphere
Client
glibc
package
issue.
JRE
1.7
Update
earlier
releases
ManagerOracle
that
existed
Update
security
issues
vCenter
and
addresses
45which
JRE
1.7
Update
updated
tomultiple
version
Oracle
JRE
is
vulnerability
in of
contains
a multiple
vSphere
Client
45
Oracle
JRE.
JRE 1.7 Update
earlier
releases
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
45which
JRE
1.7
Update
updated
to
version
Oracle
JREan
is
accepting
vulnerability
in of
contains
a
vSphere
Client
45 1.7 Update
Oracle
JRE.
JRE
earlier
releases
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE 1.7
Update
updated
to
version
Oracle
JRE
is
updated
vSphere
accepting
an
vulnerability
in of
contains
a multiple
vSphere
Client
45
Oracle
JRE.
JRE
1.7 Update
earlier
releases
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
45which
JRE
1.7
Update
updated
to
version
Oracle
JRE
is
Client
file
from
updated
vSphere
accepting
vulnerability
in an
contains
a an
vSphere
Client
45
Oracle
JRE.
JRE 1.7 Update
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
1.7
Update
updated
to
version
Oracle
JRE
is
untrusted
source.
Client
file
from
updated
vSphere
accepting
anin
vulnerability
in an
contains
a
vSphere
Client
45 1.7 Update
Oracle
JRE.
JRE
earlier
releases
of
ManagerOracle
that
existed
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
1.7
Update
updated
to
version
Oracle
JRE
is
The
vulnerability
untrusted
source.
Client
file
from
an
updated
vSphere
accepting
an
vulnerability
in
contains
a
45
Oracle
JRE.
JRE
1.7
Update
earlier
releases
ManagerOracle
that1.7
existed
in of
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
Update
updated
to
version
Oracle
JRE
is
may
allow
a
host
The
vulnerability
untrusted
source.
Client
file
from
updated
vSphere
accepting
an
vulnerability
in an
45 1.7 Update
Oracle
JRE.
JRE
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
1.7
Update
updated
to
version
Oracle
JRE
is
to
direct
vSphere
may
allow
a
host
The vulnerability
untrusted
source.
Client
file
from
updated
vSphere
accepting
anin an
45
Oracle
JRE.
JRE
1.7
Update
earlier
releases
of
ManagerOracle
that
existed
Update
security
issues
vCenter and
addresses
multiple
45which
JRE
1.7
Update
updated
to
version
Oracle
JRE
is
Client
to
download
to direct
vSphere
may
allow
a
host
The
vulnerability
untrusted
source.
Client
file
from
an
updated
vSphere
45
Oracle
JRE.
JRE
1.7
Update
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
1.7
Update
updated
to
version
Oracle
JRE
is
and
execute
anan
Client
to
download
to
direct
vSphere
may
allow
a
host
The
vulnerability
untrusted
source.
Client
file
from
45 1.7 Update
Oracle
JRE.
JRE
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
JRE
1.7
Update
updated
to
arbitrary
file
from
and
execute
an
Client
to
download
to
direct
vSphere
may
allow
aversion
host
The
vulnerability
untrusted
source.
45
Oracle
JRE.
JRE
1.7
Update
earlier
releases
of
ManagerOracle
that
existed
in
Update and
security
issues
vCenter
addresses
multiple
45which
JRE
1.7
any
URI.
This
issue
arbitrary
file
from
and
execute
an
Client
toUpdate
download
to
direct
vSphere
may
allow
a host
The
vulnerability
45
Oracle
JRE.
JRE 1.7 Update
earlier
releases
ofif
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
45which
can
be
exploited
any
URI.
This
issue
arbitrary
file
from
and
execute
an
Client
to
download
to
direct
vSphere
may
allow
a host
VMware
vSphere
45 1.7 Update
Oracle
JRE.
JRE
earlier
releases
of
ManagerOracle
that
existed
in
Update
security
issues
vCenter
and
addresses
multiple
the
host
has
been
can
be
exploited
any
URI.
This
issue
arbitrary
file an
from
and
execute
Client
to
download
to
direct
vSphere
contains
a if
VMware
vSphere
45
Oracle
JRE.
JRE
1.7
Update
earlier
releases
of
ManagerOracle arbitrary
that
existed
Update
security
issues
compromised
ora
ifif
the
has
been
can
be
exploited
any
URI.
This
issue
file in
from
and host
execute
an
to
download
vulnerability
in
the
Client
contains
VMware
vSphere
45 1.7 Update can
Oracle
JRE.
JRE
earlier
releases
of
ManagerOracle
that
existed
in
a
user
has
been
compromised
or
ifif
the
host
has
been
be
exploited
any
URI.
This
issue
arbitrary
file
from
and
execute
validation
of an
the
vulnerability
in
the
Client
contains
a
VMware
vSphere
45 1.7 Update
Oracle
JRE.
JRE
earlier
releases
of
vSphere
Client a
tricked
into
user
has
been
compromised
ora
ifif
the
host
has
been
can
be
exploited
any
URI.
This
issue
arbitrary
file
server
security
validation
of from
the
vulnerability
in
the
Client
contains
VMware
vSphere
OpenSSL
45
Oracle
JRE.
Insecure
Client The
clicking
a
vSphere Client
tricked
into
a
user
has
been
compromised
or
ifif
the
host
has
been
can
be
exploited
any
URI.
This
issue
certificate.
server
security
validation
of the
vulnerability
in a
the
Client
contains
VMware
library
isavSphere
updated
OpenSSL
Download
malicious
link.
Insecure
Client The
clicking
vSphere
Client
tricked
into
a
user
has
been
compromised
or
ifif
the
host
has
been
can
becontains
exploited
Exploitation
of
certificate.
server
security
validation
of
the
vulnerability
in the
the
Client
a
VMware
vSphere
to
version
openssllibrary
is
updated
OpenSSL
Download
malicious
link.
Insecure
Client The
clicking
a
vSphere
Client
tricked
into
a
user
has
been
compromised
the
host
has
been
issue
may
lead
toif
Exploitation
of
the
certificate.
server
security
validation
of
the
vulnerability
inor
the
Client
contains
a
1.0.1g
to
resolve
to
version
openssllibrary
isaupdated
OpenSSL
Download
malicious
link.
Insecure Client
Client The
clicking
vSphere
tricked
into
a
user
has
been
compromised
or
vCenter
server
issue
may
lead
toif
Exploitation
of
the
certificate.
server
security
validation
of
the
vulnerability
in the
multiple
1.0.1g
to
resolve
to
version
openssllibrary
isasecurity
updated
OpenSSL
Download
malicious
link.
Insecure
Client The
clicking
vSphere
Client
tricked
into
a
user
has
been
being
spoofed.
A
vCenter
issue
may
lead
to
Exploitation
of
the
certificate.
server
security
validation
of
the
issues.
* server
Deploy
multiple
security
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
OpenSSL
Download
malicious
link.
Insecure
Client The
clicking
a
vSphere
tricked
into
VMware Client
user
would
have
being
spoofed.
A
vCenter
server
issue
may
lead
to
Exploitation
of
the
certificate.
server
security
the
VMware
issues.
* security
Deploy
multiple
1.0.1g
to
resolve
to
version
opensslis
updated
The
OpenSSL
Download
malicious
link.
Insecure
Client library
clicking
a
vSphere
Client
to
be
tricked
into
VMware
user
would
have
being
spoofed.
A
vCenter
server
issue
may
lead
to
Exploitation
of the
certificate.
product
or
the
VMware
issues.
*update
Deploy
multiple
security
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
OpenSSL
Download
malicious
link.
spoofing
clicking
a
vSphere
Client The
to
be
tricked
into
VMware
user
would
have
being
spoofed.
A
vCenter
server
issue
may
lead
to
Exploitation
of
the
patches
*
product
update
or
the
VMware
issues.
* security
Deploy
multiple
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
OpenSSL
vulnerability
malicious
link.
spoofing
clicking
a
vSphere Client The
to
be
tricked
into
VMware
user
would
have
being
spoofed.
A
vCenter
server
issue
may
lead
to
Replace
product
patches
*
or
the
VMware
issues.
*update
Deploy
multiple
security
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
OpenSSL
vulnerability
malicious
link.
spoofing
clicking
a
vSphere
Client The
to
be
tricked
into
VMware
user
would
have
being
spoofed.
A
vCenter
server
certificates
per the
Replace
patches
*
product
or
the
VMware
issues.
*update
Deploy
multiple
security
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
The
OpenSSL
vulnerability
malicious
link.
spoofing
clicking
a
vSphere
be
tricked
into
VMware Client to
user
would
have
being
spoofed.
A
product-specific
certificates
per
the
Replace
patches
*
product
update
or
theversion
VMware
issues.
* security
Deploy
multiple
1.0.1g
to
resolve
to
openssllibrary
is
updated
OpenSSL
vulnerability
malicious
link.
spoofing Client The
clicking
a
vSphere
to
be
tricked
into
VMware
user
would
have
Information
documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
or
the
VMware
issues.
*update
Deploy
multiple
security
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
OpenSSL
vulnerability
malicious
link.
spoofing
clicking
a
vSphere
Client The
to
be
tricked
into
Disclosure
Reset
passwords
Information
documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
update
or
the
VMware
issues.
*
Deploy
multiple
1.0.1g
to
resolve
to
version
openssllibrary
isasecurity
updated
The
OpenSSL
malicious
link.
spoofing
clicking
vulnerability
the
productDisclosure in per
Reset
passwords
Information
documentation
*
product-specific
certificates
per
the
Replace
product
patches
*
or
theversion
VMware
issues.
*update
Deploy
multiple
security
1.0.1g
to
resolve
to
openssllibrary
is
updated
malicious
link.
OpenSSL third
specific
vulnerability
in certificates
per
the
productDisclosure
Reset
passwords
Information
documentation
*
product-specific
per
the
Replace
patches
*
product
or
the
VMware
issues.
*update
Deploy
multiple
security
1.0.1g
to
resolve
to
version
opensslparty
library
documentation
OpenSSL
third
specific
vulnerability
in Reset
per
the
productDisclosure
passwords
Information
documentation
*
product-specific
certificates
per
the
Replace
patches
product
update
or
the
VMware
issues. to
* security
Deploy
multiple
1.0.1g
resolve*
party
library
documentation
OpenSSL
third
vulnerability
in specific
per
the
productDisclosure
Reset
passwords
Information
documentation
*or
product-specific
certificates
per the
Replace
product
patches
*
the VMware
issues.
*update
Deploy
multiple
security
party library
documentation
OpenSSL
third
specific
vulnerability
in product-specific
per
the
productDisclosure
Reset
passwords
Information
documentation
*
certificates
per the
Replace
patches
*
product
or
the
VMware
issues.
*update
Deploy
party
library
documentation
OpenSSL
third
specific
vulnerability
in Reset
per
the
productDisclosure
passwords
Information
documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
update
or
the VMware
party
library
OpenSSL
third
specific
vulnerability
in documentation
per
the
productDisclosure
Reset
passwords
Information
documentation
*
product-specific
certificates
per
the
Replace
patchesor
*
product update
party library
documentation
OpenSSL
third
specific
vulnerability
in documentation
per
the
productDisclosure
Reset
passwords
Information
**
product-specific
certificates
per the
Replace
product
patches
party
library
documentation
OpenSSL
third
specific
vulnerability
in per
the
productDisclosure
Reset
passwords
Information
documentation
*
product-specific
certificates
per the
Replace
party library
documentation
OpenSSL
third
specific
vulnerability
in certificates
per
the
productDisclosure
Reset
passwords
Information
documentation
*
product-specific
per the
party
library
documentation
OpenSSL
third
specific
vulnerability
in
per
the
productDisclosure
Reset
passwords
Information
documentation *
product-specific
party
library
documentation
OpenSSL
third
vulnerability
in specific
per the
product-*
Disclosure
Reset
passwords
Information
documentation
party library
documentation
OpenSSL
third
specific
vulnerability
in Reset
per
the
productDisclosure
passwords
party library
documentation
OpenSSL
third
specific
vulnerability
in per
the productparty
library
OpenSSL
third documentation
specific
party library
documentation

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0004
VMSA-2014-0005
VMSA-2014-0005
VMSA-2014-0005
VMSA-2014-0005
VMSA-2014-0005
VMSA-2014-0005
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

Information
Disclosure
Information
vulnerability in
Disclosure
Information
OpenSSL
vulnerability
in
Disclosurethird
Information
party
library
OpenSSL third
vulnerability
in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability
Disclosure
Information in
party
library
OpenSSL
third
vulnerability
in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability
Disclosure in
Information
party
library
OpenSSL
third
vulnerability
in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability
Disclosure
Information in
party
library
OpenSSL
third
vulnerability
in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability
Disclosure in
Information
party
library
OpenSSL
third
vulnerability
in
Disclosure
Information
party library
OpenSSL
third
vulnerability
in
Disclosure
Information
party
library
OpenSSL
third
vulnerability in
Disclosure
party library
OpenSSL
third
vulnerability
in
party library
OpenSSL
third
Guest
privilege
party
escalation
in
Guestlibrary
privilege
VMware
Tools
escalation
in
Guest
privilege
VMware
Tools
escalation
in
Guest
privilege
VMware
Tools
escalation
in
Guest
privilege
VMware
Tools
escalation
in
Guest
privilege
OpenSSL
VMware
Tools
escalation
update
for
OpenSSL in
VMwarefor
Tools
multiple
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
products
multiple
products

certificates
per the
Replace
patches
*
product
or
the
VMware
*update
Deploy
multiple
security
issues.
The
1.0.1g
to
resolve
to
version
opensslin
order
to
resolve
library
is
updated
The
OpenSSL
OpenSSL
libraries
documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
update
or
the
VMware
* security
Deploy
Common
issues.
The
1.0.1g
to
resolve
multiple
to
version
openssllibrary
is
updated
The
OpenSSL
have
been
OpenSSL
libraries
Reset
passwords
documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
or
the
VMware
Vulnerabilities
and
*update
Deploy
Common
multiple
security
issues.
The
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
The
OpenSSL
updated
in
have
been
OpenSSL
libraries
per
the
productReset
passwords
documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
issues.
*
Deploy
Common
multiple
security
1.0.1g
to
resolve
to
version
openssllibrary
is products
updated
The
OpenSSL
multiple
updated
in
have
been
OpenSSL
libraries
specific
per
the
productReset
passwords
documentation
*
product-specific
certificates
per
the
Replace
patches
*
(cve.mitre.org)
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
issues.
* security
Deploy
multiple
1.0.1g
to
resolve
to
version
openssllibrary
is
updated
The
OpenSSL
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
per
the
productReset
passwords
documentation
*
product-specific
certificates
per
the
Replace
has
assigned
theor
patches
*
(cve.mitre.org)
product
update
Exposures
project
the
VMware
issues.
*and
Deploy
multiple
security
1.0.1g
to
resolve
version
openssllibrary
is
updated
0.9.8za
1.0.1h
The
OpenSSL
to
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
per
the
productReset
passwords
documentation
*
product-specific
certificates
per
the
names
CVE-2014Replace
has
assigned
the
patches
*
(cve.mitre.org)
product
update
or
the
VMware
issues.
*
Deploy
multiple
security
1.0.1g
to
resolve
version
opensslin
order
to
resolve
library
isand
updated
0.9.8za
1.0.1h
The
OpenSSL
to
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
per
the
productReset
passwords
documentation
*
product-specific
0224CVE-2014certificates
per
the
names
CVE-2014Replace
has
assigned
the
product
patches
*
update
or
the
VMware
issues.
*and
Deploy
1.0.1g
to
resolve
multiple
security
to
version
opensslin
order
to
resolve
library
is
updated
0.9.8za
1.0.1h
The
OpenSSL
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
per
the
productReset
passwords
documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
the
names
CVE-2014Replace
patches
*
product
update
or
the
VMware
*and
Deploy
multiple
security
issues.
The
1.0.1g
to
resolve
version
opensslin
order
to
resolve
library
is
updated
0.9.8za
1.0.1h
The
OpenSSL
to
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
per
the
productReset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
the
Replace
patches
*
product
update
or
the
VMware
*and
Deploy
Common
issues.
The
1.0.1g
to
resolve
multiple
security
version
opensslin
order
to
resolve
library
is
updated
0.9.8za
1.0.1h
The
OpenSSL
to
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
per
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
certificates
per
the
Replace
patches
*
product
update
or
the
VMware
Vulnerabilities
and
*and
Deploy
Common
issues.
The
1.0.1g
to
resolve
multiple
security
to
version
opensslin
order
to
resolve
library
is
updated
0.9.8za
1.0.1h
The
OpenSSL
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*
product-specific
certificates
per
the
Replace
patches
*
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
issues.
*
Deploy
Common
The
1.0.1g
to
resolve
multiple
security
version
opensslin
order
to
resolve
library
is
updated
0.9.8za
and
1.0.1h
to
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
documentation
2014-0195
to
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
documentation
*
product-specific
certificates
per
the
Replace
patches
*
(cve.mitre.org)
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
*and
Deploy
Common
issues.
The
1.0.1g
to
resolve
multiple
security
to
version
opensslin
order
to
resolve
0.9.8za
1.0.1h
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
these
issues.
The
documentation
2014-0195
to
specific
0221
and
CVEper
the
productReset
passwords
documentation
*
product-specific
certificates
per
the
Replace
has
assigned
the
patches
*
(cve.mitre.org)
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
*and
Deploy
Common
issues.
The
1.0.1g
to
resolve
multiple
security
in
order
to
resolve
0.9.8za
1.0.1h
to
versions
multiple
products
updated
in
have
been
OpenSSL
libraries
most
important
of
these
issues.
The
documentation
2014-0195
to
specific
per
the
productReset
passwords
documentation
*
product-specific
certificates
per
the
names
CVE-2014Replace
has
assigned
the
patches
*
(cve.mitre.org)
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
issues.
*
Deploy
Common
The
multiple
security
in
order
to
0.9.8za
and
1.0.1h
to
versions
multiple
products
updated
in resolve
have
been
issues
isThe
most
important
of
these
issues.
documentation
specific
per
the
productReset
passwords
documentation
*
product-specific
0224CVE-2014certificates
per
the
names
CVE-2014Replace
has
assigned
the
product
patches
*
(cve.mitre.org)
update
or
Exposures
project
the
VMware
Vulnerabilities
and
*and
Deploy
Common
A
kernel
NULL
issues.
The
multiple
security
in
order
to
resolve
0.9.8za
1.0.1h
to
versions
multiple
products
updated
in
CVE-2014these
issues
is
most
important
of
documentation
specific
per
the
productReset
passwords
documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
the
names
CVE-2014Replace
has
assigned
the
patches
*
(cve.mitre.org)
product
update
or
Exposures
project
the
VMware
Vulnerabilities
and
dereference
Common
A
kernel
NULL
issues.
The
multiple
security
in
order
to
resolve
0.9.8za
and
1.0.1h
to
versions
multiple
products
0224.CVE-2014CVE-2014these
issues
is the
documentation
specific
per
the
productReset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
names
CVE-2014Replace
has
assigned
the
patches
*
(cve.mitre.org)
product
update
or
Exposures
project
vulnerability
was
Vulnerabilities
and
dereference
Common
A
kernel
NULL
issues.
The
multiple
security
in
order
to
resolve
0.9.8za
and
1.0.1h
to
versions
0198CVE-20100224.CVE-2014CVE-2014documentation
specific
per
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
the
names
CVE-2014Replace
has
assigned
the
product
patches
*
(cve.mitre.org)
found
inThe
VMware
Exposures
project
vulnerability
was
Vulnerabilities
and
dereference
Common
A
kernel
NULL
issues.
multiple
security
in
order
to
resolve
0.9.8za
and
1.0.1h
5298
and
CVE0198CVE-20100224.CVE-2014documentation
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
the
names
CVE-2014Replace
has
assigned
the
Tools
running
on
(cve.mitre.org)
found
in
VMware
Exposures
project
vulnerability
was
Vulnerabilities
and
dereference
Common
A
kernel
NULL
issues.
The
multiple
security
in
order
to
resolve
2014-3470
are
5298
and
CVE0198CVE-2010documentation
2014-0195
to
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
0224CVE-2014certificates
per
the
names
Microsoft
Windows
has
assigned
the
Tools
running
on
(cve.mitre.org)
found
inCVE-2014VMware
Exposures
project
vulnerability
was
Vulnerabilities
and
dereference
Common
A
kernel
NULL
issues.
The
multiple
security
considered
to
be
2014-3470
are
5298
and
CVEthese
issues.
The
documentation
2014-0195
to
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*
0198
CVE-2010product-specific
0224CVE-20148.1.
Successful
names
CVE-2014Microsoft
Windows
has
assigned
the
Tools
running
on
(cve.mitre.org)
found
inThe
VMware
Exposures
project
vulnerability
Vulnerabilities
and
dereference
Common
issues.
of
moderate
considered
towas
be
2014-3470
are
most
important
these
issues.
The
documentation
2014-0195
to
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
5298CVE-2014documentation
*of
0198
CVE-2010exploitation
of
this
0224CVE-20148.1.
Successful
names
Microsoft
Windows
has
assigned
the
Tools
running
on
(cve.mitre.org)
found
inCVE-2014VMware
Exposures
project
vulnerability
was
Vulnerabilities
and
Common
severity.
of
moderate
considered
to
be
issues
is
most
important
of
these
issues.
The
documentation
2014-0195
to
specific
0221
and
CVEper
the
product3470CVE-2014Reset
passwords
5298CVE-2014issue
could
lead
to
0198
CVE-2010exploitation
of
this
0224CVE-20148.1.
Successful
names
Microsoft
Windows
has
assigned
the
Tools
running
on
(cve.mitre.org)
found
inCVE-2014VMware
Exposures
project
Vulnerabilities
and
Exploitation
is
severity.
of
moderate
CVE-2014these
issues
is
most
important
of
issues.
The
documentation
2014-0195
to
specific
0221
and
CVEper
the
product3470CVE-2014an
escalation
of
5298CVE-2014issue
could
lead
0198
CVE-2010exploitation
of
this
0224CVE-20148.1.
Successful
names
CVE-2014Microsoft
Windows
has
assigned
the
Tools
running
on
(cve.mitre.org)
Exposures
project
highly
unlikely
orto
Exploitation
is
severity.
0224.CVE-2014CVE-2014issues
is
most
important
of
these
issues.
The
documentation
2014-0195
to
specific
0221
and
CVEprivilege
in
the
3470CVE-2014an
escalation
of
5298CVE-2014issue
could
lead
0198
CVE-2010exploitation
of
this
0224CVE-20148.1.
Successful
names
CVE-2014Microsoft
Windows
has
assigned
the
(cve.mitre.org)
is
mitigated
due
to
highly
unlikely
orto
Exploitation
is
0198CVE-20100224.CVE-2014CVE-2014issues
is
most
important
of
these
issues.
The
documentation
2014-0195
to
guest
operating
0221
and
CVEprivilege
in
the
3470CVE-2014an
escalation
of
5298CVE-2014issue
could
lead
to
0198
CVE-2010exploitation
of
this
0224CVE-20148.1.
Successful
names
CVE-2014has
assigned
the
the
application
is
mitigated
due
highly
unlikely
orto
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014these
issues
isThe
most
important
of
issues.
system.
2014-0195
to
guest
operating
0221
and
CVEprivilege
in
the
3470CVE-2014an
escalation
ofthis
5298CVE-2014issue
could
lead
to
0198
CVE-2010exploitation
of
0224CVE-2014names
CVE-2014configuration.CVEthe
application
is
mitigated
due
to
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014issues
is
most
important
of
these
issues.
The
system.
2014-0195
to
guest
operating
0221
and
CVEprivilege
in
the
3470CVE-2014an escalation
of to
5298CVE-2014issue
could and
lead
0198
CVE-20100224CVE-20142014-0221
configuration.CVEthe
application
considered
toisThe
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014issues
most
important
these
issues.
system.
2014-0195
to
guest
operating
0221
and
CVEprivilege
in
the
3470CVE-2014an
escalation
of of
5298CVE-20140198
CVE-2010CVE-20142014-0221
and
configuration.CVEof
moderate
considered
toisThe
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014these
issues
most
important
issues.
system.
2014-0195
to
guest
operating
0221
and
CVEprivilege
in
the of
3470CVE-20145298CVE-20140195which
are
CVE-20142014-0221
and
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014issues
isThe
most
important
of
these
issues.
system.
2014-0195
to
guest
operating
0221
and
CVE3470CVE-2014listed
in
the
0195which
are
CVE-2014Exploitation
is
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014issues
is
most
important
of
these
issues.
The
system.
2014-0195
to
0221
and
CVEOpenSSL
Security
listed
in
the
0195which
are
highly
unlikely
or
Exploitation
is
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014issues
isThe
most important
of
these
issues.
2014-0195
to
Advisory
(see
OpenSSL
Security
listed
in
the
is
mitigated
due
highly
unlikely
orto
Exploitation
is
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014issues
is
most
important
of
these
issues.
The
Reference
section
Advisory
(see
OpenSSL
Security
the
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014these
issues
is
most
important
of
below)do
not
Reference
section
Advisory
(see
configuration.CVEthe
application
is
mitigated
due
to
highly
unlikely
or
Exploitation
is
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014these
issues
is
affect
anylibraries
VMware
below)do
not
Reference
section
OpenSSL
2014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is be
severity.
of
moderate
considered
to
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-2014CVE-2014products.
CVEaffect
anylibraries
VMware
below)do
not
have
been
OpenSSL
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is be
severity.
of
moderate
considered
to
2014-3470
are
5298
and
CVE0198CVE-20100224.CVE-20142014-0224
may
products.
CVEaffect
any
VMware
updated
in
have
been
OpenSSL
libraries
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is
severity.
of
moderate
considered
to
be
2014-3470
are
5298
and
CVE0198CVE-2010lead
to
athe
Man-in2014-0224
may
products.
CVEmultiple
products
updated
in
have
been
OpenSSL
libraries
listed
in
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is be
severity.
of
moderate
considered
to
2014-3470
are
5298
and
CVEthe-Middle
attack
lead
to
athe
Man-in2014-0224
may
to
versions
multiple
products
updated
in
have
been
OpenSSL
Security
libraries
listed
in
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is
severity.
of
considered
to
be
2014-3470
are
if
amoderate
server
is
the-Middle
attack
lead
to
aand
Man-in0.9.8za
1.0.1h
to
versions
multiple
products
updated
in
Advisory
(see
have
been
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
Exploitation
is be
severity.
of
moderate
considered
to
running
a
if
aorder
server
is
the-Middle
attack
in
to
resolve
0.9.8za
and
1.0.1h
to
versions
multiple
products
Reference
section
updated
in
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
due
highly
unlikely
Exploitation
is orto
severity.
of
moderate
vulnerable
version
running
a
if
amitigated
server
is
multiple
security
in
order
to
resolve
0.9.8za
and
1.0.1h
to
versions
below)do
not
multiple
products
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
Exploitation
is orto
severity.
of
OpenSSL
1.0.1
vulnerable
version
running
a
issues.
The
multiple
security
in
order
to
resolve
0.9.8za
and
1.0.1h
affect
any
VMware
to
versions
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
Exploitation
is orto
and
clients
are
of
OpenSSL
1.0.1
vulnerable
version
Common
issues.
The
multiple
security
in
order
to
resolve
products.
CVE0.9.8za
and
1.0.1h
affect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
orto
running
a
and
clients
are
of
OpenSSL
1.0.1
Vulnerabilities
and
Common
issues.
The
multiple
security
2014-0224
may
in
order
to
resolve
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due
to
vulnerable
version
running
a
and
clients
are
Exposures
project
Vulnerabilities
and
Common
issues.
The
lead
toin
athe
Man-inmultiple
security
2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
0195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
of
OpenSSL
0.9.8
vulnerable
version
running
(cve.mitre.org)
Exposures
project
Vulnerabilities
and
Common
the-Middle
attack
issues.
The
lead
toin
aa
Man-in2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
the
0195which
are
CVE-20142014-0221
and
configuration.CVEor
1.0.1.
Updating
of
OpenSSL
0.9.8
vulnerable
version
has
assigned
the
(cve.mitre.org)
Exposures
project
Vulnerabilities
and
if
a server
is
Common
the-Middle
attack
lead
toin
athe
Man-in2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
0195which
are
CVE-20142014-0221
and
the
server
will
or
1.0.1.
Updating
of
OpenSSL
0.9.8
names
CVE-2014has
assigned
the
(cve.mitre.org)
Exposures
project
running
a
Vulnerabilities
and
if
a
server
is
the-Middle
attack
lead
toin
athe
Man-in2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
0195which
are
CVE-2014mitigate
this
issue
the
server
will
or
1.0.1.
Updating
0224CVE-2014names
CVE-2014has
assigned
the
(cve.mitre.org)
vulnerable
version
Exposures
project
running
a
if
a server
is
the-Middle
attack
lead
toin
athe
Man-in2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
0195which
are
for
both
server
mitigate
this
issue
the
server
will
0198
CVE-20100224CVE-2014names
CVE-2014has
assigned
the
of
OpenSSL
1.0.1
(cve.mitre.org)
vulnerable
version
running
a
if
a
server
is
the-Middle
attack
lead
to
a
Man-in2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
and
all
affected
for
both
server
mitigate
this
issue
5298CVE-20140198
CVE-20100224CVE-2014names
CVE-2014and
clients
are
has
assigned
the
of
1.0.1
vulnerable
version
running
if
aOpenSSL
server
is
the-Middle
attack
lead
toany
aa(see
Man-in2014-0224
may
products.
CVEaffect
VMware
below)do
not
Reference
section
Advisory
OpenSSL
Security
clients.CVE-2014and
all
affected
for
both
the
server
3470CVE-20145298CVE-20140198
CVE-20100224CVE-2014running
a
names
CVE-2014and
clients
are
of
OpenSSL
1.0.1
vulnerable
version
running
if
a server
is
the-Middle
attack
lead
to
aa(see
Man-in2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
0224
may
affect
clients.CVE-2014and
all
affected
0221
and
CVE3470CVE-20145298CVE-20140198
CVE-2010vulnerable
version
0224CVE-2014running
a
and
clients
are
of
OpenSSL
1.0.1
vulnerable
version
running
a
if
a
server
is
the-Middle
attack
lead
to
a
Man-in2014-0224
may
products.
CVEaffect
anynot
VMware
below)do
Reference
section
products
0224
may
affect
clients.CVE-20142014-0195
to
0221
and
CVE3470CVE-20145298CVE-2014of
OpenSSL
0.9.8
0198
CVE-2010vulnerable
version
running
aMan-inand
clients
are
of
OpenSSL
1.0.1
vulnerable
version
running
a
if
a
server
is
the-Middle
attack
lead
to
a
2014-0224
may
products.
CVEaffect
any
VMware
below)do
not
differently
products
0224
may
affect
these
issues.
The
2014-0195
to
0221
and
CVE3470CVE-2014or
1.0.1.
Updating
5298CVE-2014of
OpenSSL
0.9.8
vulnerable
version
running
a
and
clients
are
of
OpenSSL
1.0.1
vulnerable
version
running
a
if
a
server
is
the-Middle
attack
lead
to
a
Man-in2014-0224
may
products.
CVEaffect
any
VMware
depending
on
differently
products
most
important
of
these
issues.
The
2014-0195
to
0221
and
CVEthe
server
will
3470CVE-2014or
1.0.1.
of
0.9.8
vulnerable
version
running
aUpdating
and
clients
are
of
OpenSSL
1.0.1
vulnerable
version
running
a
if
aOpenSSL
server
is
the-Middle
attack
lead
to
a
Man-in2014-0224
may
products.
CVEwhether
the
depending
on
differently
issues
is
most
important
of
these
issues.
The
2014-0195
to
mitigate
issue
0221
and
CVEthe
server
will
or
1.0.1.
Updating
of
OpenSSL
0.9.8
vulnerable
version
running
athis
and
clients
are
of
1.0.1
vulnerable
version
running
a
if
aOpenSSL
server
is
the-Middle
attack
lead
to ais
Man-in2014-0224
may
product
acting
whether
the
depending
on

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

OpenSSL
update for
OpenSSL
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
OpenSSL
update
for
products
update
for
multiple
OpenSSL
multiple
products
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiple
update
for
OpenSSL
products
multiplefor
update
OpenSSL
products
multiple
update
for
products
multiple
products

2014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
CVE-2014have
been
issues
isThe
OpenSSL
libraries
most
important
of
these
issues.
2014-0195
to
0221
and
CVE3470CVE-20145298CVE-20140198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
CVE-2014have
been
issues
is
OpenSSL
libraries
most
important
of
these
issues.
The
2014-0195
to
0221
and
CVE3470CVE-20145298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
CVE-2014have
been
these
issues
is
OpenSSL
libraries
most
important
of
issues.
The
2014-0195
to
0221
and
CVE3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
CVE-2014have
been
issues
is
OpenSSL
libraries
most
important
of
these
issues.
The
2014-0195
to
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
theproject
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
CVE-2014have
been
issues
is
OpenSSL
libraries
most
important
of
these
issues.
The
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
CVE-2014have
been
OpenSSL
libraries
these
issues
is
most
important
of
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
0224.CVE-2014updated
in
have
been
CVE-2014OpenSSL
libraries
issues
is
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
0198CVE-2010multiple
products
updated
in
0224.CVE-2014have
been
CVE-2014OpenSSL
libraries
these
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
5298
and
CVEto
versions
multiple
products
0198CVE-2010updated
in
0224.CVE-2014have
been
CVE-2014OpenSSL
libraries
products.
CVEissues
isThe
affect
any
VMware
most
important
of
below)do
not
these
issues.
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
security
considered
to
be
in
order
to
resolve
2014-3470
are
0.9.8za
and
1.0.1h
to
versions
5298
multiple
and
products
CVE0198CVE-2010updated
in
0224.CVE-2014have
been
2014-0224
may
CVE-2014OpenSSL
libraries
products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
multiple
security
considered
to
be
in
order
to
resolve
0.9.8za
and
1.0.1h
2014-3470
to
versions
are
5298
and
products
CVE0198CVE-2010updated
in
lead
to
a
Man-in0224.CVE-2014have
been
2014-0224
may
CVE-2014OpenSSL
libraries
products.
CVEthese
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
of
moderate
security
in
order
to
resolve
considered
0.9.8za
and
to
1.0.1h
be
2014-3470
to
versions
are
5298
multiple
and
products
CVEthe-Middle
attack
0198CVE-2010updated
in
lead
to
a
Man-in0224.CVE-2014have
been
2014-0224
may
CVE-2014OpenSSL
libraries
products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
theproject
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
severity.
issues.
The
multiple
security
of
in
order
moderate
to
resolve
considered
0.9.8za
and
to
1.0.1h
be
2014-3470
to
versions
are
if
a
server
is
5298
and
products
CVEthe-Middle
attack
0198CVE-2010updated
in
lead
to
a
Man-in0224.CVE-2014have
been
2014-0224
may
CVE-2014OpenSSL
libraries
products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Exploitation
is
Common
issues.
The
severity.
multiple
security
of
in
order
moderate
to
resolve
considered
0.9.8za
and
to
1.0.1h
be
running
a
2014-3470
to
versions
are
if
a
server
is
5298
multiple
and
products
CVEthe-Middle
attack
0198CVE-2010updated
in
lead
to
a
Man-in0224.CVE-2014have
been
2014-0224
may
CVE-2014OpenSSL
libraries
products.
CVEthese
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
highly
unlikely
orto
Vulnerabilities
and
Common
Exploitation
issues.
The
is
severity.
multiple
security
of
in
order
moderate
to
resolve
vulnerable
version
considered
0.9.8za
and
to
1.0.1h
be
running
a
2014-3470
to
versions
are
if
a
server
is
5298
multiple
and
products
CVEthe-Middle
attack
0198CVE-2010updated
in
lead
to
a
Man-in0224.CVE-2014have
been
2014-0224
may
CVE-2014products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
is
mitigated
due
Exposures
project
Vulnerabilities
and
highly
Common
unlikely
orto
Exploitation
issues.
The
is
severity.
multiple
security
OpenSSL
1.0.1
of
in
order
moderate
to
resolve
vulnerable
version
considered
0.9.8za
and
to
1.0.1h
be
running
a
2014-3470
to
versions
are
if
a
server
is
5298
multiple
and
products
CVEthe-Middle
attack
0198CVE-2010updated
in
lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEthese
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
the
application
(cve.mitre.org)
Exposures
project
is
Vulnerabilities
mitigated
due
and
highly
Common
unlikely
orto
Exploitation
issues.
The
is
and
clients
are
severity.
multiple
security
OpenSSL
1.0.1
of
in
order
moderate
to
resolve
vulnerable
version
considered
0.9.8za
and
to
1.0.1h
be
running
a
2014-3470
to
versions
if
a
server
is
5298
multiple
and
products
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
isThe
affect
any
VMware
most
important
of
below)do
not
these
issues.
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014configuration.CVEhas
assigned
the
(cve.mitre.org)
the
Exposures
application
project
is
Vulnerabilities
mitigated
due
and
highly
Common
unlikely
orto
running
a
Exploitation
issues.
The
is
and
clients
severity.
multiple
security
OpenSSL
1.0.1
of
in
order
moderate
to
resolve
vulnerable
version
considered
0.9.8za
and
to
1.0.1h
be
running
a
2014-3470
to
versions
are
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-20142014-0221
and
names
CVE-2014has
assigned
the
configuration.CVE(cve.mitre.org)
the
Exposures
application
project
is
Vulnerabilities
mitigated
due
and
vulnerable
version
highly
Common
unlikely
orto
running
a
Exploitation
issues.
The
is
and
clients
are
severity.
multiple
security
OpenSSL
1.0.1
of
in
order
moderate
to
resolve
vulnerable
version
considered
to
be
0.9.8za
and
1.0.1h
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEthese
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-2010CVE-20140224CVE-2014names
CVE-20142014-0221
has
assigned
and
the
configuration.CVE(cve.mitre.org)
the
Exposures
application
project
of
OpenSSL
0.9.8
is
Vulnerabilities
mitigated
due
and
to
vulnerable
version
highly
Common
unlikely
or
running
a
Exploitation
issues.
The
is
and
clients
are
severity.
multiple
security
OpenSSL
1.0.1
of
moderate
in
order
to
resolve
vulnerable
version
considered
to
be
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
isThe
affect
any
VMware
most
important
of
below)do
not
these
issues.
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140195which
are
0198
CVE-20100224CVE-2014CVE-2014names
CVE-20142014-0221
has
assigned
and
the
configuration.CVE(cve.mitre.org)
or
1.0.1.
Updating
the
Exposures
application
project
of
OpenSSL
0.9.8
is
Vulnerabilities
mitigated
due
and
vulnerable
version
highly
Common
unlikely
orto
running
asecurity
Exploitation
is
issues.
The
and
clients
severity.
multiple
OpenSSL
1.0.1
of
vulnerable
version
considered
to
be
running
2014-3470
are
if
amoderate
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
aa
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
isThe
affect
any
VMware
most
important
of
below)do
not
these
issues.
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-2014listed
in
the
5298CVE-20140198
CVE-20100195which
0224CVE-2014are
CVE-2014names
CVE-20142014-0221
has
assigned
and
the
the
server
will
configuration.CVE(cve.mitre.org)
or
1.0.1.
Updating
Exposures
application
project
of
OpenSSL
0.9.8
is
Vulnerabilities
mitigated
due
and
vulnerable
version
highly
unlikely
orto
Common
running
a
Exploitation
is
issues.
The
and
clients
are
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEthese
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVEOpenSSL
Security
3470CVE-20145298CVE-2014listed
0198
CVE-2010in
the
0195which
0224CVE-2014are
CVE-2014names
CVE-2014mitigate
issue
2014-0221
has
assigned
and
the
server
will
configuration.CVE(cve.mitre.org)
or
1.0.1.
Updating
the
application
Exposures
project
of
OpenSSL
0.9.8
is
mitigated
due
Vulnerabilities
and
vulnerable
version
highly
unlikely
orto
Common
running
a
Exploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
athis
2014-3470
are
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
Reference
section
2014-0195
to
Advisory
(see
0221
and
CVE3470CVE-2014OpenSSL
5298CVE-2014Security
listed
0198
CVE-2010in
the
0195which
0224CVE-2014are
for
both
server
CVE-2014names
CVE-2014mitigate
this
issue
2014-0221
has
assigned
and
the
server
will
configuration.CVE(cve.mitre.org)
or
1.0.1.
Updating
the
application
Exposures
project
of
OpenSSL
0.9.8
is
mitigated
due
Vulnerabilities
and
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
are
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEthese
issues
is
affect
any
VMware
most
important
of
below)do
not
issues.
The
Reference
section
2014-0195
to
0221
and
CVEAdvisory
3470CVE-2014(see
OpenSSL
5298CVE-2014Security
listed
0198
CVE-2010in
the
and
all
affected
0195which
0224CVE-2014are
for
both
server
CVE-2014names
CVE-2014mitigate
this
issue
2014-0221
and
has
assigned
the
server
will
configuration.CVE(cve.mitre.org)
or
1.0.1.
Updating
the
application
Exposures
project
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
are
severity.
of
OpenSSL
1.0.1
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
is
affect
any
VMware
most
important
of
below)do
not
these
issues.
The
2014-0195
to
Reference
0221
and
CVEsection
Advisory
3470CVE-2014(see
OpenSSL
5298CVE-2014Security
clients.CVE-2014listed
0198
CVE-2010in
the
and
all
affected
0195which
are
0224CVE-2014for
both
server
CVE-2014names
CVE-2014mitigate
this
issue
2014-0221
and
has
assigned
the
server
will
configuration.CVE(cve.mitre.org)
or
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
are
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
is
affect
any
VMware
most
important
of
these
issues.
The
below)do
2014-0195
not
to
Reference
0221
and
CVEsection
Advisory
3470CVE-2014(see
0224
may
affect
OpenSSL
Security
5298CVE-2014clients.CVE-2014listed
in
the
0198
CVE-2010and
all
affected
0195which
are
0224CVE-2014for
both
server
CVE-2014names
CVE-2014mitigate
this
issue
2014-0221
and
has
assigned
the
the
server
will
configuration.CVEor
1.0.1.
Updating
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
are
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014products.
CVEissues
is
most
important
of
affect
these
issues.
any
VMware
The
below)do
2014-0195
not
to
Reference
0221
and
CVEsection
products
Advisory
(see
3470CVE-20140224
may
affect
OpenSSL
Security
5298CVE-2014clients.CVE-2014listed
in
the
0198
CVE-2010and
all
affected
0195which
are
0224CVE-2014for
both
server
CVE-2014names
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
to
vulnerable
version
highly
unlikely
or
running
a
Exploitation
is
and
clients
are
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
a
Man-in0224.CVE-20142014-0224
may
CVE-2014issues
is
products.
most
important
CVEof
affect
these
issues.
any
VMware
The
below)do
not
2014-0195
to
differently
Reference
section
0221
and
CVEproducts
Advisory
(see
3470CVE-20140224
may
affect
OpenSSL
Security
5298CVE-2014clients.CVE-2014listed
in
the
0198
CVE-2010and
all
affected
0195which
are
0224CVE-2014for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
aMan-inExploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
vulnerable
version
considered
to
be
running
2014-3470
are
if
amoderate
server
is
5298
and
CVEthe-Middle
attack
0198CVE-2010lead
to
aa
0224.CVE-2014CVE-20142014-0224
issues
may
isThe
products.
most
important
CVEof
affect
any
VMware
these
issues.
depending
on
below)do
not
2014-0195
to
differently
Reference
section
0221
and
CVEproducts
Advisory
(see
3470CVE-20140224
may
affect
OpenSSL
Security
5298CVE-2014clients.CVE-2014listed
in
the
0198
CVE-2010and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
the
server
will
configuration.CVEor
1.0.1.
Updating
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
are
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
if
a
server
is
5298
and
CVEthe-Middle
attack
0198CVE-20100224.CVE-2014lead
CVE-2014to
a
Man-in2014-0224
may
these
issues
is
products.
CVEmost
important
of
whether
the
affect
any
VMware
issues.
The
depending
on
below)do
not
2014-0195
to
differently
Reference
section
0221
and
CVEproducts
Advisory
(see
3470CVE-20140224
may
affect
OpenSSL
5298CVE-2014Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
to
vulnerable
version
highly
unlikely
or
running
a
Exploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
are
if
a
server
is
5298
and
CVE0198CVE-2010the-Middle
0224.CVE-2014attack
lead
to
a
Man-inCVE-20142014-0224
may
issues
isThe
product
is
acting
products.
CVEmost
important
of
whether
the
affect
any
VMware
these
issues.
depending
on
below)do
not
2014-0195
to
differently
Reference
section
0221
and
CVEproducts
Advisory
3470CVE-2014(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
due
vulnerable
version
highly
unlikely
orto
running
aMan-inExploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
moderate
vulnerable
version
considered
to
be
running
a
2014-3470
are
5298
and
CVEif
amitigated
server
is
0198CVE-2010the-Middle
attack
0224.CVE-2014lead
to
ais
CVE-2014as
aboth
client
or
a
2014-0224
may
issues
is
product
acting
products.
CVEmost
important
of
whether
the
affect
any
VMware
these
issues.
The
depending
on
below)do
2014-0195
not
to
differently
Reference
0221
and
CVEsection
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
are
severity.
of
OpenSSL
1.0.1
moderate
vulnerable
version
considered
to
be
2014-3470
running
a
5298
and
CVEif
a
server
is
0198CVE-2010the-Middle
attack
0224.CVE-2014server
and
of
lead
to
a
Man-inCVE-2014as
a
client
or
a
2014-0224
may
these
issues
is
product
is
acting
products.
CVEmost
important
of
whether
the
affect
issues.
any
VMware
The
depending
on
below)do
2014-0195
not
to
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
severity.
OpenSSL
1.0.1
of
moderate
considered
to
be
vulnerable
version
2014-3470
are
running
a
5298
and
CVEif
a
server
is
0198CVE-2010which
version
of
the-Middle
attack
0224.CVE-2014server
and
of
lead
to
a
Man-inCVE-2014as
a
client
or
a
2014-0224
issues
may
is
product
is
acting
products.
most
important
CVEof
whether
the
affect
these
issues.
any
VMware
The
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
the
server
will
configuration.CVEor
1.0.1.
Updating
application
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
and
clients
severity.
of
moderate
OpenSSL
1.0.1
considered
to
be
vulnerable
version
2014-3470
are
running
a
5298
and
CVEOpenSSL
the
if
a
server
is
0198CVE-2010which
version
of
the-Middle
attack
0224.CVE-2014server
and
of
lead
CVE-2014to
a
Man-inas
a
client
or
a
2014-0224
these
issues
may
is
product
is
acting
products.
most
important
CVEof
whether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
running
a
Exploitation
is
severity.
and
clients
are
of
moderate
OpenSSL
1.0.1
considered
to
be
vulnerable
version
2014-3470
product
is
using.
running
a
5298
and
CVEOpenSSL
the
if
0198CVE-2010a
server
is
which
version
of
the-Middle
0224.CVE-2014attack
server
and
of
lead
CVE-2014to
a
Man-inas
a
client
or
a
2014-0224
these
issues
may
is
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
of
OpenSSL
0.9.8
is
mitigated
due
vulnerable
version
highly
unlikely
orto
Exploitation
isissue
running
a
severity.
and
clients
moderate
of
OpenSSL
1.0.1
considered
to
be
For
readability
the
vulnerable
version
2014-3470
are
product
is
using.
running
5298
and
a
CVEOpenSSL
the
if
0198CVE-2010a
server
is
which
version
the-Middle
0224.CVE-2014attack
server
and
of
lead
CVE-2014to
a
Man-inas
a
client
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
both
server
CVE-2014mitigate
this
issue
2014-0221
and
the
server
will
configuration.CVEor
1.0.1.
Updating
application
OpenSSL
0.9.8
is
due
highly
unlikely
orto
vulnerable
version
Exploitation
isaof
running
a
severity.
and
clients
of
moderate
affected
considered
OpenSSL
to
1.0.1
be
For
readability
the
vulnerable
2014-3470
version
are
product
is
using.
running
5298
and
aproducts
CVEOpenSSL
the
if
0198CVE-2010amitigated
server
is
which
version
the-Middle
0224.CVE-2014attack
server
and
of
lead
to
ais
Man-inas
aboth
client
or
2014-0224
may
product
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEor
1.0.1.
Updating
the
application
is
mitigated
due
of
OpenSSL
0.9.8
highly
unlikely
orto
vulnerable
version
Exploitation
is
running
a
severity.
have
been
split
and
clients
affected
of
considered
OpenSSL
to
1.0.1
be
For
readability
the
vulnerable
2014-3470
version
are
product
using.
running
5298
and
aproducts
CVEOpenSSL
the
if
0198CVE-2010amoderate
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
client
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
server
CVE-2014mitigate
this
issue
2014-0221
and
server
will
configuration.CVEthe
application
or
1.0.1.
Updating
is
mitigated
due
of
OpenSSL
0.9.8
highly
unlikely
orto
vulnerable
Exploitation
version
is
into
3client
tables
below
running
severity.
aproducts
have
been
split
and
clients
affected
of
considered
OpenSSL
to
1.0.1
be
For
readability
the
vulnerable
2014-3470
version
are
product
using.
running
5298
and
a
CVEOpenSSL
the
if
amoderate
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
server
CVE-2014mitigate
this
issue
2014-0221
and
configuration.CVEserver
will
the
application
or
1.0.1.
Updating
is
due
highly
OpenSSL
unlikely
0.9.8
orto
based
on
the
vulnerable
Exploitation
version
is
into
3client
tables
below
running
severity.
a
have
been
split
and
of
moderate
clients
are
affected
considered
OpenSSL
to
1.0.1
be
For
readability
the
vulnerable
2014-3470
version
product
is
using.
running
aproducts
OpenSSL
the
if
amitigated
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
for
server
CVE-20142014-0221
and
mitigate
this
issue
configuration.CVEthe
server
application
will
or
is
mitigated
1.0.1.
Updating
due
different
clientof
highly
OpenSSL
unlikely
0.9.8
orto
based
on
the
vulnerable
Exploitation
version
is
into
3
tables
below
running
severity.
aproducts
have
been
split
and
clients
are
affected
of
considered
OpenSSL
to
1.0.1
be
For
readability
the
vulnerable
version
product
using.
running
a
OpenSSL
the
if
amoderate
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
client
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
and
all
affected
0195which
are
CVE-2014for
server
2014-0221
and
mitigate
configuration.CVEthis
issue
the
server
application
will
server
or
is
mitigated
1.0.1.
Updating
due
different
clienthighly
OpenSSL
unlikely
0.9.8
orto
based
on
the
vulnerable
Exploitation
version
is
into
3client
tables
below
running
severity.
a
have
been
split
and
of
clients
are
affected
OpenSSL
1.0.1
For
readability
the
vulnerable
version
product
using.
running
aproducts
OpenSSL
the
if
amoderate
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
clients.CVE-2014listed
in
the
0195which
are
and
CVE-2014all
affected
for
2014-0221
and
server
mitigate
configuration.CVEthis
issue
configurations
and
the
server
application
will
server
or
is
1.0.1.
Updating
due
different
clientof
highly
OpenSSL
unlikely
0.9.8
orto
based
on
the
vulnerable
Exploitation
version
is
into
3client
tables
below
running
severity.
a
have
been
split
and
clients
are
affected
of
OpenSSL
1.0.1
For
readability
the
vulnerable
version
product
using.
running
aproducts
OpenSSL
the
if
amitigated
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
0224
may
affect
OpenSSL
Security
listed
in
the
clients.CVE-20140195which
are
and
CVE-2014all
affected
for
2014-0221
and
server
deployment
mitigate
configuration.CVEthis
issue
configurations
and
the
server
application
will
server
or
is
mitigated
1.0.1.
Updating
due
different
clientof
highly
OpenSSL
unlikely
0.9.8
orto
based
on
the
vulnerable
Exploitation
version
is
into
3client
tables
below
running
aproducts
have
been
split
and
clients
are
affected
of
1.0.1
For
readability
the
vulnerable
version
product
using.
running
a
OpenSSL
the
if
aOpenSSL
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
products
Advisory
(see
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
CVE-2014all
affected
scenarios.
for
2014-0221
and
server
deployment
mitigate
configuration.CVEthis
issue
configurations
and
the
server
application
will
server
or
is
1.0.1.
Updating
due
different
clientof
highly
OpenSSL
unlikely
0.9.8
orto
based
on
the
vulnerable
version
into
3client
tables
below
running
a
have
been
split
and
clients
are
affected
of
OpenSSL
1.0.1
For
readability
the
vulnerable
version
product
is
using.
running
aproducts
OpenSSL
the
if
amitigated
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
differently
Reference
section
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
CVE-2014all
affected
scenarios.
for
2014-0221
and
server
deployment
mitigate
configuration.CVEthis
issue
configurations
and
the
server
application
will
server
or
is
mitigated
1.0.1.
Updating
due
to
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
of
1.0.1
For
readability
the
vulnerable
version
product
using.
running
aproducts
OpenSSL
the
if
aOpenSSL
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
client
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
depending
on
below)do
not
Reference
section
differently
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
CVE-2014all
affected
scenarios.
for
2014-0221
and
server
deployment
mitigate
configuration.CVEthis
issue
configurations
and
the
server
application
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3client
tables
below
running
aproducts
have
been
split
and
clients
are
affected
of
1.0.1
For
readability
the
vulnerable
version
product
using.
running
a
OpenSSL
the
if
aOpenSSL
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
or
aof
2014-0224
may
product
is
acting
products.
CVEwhether
the
affect
any
VMware
below)do
not
depending
Reference
section
on
differently
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
CVE-2014all
affected
scenarios.
for
2014-0221
and
server
deployment
mitigate
configuration.CVEthis
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
products
of
OpenSSL
1.0.1
For
the
vulnerable
version
product
is
using.
running
athe
OpenSSL
the
if
aareadability
server
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
client
or
aof
2014-0224
may
product
acting
products.
CVEaffect
any
VMware
whether
below)do
not
depending
Reference
section
on
differently
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
CVE-2014all
affected
scenarios.
for
2014-0221
both
and
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
products
of
OpenSSL
1.0.1
For
readability
vulnerable
version
product
is
using.
running
a
OpenSSL
the
if
a
server
is
which
version
of
the-Middle
attack
server
and
of
lead
to
ais
Man-inas
aboth
client
or
a the
2014-0224
may
products.
CVEproduct
affect
any
acting
VMware
whether
below)do
the
not
depending
Reference
section
on
differently
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
CVE-2014all
affected
scenarios.
for
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
products
of
OpenSSL
1.0.1
For
readability
the
vulnerable
version
product
is
using.
running
a
OpenSSL
the
if
aaserver
is
which
version
the-Middle
attack
server
and
of
lead
to
ais
Man-in2014-0224
may
as
products.
client
or
CVEaof
product
affect
any
acting
VMware
whether
below)do
the
not
depending
Reference
section
on
differently
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-20140195which
are
and
all
affected
scenarios.
for
both
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
of
1.0.1
For
readability
the
vulnerable
version
product
using.
running
aproducts
OpenSSL
the
if
aOpenSSL
server
is
which
version
the-Middle
attack
lead
to
ais
Man-inserver
2014-0224
and
of
may
as
products.
aboth
client
or
CVEaof
product
affect
any
is
acting
VMware
whether
below)do
the
not
depending
Reference
section
on
differently
Advisory
(see
products
OpenSSL
Security
0224
listed
may
in
the
affect
clients.CVE-2014and
all
affected
scenarios.
for
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
products
of
OpenSSL
1.0.1
For
readability
vulnerable
version
product
is
using.
running
a
OpenSSL
the
if
a
server
is
the-Middle
attack
which
lead
to
version
a
Man-inof
server
2014-0224
and
of
may
as
products.
aboth
client
or
CVEa the
product
affect
any
is
acting
VMware
whether
below)do
the
not
depending
Reference
section
on
differently
Advisory
(see
products
OpenSSL
Security
0224
may
affect
clients.CVE-2014and
all
affected
scenarios.
for
the
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
products
of
OpenSSL
1.0.1
For
readability
the
vulnerable
version
product
is
using.
running
athe
if
aaserver
is
OpenSSL
the-Middle
the
attack
which
lead
to
version
ais
Man-inserver
2014-0224
and
of
may
as
products.
client
or
CVEaof
product
affect
any
acting
VMware
whether
below)do
not
depending
Reference
section
on
differently
Advisory
(see
products
0224
may
affect
clients.CVE-2014and
all
affected
scenarios.
for
both
the
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
running
a
have
been
split
and
clients
are
affected
products
of
1.0.1
For
readability
the
vulnerable
version
product
if
aOpenSSL
server
using.
is
OpenSSL
the-Middle
the
attack
which
lead
to
version
ais
Man-inserver
2014-0224
and
of
may
as
products.
aboth
client
or
CVEaof
product
affect
any
is
acting
VMware
whether
below)do
the
not
depending
Reference
section
on
differently
products
0224
may
affect
clients.CVE-2014and
all
affected
scenarios.
for
the
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
into
3
tables
below
have
been
split
and
clients
are
affected
products
of
OpenSSL
1.0.1
vulnerable
version
For
running
readability
a
the
product
if
a
server
is
using.
is
OpenSSL
the-Middle
the
attack
which
lead
to
version
ais
Man-inserver
2014-0224
and
of
may
as
products.
aboth
client
or
CVEaof
product
affect
any
acting
VMware
whether
below)do
the
not
depending
on
differently
products
0224
may
affect
clients.CVE-2014and
all
affected
scenarios.
for
the
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
client0.9.8
based
on
the
into
3
tables
below
running
a
have
been
split
and
clients
are
of
OpenSSL
1.0.1
affected
vulnerable
products
version
For
the
product
if
aareadability
server
is
using.
is
OpenSSL
the-Middle
the
attack
which
lead
to
version
ais
Man-inserver
2014-0224
and
of
may
as
products.
client
or
CVEaof
product
affect
any
acting
VMware
whether
the
depending
on
differently
products
0224
may
affect
clients.CVE-2014and
all
affected
scenarios.
for
both
the
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
clientof
OpenSSL
0.9.8
based
on
the
vulnerable
version
into
3
tables
below
and
clients
are
have
been
split
1.0.1
affected
products
For
running
readability
a
product
if
a
server
is
using.
is
OpenSSL
the-Middle
the
attack
which
lead
to
version
a
Man-inof
server
2014-0224
and
of
may
as
products.
aboth
client
or
CVEa the
product
is
acting
whether
the
depending
on
differently
products
0224
may
affect
clients.CVE-2014and
all
affected
scenarios.
for
the
server
deployment
mitigate
this
issue
configurations
and
the
server
will
server
or
1.0.1.
Updating
different
client0.9.8
based
on
the
into
and
clients
3
tables
are
below
have
of
OpenSSL
been
split
1.0.1
affected
vulnerable
products
version
For
running
readability
a
the
product
if
a
server
is
using.
is
OpenSSL
the-Middle
the
attack
which
lead
toversion
ais
Man-inserver
and
of
2014-0224
may
as
a client
or
aof
product
acting
whether
the
depending
on

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0006
VMSA-2014-0007
VMSA-2014-0007
VMSA-2014-0007
VMSA-2014-0007
VMSA-2014-0007
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0008
VMSA-2014-0009
VMSA-2014-0009
VMSA-2014-0009
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

2014-0221
and
configuration.CVEthe
application
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
Exploitation
is orto
CVE-20142014-0221
and
configuration.CVE2014-0221
and
configuration.CVEthe
application
is
mitigated
due
highly
unlikely
OpenSSL
0195which and
are orto
CVE-20142014-0221
CVE-20142014-0221
and
configuration.CVEthe
application
is
mitigated
due to
update for
OpenSSL
listed
in theare
0195which
CVE-20140195which
are
CVE-20142014-0221
and
configuration.CVEthe
application
multiple
update
for
OpenSSL
Security
OpenSSL
listed in theare
0195which
listed
in the
0195which
are
CVE-20142014-0221
and
configuration.CVEproducts
multiplefor
Advisory
(see
update
OpenSSL
Security
listed
in the
OpenSSL
Security
listed
in
the
0195which
are
CVE-20142014-0221
and
The
Apache
Struts
products
Reference(see
section
multiple
Advisory
The
Apache
OpenSSL
Security
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
CVE-2014library
is (see
updated
Apache
Struts
below)do
not
products
Reference
section
Struts
library is The
Advisory
The Apache
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
0195which
are
to
address
a
library
is
updated
The
Apache
Struts
affect
any
VMware
below)do
not
updated.
Struts
library is Reference section
The
Apache
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
listed
in
the
security
issue.
The
to
address
a
library
is
updated
products.
CVEaffect
anynot
VMware
updated.
Struts
library is below)do
The
Apache
affect
any
VMware
below)do
not
Reference
section
Advisory
(see
OpenSSL
Security
Common
security
issue.
The
address
amay
2014-0224
products.
CVEaffect
any
VMware
updated.
Struts
library is to
The
Apache
products.
CVEaffect
any
VMware
below)do
not
Reference
section
Advisory
(see
Vulnerabilities
and
Common
security
issue.
The
lead
to
a
Man-in2014-0224
may
products.
CVEupdated.
Struts
library
is products.
vCenter
Server
2014-0224
may
CVEaffect
any
VMware
below)do
not
Reference
section
Exposures
project
Vulnerabilities
and
Common
the-Middle
attack
lead
to
a
Man-inmay
updated.Struts
Apache
vCenter
Server 2014-0224
tc-server
has
been
lead
toany
a Man-in2014-0224
may
products.
CVEaffect
VMware
below)do
not
(cve.mitre.org)
has
Exposures
project
Vulnerabilities
and
if
a
server
is
the-Middle
attack
lead
to
a
Man-inUpdate
Apache Struts
tc-server
vCenter
Server tc-server
updated
to
version
has
been
the-Middle
attack
lead
to
a
Man-in2014-0224
may
products.
CVEaffect
any
VMware
assigned
the
(cve.mitre.org)
has
Exposures
project
running
a is
if
a server
the-Middle
attack
Update
Apache
Struts
2.9.5
/ Apache
tc-server
2.9.5
to
address
vCenter
Server updated
to
version
tc-server
has
been
if
a
server
is
the-Middle
attack
lead
to
a
Man-in2014-0224
may
Oracle
has
products.
CVEidentifier
CVEassigned
(cve.mitre.org)
has
vulnerable
version
running
athe
a server
is
Update
Tomcat
7.0.52 if
2.9.5 / Apache
multiple
tc-server
2.9.5
tohas
updated
to
version
running
asecurity
if
server
is
the-Middle
attack
lead
to
aaddress
Man-indocumented
the
2014-0224
may
Oracle
2014-0114
to
this
identifier
CVEassigned
the
ofaOpenSSL
1.0.1
vulnerable
version
running
a
updates
Tomcat
7.0.52 2.9.5
issues.
2.9.5
/ Apache
multiple
toThis
vulnerable
version
running
asecurity
if
server
is
the-Middle
attack
CVE
identifiers
lead
to
aaddress
Man-indocumented
the
issue.This
issue
2014-0114
to
this
identifier
CVEand
clients
are
ofaOpenSSL
1.0.1
version
updates7.0.52 vulnerable
version
of
tcTomcat
issues.
This
multiple
security
of
OpenSSL
1.0.1
vulnerable
version
running
a
if
a
server
is
that
are
addressed
the-Middle
VMware
NSX
attack
and
CVE
identifiers
may
lead
to
issue.This
issue
2014-0114
to
this
running
a are
and
clients
of
OpenSSL
1.0.1
server
includes
updates
version
of
tcissues.
This
and
clients
are
of
OpenSSL
1.0.1
vCenter and
vulnerable
version
running
a
in
JRE
1.7.0
if
vCNS
a
server
contain
is
an
that
are
addressed
remote
VMware
code
NSX
and
may
leada to
issue.This
issue
vulnerable
version
running
and
clients
are
Tomcat
server
includes
version
of
tcrunning
a
and
clients
are
ESXi Apache
glibc
is
updated
Update to
of
OpenSSL
1.0.1
vCenter
and
vulnerable
version
update
55
in
the
running
input
validation
a
in
1.7.0
execution
vCNS
contain
after
an to
remote
VMware
code
NSX
and
may
lead
to
of JRE
OpenSSL
0.9.8
vulnerable
version
running
a
7.0.52.
Apache
Tomcat
server
includes
vulnerable
version
running
a
glibc
package
address
multiple
ManagerOracle
and
clients
are
Update
to
ESXi
glibc
is
updated
of
OpenSSL
1.0.1
Oracle
Java
SE
VMware NSX
vulnerable
vulnerability.
version
This
update
55
in
the
authentication.
input
validation
execution
vCNS
contain
after
an to
remote
Bash
libraries
code
or
1.0.1.
Updating
of
OpenSSL
0.9.8
vulnerable
version
7.0.52.
Apache
Tomcat
of
OpenSSL
0.9.8
vulnerable
version
security
issues.
JRE
Update
running
a
glibc1.7
package
address
multiple
ManagerOracle
and
clients
are
Critical
Patch
Update
to
ESXi Bash
glibc
is
updated
and
vCNS
of
issue
may
allow
1.0.1
Oracle
Java
SE
VMware
NSX
vulnerability.
Thisto
authentication.
input
validation
execution
have
been
after
the
server
libraries
will
or OpenSSL
1.0.1.
Updating
of
OpenSSL
0.9.8
7.0.52.
or
1.0.1.
Updating
of
OpenSSL
0.9.8
55
vulnerable
version
security
issues.
JRE
Update
running
a
Update
Advisory
glibc1.7
package
address
multiple
information
and
for
critical
clients
are
Critical
Patch
and
vCNS
issue
may
allow
VMware
NSX
vulnerability.
Thisof
authentication.
updated
in
mitigate
have
been
this
the
Bash
server
libraries
willissue
or
1.0.1.
Updating
the
server
will
or
1.0.1.
Updating
of
OpenSSL
0.9.8
55
vulnerable
version
April
2014.
The
security
issues.
disclosure
running
information
a
Update
Advisory
of
information
for
critical
and
vCNS
issue
may
allow
multiple
products
updated
both
the
in
server
mitigate
have
been
this
issue
the
server
will
Bash
libraries
mitigate
this
issue
the
server
will
or
1.0.1.
Updating
of
OpenSSL
0.9.8
References
section
vulnerability
vulnerable
disclosure.
version
April
2014.
The
disclosure
information
information
for
critical
to
resolve
multiple
and
multiple
all
affected
products
both
the
server
updated
in
mitigate
this
issue
have
been
Bash
libraries
for
both
the
server
mitigate
this
issue
the
server
will
or
1.0.1.
Updating
provides
a
link
to
of
OpenSSL
0.9.8
References
section
vulnerability
disclosure.
disclosure
information
Bash
update
critical
security
clients.CVE-2014to
resolve
multiple
andboth
all
affected
multiple
products
for
the
updated
in server
have
been
Bash
libraries
and
all
affected
for
both
the
server
mitigate
this
issue
the
server
will
this
advisory.
This
or
1.0.1.
Updating
provides
a
link
to
vulnerability
disclosure.
for
multiple
issuesalso
referred
0224
may
affect
Bash update
critical
security
clients.CVE-2014to
resolve
and
all
affected
multiple
products
updated
inmultiple
have
been
Bash
libraries
clients.CVE-2014and
all
affected
for
both
the
server
mitigate
this
issue
issue
may
lead
to
the
server
will
this
advisory.
This
products
as Shellshock.
products
for
multiple
issuesalso
referred
0224
may
affect
Bash
update
critical
security
clients.CVE-2014to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
0224
may
affect
clients.CVE-2014and
all
affected
for
both
the
server
remote
code
mitigate
this
issue
issue
may
lead
to
differently
products
to
as
Shellshock.
products
for
multiple
issuesalso
referred
0224
may
affect
Bash
update
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
products
0224
may
affect
clients.CVE-2014and
all
affected
execution
after
for
both
the
server
remote
code
depending
on
differently
products
to
as
Shellshock.
products
for multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
differently
products
0224
may
affect
clients.CVE-2014authentication.
and
all
affected
execution
after
whether
the
depending
on
differently
products
as
Shellshock.
for
multiple
issuesalso
Bash
update
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
depending
on
differently
products
0224
may
affect
clients.CVE-2014authentication.
product
is
acting
whether
the
depending
on
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
whether
the
depending
ona
differently
products
0224
may
affect
as
a
client
or
product
is
acting
whether
the
products
as Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
product
is
acting
whether
the
depending
on
differently
products
server
and
of a
as
a client
or
product
is
acting
products
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
as
a
client
or
product
is
acting
whether
the
depending
on
differently
which
version
server
and
of a
as
a client
or
aof
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
server
and
of
as
a
client
or
product
is
acting
whether
the
depending
on
OpenSSL
the
which
version
server
and
of aof
products
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
which
version
Bash
libraries
server
and
of aof
as
a
client
or
product
is
acting
whether
the
product
isthe
using.
OpenSSL
which
version
of
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
updated
in
OpenSSL
the
have
been
which
version
Bash
libraries
server
and
of aof
as
a
client
or
product
is
acting
For
readability
the
product
is
using.
OpenSSL
the
products
to
as
Shellshock.
for multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
product
is
using.
updated
in
OpenSSL
the
have
been
which
version
of
Bash
libraries
server
and
of
as
a
client
or
a
affected
products
For
readability
the
product
is using.
products
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
For
readability
multiple
products
product
is
using.
updated
in
OpenSSL
the
have
been
which
version
of
Bash
libraries
server
and
of
have
been
splitthe
affected
products
For
readability
the
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
affected
resolve
multiple
For
readability
the
multiple
products
product
is
using.
updated
in
OpenSSL
the
have
been
which
version
of
Bash
into
3libraries
tables
below
have
been
split
affected
products
products
as
Shellshock.
for
multiple
issuesalso
referred
have
been
split
Bash
update
critical
security
affected
to
resolve
multiple
For
readability
the
multiple
products
product
is
using.
updated
in
OpenSSL
the
have
been
Bash
based
on the
into
3libraries
tables
below
have
been
split
products
as
Shellshock.
into
3
tables
below
for
multiple
issuesalso
referred
have
been
split
Bash
update
critical
security
affected
products
to
resolve
multiple
For
readability
the
multiple
product
using.
updated
have
been
Bash
different
clientbased
onisin
the
into
3libraries
tables
below
based
on
the
products
to
as
Shellshock.
into
3
tables
below
for
multiple
issuesalso
referred
have
been
splitthe
Bash update
critical
security
affected
resolve
multiple
For
readability
multiple
products
updated
in
have
been
Bash
libraries
server
different
clientbased
on
the
different
clientbased
on
the
products
as
Shellshock.
into
3
tables
below
for
multiple
issuesalso
referred
have
been
split
Bash
update
critical
security
affected
to
resolve
multiple
multiple
products
updated
in
have
been
configurations
and
Bash
libraries
server
different
clientserver
different
clientbased
on
the
products
as
Shellshock.
into
3
tables
for
multiple
issuesalso
referred
have
been
split
Bash
update
critical
security
to
resolve
multiple
multiple
products
updated
in below
deployment
have
been
configurations
and
Bash
libraries
server
configurations
and
server
different
clientbased
on
the
products
to
as
into
3Shellshock.
tables
below
for multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
scenarios.
updated
in
deployment
have
been
configurations
and
Bash
libraries
deployment
configurations
and
server
different
clientbased
on
the
products
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
multiple
products
scenarios.
updated
in
deployment
have
been
Bash
libraries
scenarios.
deployment
configurations
and
server
different
clientproducts
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
scenarios.
updated
in
have
been
Bash
libraries
scenarios.
deployment
configurations
and
server
products
as Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
scenarios.
deployment
configurations
and
products
as Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
products
updated
inmultiple
scenarios.
deployment
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
scenarios.
products
as Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
products
to as Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
products
to
as
Shellshock.
for multiple
issuesalso referred
products
to as Shellshock.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

Bash update
for multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for
multiple
Bash update
products
for
multiple
Bash
update
products
for
multiple
Bash
update
products
for multiple
products

have libraries
been
Bash
multiple
products
updated
in
have
been
Bash
libraries
to resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
critical
security
to
resolve
multiple
products
updated
inmultiple
have libraries
been
Bash
issuesalso
referred
critical
security
to resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in
have libraries
been referred
Bash
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple
products
updated
in referred
have
been
Bash
libraries
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
as
Shellshock.
issuesalso
critical
security
to
resolve
multiple
multiple products
updated
in referred
to
as
Shellshock.
issuesalso
referred
critical
security
resolve
multiple
multiple
products
as Shellshock.
issuesalso
referred
critical
security
to
resolve
multiple
to as Shellshock.
issuesalso
referred
critical
security
to
as
Shellshock.
issuesalso referred
to as Shellshock.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0010
VMSA-2014-0011
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0012
VMSA-2014-0013
VMSA-2014-0013
VMSA-2014-0013
VMSA-2014-0013
VMSA-2014-0013
VMSA-2014-0014
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

have libraries
been
Bash
the
affected
VDP
VMware
vCenter
exclusively
use
Environments
that
vCenter
Server.
to
connect
directly
function
in
vCAC
multiple
products
updated
have
been
Bash
libraries
server
using
Java
Server
Appliance
vCloud
Director
exclusively
use
Environments
that
vCenter
Server.
to
connect
directly
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
API
calls.
No
(vCSA)
contains
a
(vCD)
as
a
proxy
vCloud
Director
exclusively
use
Environments
that
to
vCenter
Server.
Bash update
critical
security
to
resolve
multiple
products
updated
inmultiple
have
been
Bash
libraries
authentication
to
vulnerability
to
connect
to
(vCD)
as
a
proxy
vCloud
Director
exclusively
usethat
Environments
for multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
the
VDP
server
is
that
may
allow
vCenter
Server
are
to
connect
to
(vCD)
as
a
proxy
vCloud
Director
exclusively
use for
products
to
as
Shellshock.
for multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
required
for
this
Cross
Site
vCenter
Server
Not
to
connect
to Atare
(vCD)
as
a multiple
proxy
vCloud
Director
products
asAffected.
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
products
updated
in
have
been
Bash
libraries
potential
attack.
Scripting.
does
not
properly
this
time
the
Not
Affected.
Atare
vCenter
Server
to
connect
to issue
(vCD)
as
a multiple
proxy
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
products
updated
in
have
been
Bash
libraries
Exposed
Exploitation
of
this
validate
the
does
not
properly
vCenter
is
remediated
Server
by
this
time
the
issue
Not
Affected.
are
to
connect
to At
products
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
multiple
products
updated
in
have
been
Bash
libraries
VMware
information
vulnerability
in
presented
validate
the
does
removing
not
properly
the
is remediated
by
this
time
the
issue
Not
Affected.
At
vCenter
Server
are
VMware
products
as Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
updated
in
have
been
vSphere
Data to
includes
MCUser
vCenter
Server
certificate
presented
validate
"Connect
the
(by)
removing
theissue
is
remediated
by
this
time
the
Not
Affected.
At
ESXiWorkstationPl
VMware
products
to
as
Shellshock.
for multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
multiple
products
updated
in
Protection
and
GSAN
account
requires
tricking
when
establishing
certificate
presented
Using
VMRC"
"Connect
(by)
removing
the
is
remediated
by a
this
time
the
issue
ayer
and
Fusion
ESXiWorkstationPl
VMware
products
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
to
resolve
multiple
multiple
products
product
update passwords
of
all
user
toestablishing
click
a
to
a
when
certificate
functionality
Using
VMRC"
"Connect
(by)
removing
thefor
is connection
remediated
byon
contain
an
ayer
and
Fusion
ESXiWorkstationPl
VMware
products
to
as
Shellshock.
for
multiple
issuesalso
referred
Bash
update
critical
security
resolve
multiple
addresses
a
grid
systems
that
malicious
link
or
CIM
Server
a
connection
to
a
directly
when
establishing
functionality
for
Using
VMRC"
"Connect
(by)
removing
the write
arbitrary
file
contain
an
ayer
and
Fusion
ESXiWorkstationPl
VMware
products
to
as
Shellshock.
for multiple
issuesalso
referred
Bash
update
critical
security
critical
are
being
to
open
a
residing
on
an
CIM
Server
connecting
to
a
connection
to
a
directly
functionality
Using
VMRC"
"Connect
(by)
issue.
Exploitation
arbitrary
file for
write
contain
an
ayer
and
Fusion
ESXiWorkstationPl
products
to
asServer
Shellshock.
for
multiple
issuesalso
referred
information
monitored
in
VPD
VMware
vCSA VMware
malicious
web
ESXi
host.
This
residing
on
an
vCenter
Server.
CIM
connecting
to
directly
functionality
for
Using
VMRC"
this issue
maywrite
issue.
Exploitation
arbitrary
file
contain
an
ayer
and
Fusion
products
to
as allow
Shellshock.
disclosure
Enterprise
cross-siteServer ESXiWorkstationPl
page
while
they
vCenter
may
for
aThis
ESXi
host.
Deploying
the
residing
on
an
vCenter
Server.
connecting
to
directly
functionality
for
allow
for
privilege
this
issue
may
issue.
Exploitation
arbitrary
file
write
contain
an
ayer
and
Fusion
vulnerability
Manager.
scripting
are
logged
inwill
certificate
Man-in-the-middle
vCenter
Server vCenter
may
allow
for
aThis
provided
patch
ESXi
host.
Deploying
the
Server.
connecting
towrite
directly
escalation
on
the
allow
for
privilege
this
issue
may
issue.
Exploitation
arbitrary
file
contain
an
vulnerability
into
vCenter.
validation
attack
against
the
certificate
Man-in-the-middle
this
vCenter
Server remove
may
allow
for
a
provided
patch
will
Deploying
the
vCenter
Server.
connecting
towrite
AirWatch
by
host.
The
escalation
on
the
allowissue
for
privilege
this
may
issue.
Exploitation
arbitrary
file
issue
CIM
service.
validation
attack
against
the
functionality.
certificate
Man-in-the-middle
remove
this
libxml2
is
updated
provided
patch
will
Deploying
the
vCenter
Server.
VMware
has
direct
vulnerability
host.
The
escalation
ondoes
the
allow
for
privilege
this
issue
may
issue.
Exploitation
has
issue to ESXi Oracle
CIM
service.
VMware
is
working
validation
attack
against
the
functionality.
Update
to
address
remove
this
libxml2
is
updated
provided
patch
will
Deploying
the
object
reference
not
allow
for
vulnerability
host.
The
escalation
ondoes
the
allow
for
privilege
this
issue
may
the
Oracle
has
on
a
secure
issue to ESXi documented
CIM
service.
VMware
is
working
libxml2
multiple
security
functionality.
Update
to
address
remove
this
libxml2
is
updated
provided
patch
will
vulnerabilities.
privilege
not
allow
for
vulnerability
host.
The
escalation
ondoes
the
allow
for
privilege
CVE
identifiers
documented
the
Oracle
has
solution
that
will
a
secure
package
issues
VMware
is
working
libxml2 to ESXi on
multiple
security
functionality.
Update
to
address
remove
this
These
issues
may
escalation
from
privilege
not
allow
for
vulnerability
host.
Theaddressed
escalation
ondoes
the
that
are
CVE
identifiers
documented
the
Oracle
has
restore
this
solution
that
willto
on
aallow
secure
package
issues
VMware
is
working
libxml2
multiple
security
functionality.
Curl
is
allow
aupdated
user
that
the
guest
escalation
from
privilege
not
for
vulnerability
does
host.
The
in
JRE
that
are
addressed
identifiers
documented
the
functionality.
restore
this
solution
that
willto
on
secure
packageto ESXi CVE
issues
VMware
is1.6.0
working
Update
address
multiple
manages
an
Curlaallow
is
updated
Operating
System
the
guest
escalation
from
privilege
not
for
vulnerability
does
update
81
in
the
in
JRE
1.6.0
that
are
addressed
CVE
identifiers
Customers
may
functionality.
restore
this
solution
that
on
aallow
secure
Curl package
security
issues.
AirWatch
Update
to ESXi privilege
address
Curl
to
the
is
host
updated
orwill
viceto
Python
Operating
ismultiple
updated
System
the
guest
escalation
from
not
for
Oracle
Java
SE
update
81
in
the
in
JRE
1.6.0
that
are
addressed
continue
to
use
Customers
may
restore
this
solution
that
will
deployment
in
a
Curl package
security
issues.
address
versa.
This
multiple
means
Update
to ESXi functionality.
to
address
the
host
or
vicePython
Operating
is
updated
System
the
guest
escalation
from
privilege
Critical
Patch
Oracle
Java
SE
update
81
in
the
in
JRE
1.6.0
"Connect
(by)
continue
to
use
Customers
may
functionality.
restore
this
multi-tenant
Curl
package
security
that
host
issues.
memory
Python
multiple
versa.
This
security
means
Update
to ESXi the
to
address
the
host
or
viceOperating
System
the
guest
escalation
from
Python
is
updated
vCenter and
Update
Advisory
Critical
Patch
Oracle
Java
SE
update
81
in
the
Using
RDP"
or
the
"Connect
(by)
continue
to
use
Customers
may
functionality.
environment
to
can
not
be
package
issues.
that
host
memory
Python
multiple
versa.
This
security
means
to
the
host
or
viceOperating
System
the
guest
ESXi Update
to
address
Update to
of
July
2014.
The
vCenter
and
Advisory
Critical
Patch
Oracle
Java
SE
"Connect
(by)
Using
RDP"
or
the
"Connect
(by)
continue
to
use
Customers
may
view
the
manipulated
from
can
not
be
package
issues.
that
host
memory
versa.
This
means
to
the
host
or
viceOperating
System
Python
multiple
security
ManagerOracle
References
section
Update and
of
July
2014.
The
vCenter
Update
Advisory
Critical
Patch
SSH"
"Connect
(by)
Using
RDP"
or
"Connect
(by)
continue
to
use
organizational
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
to
the host
or
vicepackage
issues.
JRE
1.6 Update
provides
a(by)
link
to
ManagerOracle
References
section
Update
of
July
2014.
The
vCenter
and
Update
Advisory
VMware
options
for
remote
Using
SSH"
"Connect
RDP"
or
"Connect
(by)
information
and
Operating
the
Guest
manipulated
from
can
not
be
that
host
memory
versa.
This
means
81
this
advisory.
JRE
1.6
Update
provides
a
link
to
ManagerOracle
References
section
Update
of
July
2014.
The
vCloud
desktop
VMware
options
for
remote
SSH"
"Connect
(by)
Using
RDP"
orfrom
statistics
of
System.Mitigation
Operating
the
Guest
manipulated
can
not
be
that
host
memory
81
this
advisory.
JRE
1.6
Update
provides
a
link
to
ManagerOracle "Connect
References
section
Automation
management
as
vCloud
desktop
VMware
options
for
remote
Using
SSH"
(by)
another
tenant.
For
ESXi
to
be
System.Mitigation
Operating
the
Guest
manipulated
from
can
not
be
81 1.6 remote
this
advisory.
JRE
Update options
provides
aCloud
link
to
Center
they
are
Not
Automation
management
as
vCloud
desktop
VMware
for
remote
Using
SSH"
AirWatch
affectedpermissio
For
ESXi
tofrom
be
System.Mitigation
Operating
the
Guest
manipulated
81
this
advisory.
privilege
Affected
by
this
Center
remote
they
are
Not
Automation
management
as
vCloud
desktop
VMware
options
for
remote
has
been
patched
ns
must
have
affectedpermissio
For
ESXi
to be
System.Mitigation
Operating
the
Guest
escalation
privilege
Affected
by
this
Center
remote issue.
they
are
Not
Automation
management
as
vCloud
desktop
to
resolve
this
VMware
been
added
to
ns
must
have
affectedpermissio
For ESXi to be
System.Mitigation
Operating
escalation
issue.
privilege
Affected
by
this
Center
remote
they
are
Not
Automation
management
as
AirWatch
by
issueOn-Premise
ESXiWorkstatio System.Mitigation
ESXi
(or
a
vCenter
VMware
been
added
ns
must
have
affectedpermissio
For
ESXi
totobe
escalation
issue.
privilege
Affected
by
this
Center
remote
they
are
Not
deployments
nPlayerand
Server
managing
ESXiWorkstatio
ESXi
(or
a
vCenter
VMware
been
added
ns
must
have
affectedpermissio
For
ESXi
totomust
be
VMware
escalation
issue.
privilege
Affected
by
this
information
be
updated.
See
Fusion
host
it)
for
a
virtual
nPlayerand
Server
managing
ESXiWorkstatio
ESXi
(or
a
vCenter
VMware
been
added
to
ns must have
affectedpermissio
WorkstationPlayer
VMware
escalation
issue.
disclosure
solution
section
privilege
machine
Fusion
host
it)
for
amanaging
virtual
nPlayerand
Server
ESXiWorkstatio
ESXi
(or
a
vCenter
VMware
been
added
to
ns
must
have
and
Fusion
contain
WorkstationPlayer
VMware
vulnerability
for
details.
escalation
administrator
privilege
machine
Fusion
host
it)
for
a
virtual
nPlayerand
Server
managing
ESXiWorkstatio
ESXi
(or
a
vCenter
VMware
been
added
torole
an
input
validation
and
Fusion
contain
WorkstationPlayer
VMware
vulnerability
or
greater.
escalation
administrator
role
privilege
machine
Fusion
host
it)
for
amanaging
virtual
nPlayerand
Server
ESXiWorkstatio
ESXi
(or
avalidation
vCenter
issue
in
the
Host
an
input
and
Fusion
contain
WorkstationPlayer
VMware
vulnerability
or
greater.
escalation
administrator
role
privilege
machine
Fusion
host
it)
for
a
virtual
nPlayerand
Server
managing
VMware
Guest
File
System
issue
in
the
Host
an
input
validation
and
Fusion
contain
WorkstationPlayer
VMware
vulnerability
or
greater.
escalation
administrator
role
privilege
machine
Fusion
host
it)
aFile
virtual
WorkstationPla
(HGFS).
This
issue
VMware
Guest
System
issue
in
the
Host
an
input
validation
andfor
Fusion
contain
WorkstationPlayer
VMware
vulnerability
or
greater.
escalation
administrator
role
privilege
machine
yerand
Fusion
may
allow
for
a
WorkstationPla
(HGFS).
This
issue
VMware
Guest
File
System
issue
in
the
Host
an
input
validation
and
Fusion
contain
WorkstationPlayer
VMware
vulnerability
or
greater.
escalation
administrator
role
Denial
of
Denial
of
Service
yerand Fusion and
may
allow
for
a
WorkstationPla
(HGFS).
This
issue
VMware
Guest
File
System
issue
in
the
Host
an
input
validation
Fusion
contain
WorkstationPlayer
vulnerability
or
greater.
Service
of
the
Guest
Denial
of
Denial
of
Service
yerand
Fusion issue
may
allow
for
a
WorkstationPla
(HGFS).
This
issue
VMware
Guest
File
System
in
the
Host
an input
validation
and
Fusion
contain
vulnerability
Operating
system.
Service
of
the
Guest
Denial
of
Denial
of
Service
yerand
Fusion
may
allow
for
a
WorkstationPla an
(HGFS).
This
issue
VMware
Guest
File
System
issue
in
the
Host
input
validation
vulnerability
Operating
system.
Service
of
the
Guest
Denial of
Denial
ofthe
Service
yerand
Fusion issue
may
allow
for
a
WorkstationPla
(HGFS).
This
issue
VMware
Guest
File
System
in
Host
vulnerability
Operating
system.
Service
of
the
Guest
Denial
of
Denial
of
Service
yerand
Fusion
may
allow
for
a
WorkstationPla
(HGFS).
This
issue
VMware
Guest
File
System
Update to
vulnerability
Operating
system.
Service
of
the
Guest
Denial
of
Denial
of
Service
yerand
Fusion
may
allow
for
a
WorkstationPla The
(HGFS).
This issue
VMware
OpenSSL
vulnerability
Operating
system.
Serviceof
of theallow
Guest
Denial
Denial
of
Service
yerand
Fusion
may
for a
vCenter
Server library
is updated
vulnerability
Operating
system.
Service
of
the
Guest
Denial
of for
Denial
of Service
and
ESXi
to
version
1.0.1j
or
vulnerability
Operating
system.
Service
of
the Guest
OpenSSL
1.0.1 0.9.8zc
to resolve
vulnerability
Operating
system.
and
0.9.8
multiple
security
package
issues.

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0001
VMSA-2015-0002
VMSA-2015-0002
VMSA-2015-0002
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

Update to
vCenterto
Server
VMware
Update
and ESXito
for
vCenter
Server
VMware
Update
OpenSSL
1.0.1
and
ESXi
vCenter
Server
VMware
Update tofor
and
0.9.8
OpenSSL
1.0.1
ESXiServer
for
vCenter
VMware
package
0.9.8Server
OpenSSL
1.0.1
and
ESXi
for
vCenter
package
0.9.8for
OpenSSL
1.0.1
and
ESXi
package
and
0.9.8
OpenSSL 1.0.1
package
and
0.9.8
Update
to ESXi
VMware
package
libxml2
Update
ESXi
vSphereto
Data
VMware
package
libxml2 to
Update
ESXi
Protection
vSphere
Data
VMware
package Data
libxml2
certificate
Protection
vSphere
package
validation
certificate
Protection
vulnerability
validation
certificate
vulnerability
validation
vulnerability
Oracle
JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
Update

(VDP)Protection
does
not
Data
VMware
vSphere
library
is updated
The
fully OpenSSL
validate
SSL
(VDP)
does
not
Data
Protection
to
version
1.0.1j
library
is updated
The
OpenSSL
certificates
fully
validate
SSLor
(VDP)
does
not
0.9.8zc
to
resolve
to
version
1.0.1j
library
is
updated
The
OpenSSL
coming
from SSLor
certificates
fully validate
multiple
security
0.9.8zc
to
resolve
to
version
1.0.1j or
library
isfrom
updated
The
OpenSSL
vCenter
Server.
coming
certificates
issues.
multiple
security
0.9.8zc
to
resolve
to
version
1.0.1j or
library
is
updated
This issue
may
vCenter
Server.
coming
from
issues.
multiple
security
0.9.8zc
to
resolve
to
version
1.0.1j
or
The
libxml2
library
allowissue
a Man-inThis
may
vCenter
Server.
issues.
multiple
security
0.9.8zc
to may
resolve
is
updated
to
The
libxml2
library
the-Middle
attack
allow
a Man-inThis
issue
issues.
multiple
security
version
libxml2is
updated
to
The
libxml2
library
that
enables
the
the-Middle
attack
allow a Man-inissues.
2.7.6-17
to
resolve
version
libxml2is
updated
to
attacker
that
enables
the
the-Middle
attack
Oracle
JRE is
a
security
2.7.6-17
version
libxml2perform
attacker
to
that
enables
the
updated
inissue.
Oracle
JRE
isresolve
a
security
issue.
2.7.6-17
resolve
unauthorized
perform
attacker
to
VMware
products
updated
in is
Oracle
JRE
a
security
backup
and
unauthorized
perform
to
address
a
VMware
products
updated
inissue.
Oracle
JRE
is
restore
operations.
backup
and
unauthorized
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
restore
operations.
backup
and
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
restore
operations.
in
earlier
releases
issue
that
critical
security
to
address
a
VMware
products
updated
inexisted
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
critical
security
to
address
a
VMware
products
updated
inexisted
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of earlier
Oracle
JRE
in
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
of earlier
Oracle
JRE
in
releases
issue
that
existed
critical
security
of earlier
Oracle
JRE
in
issue
thatreleases
existed
of
Oracle
JRE
in earlier releases
of Oracle JRE

NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD
NVD

VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003
VMSA-2015-0003

Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv
Adv

Oracle JRE
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update
Oracle JRE
UpdateJRE
Oracle
UpdateJRE
Oracle
UpdateJRE
Oracle
Update

updated
in is
Oracle
JRE
to address
a
VMware
products
updated
in is
Oracle
JRE
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
critical
security
to
address
a
VMware
products
updated
inexisted
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
critical
security
to
address
a
VMware
products
updated
inexisted
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
critical
security
to
address
a
VMware
products
updated
inexisted
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMwareJRE
products
updated
in is
Oracle
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle JRE is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to address
a
VMware
products
updated
in is
Oracle
JRE
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
updated
in
Oracle
JRE
is
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
VMware
products
updated in a
of
Oracle
JRE
in
earlier
releases
issue
that
existed
critical
security
to
address
a
VMware
products
of
Oracle
JRE
in earlier
releases
issue
that
existed
critical
security
to
address
a
of earlier
Oracle
JRE
in
releases
issue
that
existed
critical
security
of earlier
Oracle
JRE
in
issue
thatreleases
existed
of earlier
Oracle releases
JRE
in
of Oracle JRE

Workarounds
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Finder
Company
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Finder

CVSS v2
(SCORE) (NIST)

4.3
4.3

9.3
9.3

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Joshua Keyes
NA
Joshua Keyes
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Tarjei Mandt
NA
Digital
Security Tarjei Mandt
NA
Research
Digital Security Tarjei Mandt
Group Security Alexey Sintsov
Research
Digital
Group
AlexeyPehrson
Sintsov
Research
Frans
Group
Alexey
Sintsov
and Claudio
Xxor AB
Criscione

6.4
6.4

4.3
4.3

4.0
4.0
4.0

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Xxor AB
Xxor AB
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Ridgeway
NA
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Security

Frans Pehrson
and Claudio
Frans
Pehrson
Criscione
and Claudio
Criscione
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder

6.8
6.8

5.1

8.3
8.3
8.3
8.3
8.3

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Ridgeway
Internet
Ridgeway
Security
Internet
Ridgeway
Security
Internet
Security
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Derek Soeder
Derek Soeder
Derek Soeder
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

8.3
8.3
8.3

8.3
8.3
8.3
8.3
8.3
8.3
8.3
8.3
8.3
8.3
8.3
8.3

Workstation
7.x
not
for
workaround
is
Note:
This
e
= valid
TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the
article
1714.
Knowledge
VMware
described
inBase
machine
as
the
virtual
and
Fusion
Workstation
7.x
not
valid
for
workaround
is
Note:
This
e
= TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the1714.
article
Knowledge
VMware
described
inBase
machine
as
3.x.Mitigation
and
Fusion
Workstation
7.x
not
valid
for
workaround
is
Note:
This
e
= TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the
article
1714.
Knowledge
VMware
described
inBase
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
for
workaround
is
Note:
This
e
= valid
TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the
article
1714.
Knowledge
Base
VMware
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
valid
for
workaround
is
Note:
This
e
= TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the1714.
article
NA
Knowledge
Base
access
to
your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
for
workaround
is
Note:
This
e
= valid
TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the
article
1714.
NA
virtual
access
to
your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
workaround
is
Note:
Thisfor
e
= valid
TRUE
xMessage.disabl
isolation.tools.vi
following
line:
Add
the
NA
machines.
Root
virtual
access
to
your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
valid
for
workaround
is
Note:
Thisline:
e
= TRUE
xMessage.disabl
isolation.tools.vi
following
NA
or
Administrator
machines.
Root
virtual
access
to
your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
workaround
Note:
Thisfor is
e
= valid
TRUE
xMessage.disabl
isolation.tools.vi
NA
level
or
Administrator
machines.
Root
virtual
access
to
your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
not
valid
for
workaround
is
Note:
This
e
= TRUE 7.x
xMessage.disabl
NA
permissions
are
level
or
Administrator
machines.
Root
virtual
access
tofor
your
untrusted
users
Do
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
valid
workaround
is
Note:
This
e
=not
TRUE
NA
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
tofor
your
untrusted
users
Do
allow
3.x.Mitigation
andnot
Fusion
Workstation
7.x
not
valid
workaround
is
Note:
This
NA
exploit
this
not
required
to
permissions
are
level
or
machines.
Root
virtual
access
tofor
your
untrusted
users
DoAdministrator
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
valid
workaround
is
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to
your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
not
valid
for
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
Workstation
7.x
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to your
untrusted
users
Do
not
allow
3.x.Mitigation
and
Fusion
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to your
untrusted
users
Do
not allow
3.x.Mitigation
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to your
untrusted
users
Do
not allow
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to your
untrusted
users
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
access
to your
issue.
exploit
this
not
required
to
permissions
are
level
or
Administrator
machines.
Root
virtual
issue.
exploit
thisRoot
not
required
to
permissions
are
level
or
Administrator
machines.
issue.
exploit
this
not
required
to
permissions
are
level
or Administrator
issue.
exploit
this
not required are
to
permissions
level
issue.
exploit
this are
not
required
to
permissions
issue.
exploit
this to
not
required
issue. this
exploit
issue.
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
Ridgeway
NA
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Ridgeway
Security,
Internet
Security,
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
Derek
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder
Soeder

9.0
9.0
9.0
9.0
9.0
9.0
9.0
9.0

9.0
9.0

9.0

9.0

7.5
7.5
7.5
7.5

Remove the
virtual SCSI
Remove
the
controller
from
virtual SCSI
Remove
the
the list SCSI
ofthe
virtual
controller
from
virtual
Remove
IO
devices.
The
the
list
of
virtual
controller
from
virtual
SCSI
NA
Remove the
VMware
IO
devices.
The
the
list
of
virtual
controller
from
virtual
SCSI
NA
Remove
the
hardening
VMware
IO
The
the
list SCSI
ofthe
virtual
controller
from
virtual
NAdevices.
Remove
guides
hardening
VMware
IO
devices.
the
list
of
virtual
controller
from
virtual
SCSI
NA
Remove
theThe
recommend
guides
hardening
VMware
IO
devices.
The
the
ofthe
virtual
controller
from
virtual
NA list SCSI
Remove
removing
recommend
guides
hardening
VMware
IO
The
the
list SCSI
ofthe
virtual
controller
from
virtual
NAdevices.
Remove
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
the
list
of
virtual
controller
from
virtual
SCSI
NA
Remove
theThe
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
The
the
list SCSI
ofthe
virtual
controller
from
virtual
NAdevices.
Remove
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
the
list
of
virtual
controller
from
virtual
SCSI
NA
Remove theThe
on
Do not
allow
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
The
the
list SCSI
of
virtual
controller
from
virtual
NA
Remove
the
untrusted
root
on
Do
not
allow
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
The
the
list SCSI
ofthe
virtual
controller
from
virtual
NA
Remove
users
to
untrusted
root
on
Do access
not
allow
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
The
the
list
of
virtual
controller
from
virtual
SCSI
NA
your
users
access
to
untrusted
root
on
Dovirtual
not
allow
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
The
the
list of
virtual
controller
from
NA
machines.
Root
your
virtual
users
access
to
untrusted
root
on
Do
not
allow
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
The
the
list of
virtual
NA
or
Administrator
machines.
Root
your
virtual
users
to
untrusted
root
on
Do access
not
allow
general.Mitigati
IO
devices
in
unused
virtual
removing
recommend
guides
hardening
VMware
IO
devices.
The
NA
level
or
Administrator
machines.
Root
your
virtual
users
access
to
untrusted
root
on
Do
not
allow
general.Mitigati
IO
devices
in
unused virtual
removing
recommend
guides
hardening
VMware
NA
permissions
are
level
or
Administrator
machines.
Root
your
virtual
users
access
untrusted
root
on
Do not
allow
general.Mitigati
IO
devices
in to
unused
virtual
removing
recommend
guides
hardening
NA
required
to
permissions
level
or
Administrator
machines.
Root
your
virtual
users
to
untrusted
root
on
Do access
not
allow
general.Mitigati
IO
devices
inare
unused
virtual
removing
recommend
guides
NA
exploit
this
required
to
permissions
are
level
or
Administrator
machines.
Root
your
virtual
users
access
untrusted
root
on
Do
not
allow
general.Mitigati
IO devices
in to
unused
virtual
removing
recommend
issue.
exploit
this
required
to
permissions
level
or
Administrator
machines.
Root
your
virtual
users
access
to
untrusted
root
on
Do not
allow
general.Mitigati
IO
devices
inare
unused
virtual
removing
issue.
exploit
this
required
to
permissions
are
level
or
Administrator
machines.
Root
your
users
access
untrusted
root
on
Dovirtual
not
allow
general.Mitigati
IO
devices
in to
unused
virtual
issue.
exploit
this
required
to
permissions
level
or
Administrator
machines.
Root
your
virtual
users
access
to
untrusted
root
on
Do
not
allow
general.Mitigati
IO
devices inare
issue.
exploit
this
required
to
permissions
are
level
or
Administrator
machines.
Root
your
virtual
users
to
untrusted
on
Do access
not root
allow
general.Mitigati
issue.
exploit
this
required
toroot
permissions
are
level
or
Administrator
machines.
Root
your
users
access
to
untrusted
on
Dovirtual
not
allow
issue.
exploit
this
required
toroot
permissions
are
level
or
Administrator
machines.
Root
your
virtual
users
access
to
untrusted
issue.
exploit
this
required
to
permissions
are
level
or
Administrator
machines.
Root
your
virtual
users access to
issue.
exploit
this
required
toRoot
permissions
are
level
or Administrator
machines.
your
virtual
issue.
exploit
this
required
to
permissions
are
level
or
Administrator
machines.
Root
issue.
exploit
this
required
to are
permissions
level
or
Administrator
issue.
exploit
required
to are
permissions
level this
issue.
exploit
this
required to are
permissions
issue. this
exploit
required
to
issue. this
exploit
issue.
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Thorsten
Tllmann
Thorsten
Tllmann
Thorsten
Tllmann
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

7.5
7.5
7.5

9.0
9.0
9.0
9.0
9.0
9.0
9.0
9.0
9.0
9.0
7.2
7.2
7.2

9.3
9.3
9.3
9.3
9.3
9.3
9.3
9.3
9.3
9.3
9.3

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

9.3

7.8
7.8
7.8

7.8
7.8
7.8
7.8
7.8
7.8
7.8

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

7.5
7.5

5.0
5.0

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
ACROS
Security
ACROS
Security
ACROS
Security
ERPScan
ERPScan
ERPScan
ERPScan
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Mitja Kolsek
Mitja Kolsek
Mitja Kolsek
Alexander
Minozhenko
Alexander
Minozhenko
Alexander
Minozhenko
Alexander
Minozhenko
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder

6.9
6.9
6.9
4.3
5.0

8.3

8.3

7.9

7.9

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
CylanceInc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft Inc.
Microsoft
Inc.
Core
Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
Core Security
Technologies
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Jeremy Brown
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
Sebastin Tello
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

9.3

9.3

9.3

5.0

5.0

the following
should
consider
options:
Disable
the following
Security Disable
Server
options:
DisablingServer
the
Security
Security Server
Disabling
the
NA
will prevent
Security
Server NA
NA
exploitation
will
prevent of NA
NA
this vulnerability
exploitation
of NA
NA vulnerability
over
untrusted NA
this
NA untrusted NA
remote
over
NA
NA
networks.
To
remote
restore
NA
NA
networks.
To
functionality
for NA
restore
NA
remote
functionality
for NA
NA
usersallow
them
remote
NA
NA
to
to
usersallow
NAconnect them
NA
the
Connection
to
connect
to
NA
NA
Server
via a
the
NA Connection
NA
VPN.Block
Server
via a
NA
NA
directory
VPN.Block
NA
NA
traversal
directory
NA
NA
attempts It may
traversal
NA
NA
be possible
to
attempts
It may
NA
NA
prevent
be
possible to
NA
exploitation of NA
prevent
NA
this issue byof NA
exploitation
NA
NA
blocking
this
issue by
NA
NA
directory
blocking
NA
NA
traversal
directory attacks Digital
NA
with an intrusion
DefenseInc.
traversal
attacks NA
Digital
NA
protection
(DDI)
with
an intrusion NA
DefenseInc.
NA
NA
system
or
Vulnerability
protection
(DDI)
NA
NA
application
Research
Team
system
or layer Vulnerability
firewall
(VRT)
application
layer Research
Team
firewall
(VRT)
NA
ERPScan
NA
ERPScan
NA
ERPScan
NA
ERPScan
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Alexander
Minozhenko
Alexander
Minozhenko
Alexander
Minozhenko
Alexander
Minozhenko
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

5.0
5.0

5.0
5.0
5.0
5.0
4.0
4.0
4.0

7.8
7.8

7.8

To reduce the
likelihood
To
reduce of
the
NA
NA
exploitationvSph
likelihood
To
reduce of
the
NA
NA
erereduce
components
exploitationvSph
likelihood
of
To
the
NA
NA
should
be of
ere
components
exploitationvSph
likelihood
To
reduce
the
NA
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
NA
isolated
deployed
on
should
be of
ere
components
exploitationvSph
likelihood
To
reduce
thean NA
NA
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
erereduce
components
exploitationvSph
likelihood
of
To
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
on
should
be of
ere
components
exploitationvSph
likelihood
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean NA
network.
management
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of an NA
network.
management
isolated
deployed
should
be on an NA
ere components
exploitationvSph
network.
management
isolated
deployed
should
be on an NA
ere
components
network.
management
isolated
deployed
should
be on an NA
network. on an NA
management
isolated
deployed
network.
NA
management
isolated
network.
NA
management
network.
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Systems that
NA
NA
have VMCI
Systems
that
NA VMCI
NA
disabled
are
CylanceInc.
have
NA affected
NA Microsoft
also
and
disabled
are by CylanceInc.
this
issue.
also affected by Inc
and Microsoft
this issue.
Inc

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Derek
Soeder
NA Kostya
and
Derek
Soeder
Kortchinsky
and Kostya
Kortchinsky

10.0
10.0
10.0

10.0
10.0
10.0

10.0
10.0
10.0
10.0
10.0
10.0
6.8
6.8
6.8
6.8
6.8
6.8
6.8

7.8
7.8

7.2
7.2

Systems that
have VMCI
Systems
that
disabled
are
CylanceInc.
have
VMCI
Systems
that
also
affected
by
and Microsoft
disabled
are
CylanceInc.
have VMCI
Systems
that
this
issue.
also affected
and Microsoft
disabled
are
CylanceInc.
have
VMCI
Systems
that by Inc
this issue.
Inc Microsoft
also
affected
and
disabled
are
have
VMCI
Systems
that by CylanceInc.
this
issue.
Inc
also
affected
by
and
Microsoft
disabled
are
CylanceInc.
have
VMCI
Systems
that
this issue.
Inc Microsoft
also
affected
and
disabled
are
have
VMCI
Systems
that by CylanceInc.
this
issue.
Inc Microsoft
also
affected
by
and
disabled
are
CylanceInc.
have
VMCI
Systems
To
reducethat
the
this
issue.
also
affected
and Microsoft
disabled
are
CylanceInc.
have
VMCI
Systems
that
likelihood
of
To reduce
theby Inc
this
issue.
Inc Microsoft
also
affected
by
and
disabled
are
CylanceInc.
have
VMCI
Systems
that
exploitationvSph
likelihood
To
reduce of
the
this
issue.
Inc Microsoft
also
affected
by
and
disabled
are
CylanceInc.
have
VMCI
Systems
that
ere
components
exploitationvSph
likelihood
of
To
reduce
the
this
issue.
also
affected
and Microsoft
disabled
CylanceInc.
have
VMCI
should
beare
ere
components
exploitationvSph
likelihood
of
To
reduce
theby Inc
this
issue.
Inc Microsoft
also
affected
by
and
disabled
are
CylanceInc.
deployed
on
an
should
be
erereduce
components
exploitationvSph
likelihood
of
To
the
this
issue.
Inc
also
affected
by
Microsoft
isolated
Context
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean and
this
issue.
Inc
management
Information
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean Context
network
Security
management
Information
isolated
Context
deployed
on
an
should
be of
ere
components
exploitationvSph
likelihood
To
reduce
the
network
Security
management
isolated
Context
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To reduce
thean Information
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere
components
exploitationvSph
likelihood
To
reduce of
the
network
Security
management
Information
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
thean Context
network
management
Information
isolated
Context
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To reduce
thean Security
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere components
exploitationvSph
likelihood
of
network
Security
management
isolated
Context
deployed
should
be on an Information
ere
components
exploitationvSph
network
Security
management
Information
isolated
deployed
should
be on an Context
ere
components
network
Security
management
Information
isolated
Context
deployed
on
an
should be
network
Security
management
isolated on an Information
Context
deployed
network
Security
management
Information
isolated
Context
network
Security
management
Information
network
Security
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Derek Soeder
and Kostya
Derek
Soeder
Kortchinsky
and Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Derek Soeder
Kortchinsky
and
Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Derek
Soeder
Kortchinsky
and Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Derek
Soeder
Kortchinsky
and Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Derek
Soeder
Kortchinsky
and
Kostya
Kortchinsky
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

7.2
7.2
7.2
7.2
7.2
7.2
7.2
7.2
7.2
7.2
7.6
7.6
7.6
7.6
7.6
7.6
7.6
7.6
7.6
7.6
7.6

7.5
6.8
6.8
6.8
6.8

"anonymous
binding
(look for
anonymous
how
to check
binding"
in the
"anonymous
binding
(look
for
anonymous
article:
binding"(look
in the
"anonymous
binding
for
anonymous
article:
binding"
in the
"anonymous
binding isin the
anonymous
article:
binding"
NA
enabled
if the
binding
anonymous
article: is
NA
seventh
bit
of
enabled
if the
binding is
anonymous
NA
the dsHeuristics
seventh
bit
of
enabled
if the
binding
is
NA dsHeuristics
attribute
set
the
seventh
bit
of
enabled
ifisthe
to 2)dsHeuristics
attribute
is set
the
seventh
bit
of
to
2)
attribute
is set
the
dsHeuristics
to 2)
attribute
is set
to 2)
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA Zero Day
HP's
Initiative
HP's Zero(ZDI)
Day
Initiative (ZDI)

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Andrea
Micalizzi
Andrea
Micalizzi

6.8
6.8

4.3

9.0
9.0

7.2
7.2
7.5
7.5

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
A workaround
NA
NA
forworkaround
the issue is
A
NA
NA
toworkaround
remove
the
for
the issue
is
A
NA
NA
setuid
from
to
remove
the
for
the bit
issue
is
A workaround
NA
NA
vmware-mount:
setuid
from
to
remove
the
for
the bit
issue
is
A
workaround
NA
NA
#chmod
u-s
vmware-mount:
setuid
from
to
remove
the
for
the bit
issue
is
A
workaround
NA
NA
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
from
to
remove
the
forworkaround
the bit
issue
is
A
NA
NA
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
from
to
remove
the
for
the bit
issue
is
A
workaround
NA
workaround
isis NA
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
from
to
remove
the
for
the bit
issue
A
workaround
NA
relevant
for
both
workaround
isis NA
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
from
toworkaround
remove
the
for
the bit
issue
A
NA
NA
Workstation
and
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
from
to
remove
the
for
the bit
issue
is Google
A
workaround
Player.
Security Team
Workstation
and
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
from
to
remove
the
for
the bit
issue
is Google
Player.
Security Team
Workstation
and
Google
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
bit
from
to remove
the
Player.
Security Team
Workstation
and Google
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
setuid
bit
from
Player.
Security Team
Workstation
and
Google
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
#chmod
u-s
vmware-mount:
To
reduce
the
Player.
Workstation
and Security
Google Team
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
#chmod
u-s
likelihood
of
To reduce
the
Player.
Security Team
Workstation
and Google
relevant
for
both
workaround
is
-mount
This
/usr/bin/vmware
exploitationvSph
likelihood
of
To
reduce
the
Player.
Security Team
Workstation
and
Google
relevant
for
both
workaround
is
-mount
This
ere
components
exploitationvSph
likelihood
of
To
reduce
the
Player.
Security Team
Workstation
and Google
relevant
for
both
workaround
is
should
be
ere
components
exploitationvSph
likelihood
of
To
reduce
the
Player.
Security Team
Workstation
and
Google
relevant
for
both
deployed
on
an
should
be
ere
components
exploitationvSph
likelihood
of
To
reduce
the
Player.
Security
Workstation
and
isolated
Context Team
deployed
on
should
bean Google
ere
components
exploitationvSph
likelihood
of
To
reduce
the
Player.
Security Team
management
Information
isolated
deployed
on
should
bean Context
ere
components
exploitationvSph
likelihood
of
To
reduce
the
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere
components
exploitationvSph
likelihood
of
To
reduce
the
network
management
Information
isolated
Context
deployed
on
should
bean Security
ere
components
exploitationvSph
likelihood
of
To reduce
the
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
erereduce
components
exploitationvSph
likelihood
of
To
the
network
Security
management
Information
isolated
deployed
on
should
bean Context
ere
components
exploitationvSph
likelihood
of
network
Security
management
Information
isolated
deployed
on
should
bean Context
ere
components
exploitationvSph
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere
components
network
Security
management
isolated on
Context
deployed
should
bean Information
network on an Context
Security
management
Information
isolated
deployed
network
Security
management
Information
isolated
Context
network
Security
management
Information
network
Security

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Tavis Ormandy
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman

5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
4.3
4.3
4.3
4.3
4.3
4.3

5.0
5.0

6.9
6.9
6.9
6.9
6.9
6.9

4.3
4.3
4.3
4.3
4.3
4.3

exploitationvSph
likelihood
To
reduce of
the
should
be
ere
components
exploitationvSph
likelihood
of
To
reduce
the
deployed
on
should
bean
ere
components
exploitationvSph
likelihood
of
To reduce the
isolated
deployed
on
should
bean Context
ere
components
exploitationvSph
likelihood
To
reduce of
the
management
Information
isolated
deployed
on
should
bean Context
ere
components
exploitationvSph
likelihood
of
To
reduce
the
network
management
Information
isolated
Context
deployed
on
should
bean Security
ere
components
exploitationvSph
likelihood
of
To
reduce
the
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
erereduce
components
exploitationvSph
likelihood
of
To
the
network
Security
management
isolated
Context
deployed
on
should
bean Information
ere
components
exploitationvSph
likelihood
of
To
reduce
the
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere
components
exploitationvSph
likelihood
To
reduce of
the
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere
components
exploitationvSph
likelihood
of
To
reduce
the
network
management
Information
isolated
Context
deployed
on
should
bean Security
ere
components
exploitationvSph
likelihood
of
To reduce
the
network
Security
management
Information
isolated
Context
deployed
on
an
should
be
ere
components
exploitationvSph
likelihood
To
reduce of
the
network
Security
management
Information
isolated
deployed
on
should
bean Context
ere
components
exploitationvSph
likelihood
of
network
management
Information
isolated
deployed
on
should
bean Security
ere
components
exploitationvSph
network
management
isolated
deployed
on
an
should
be
ere components Security
network
management
isolated on
deployed
should
bean DSecRG
network on an DSecRG
management
isolated
deployed
network
DSecRG
management
isolated
network
DSecRG
management
network
DSecRG
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
CylanceInc.
NA
NA
NA
NA
NA
NA

Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alexey Tyurin
Alexey Tyurin
Alexey Tyurin
Alexey Tyurin
Alexey Tyurin
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
Derek Soeder
NA
NA
NA

7.1
7.1
7.1
7.1
7.1

6.8

7.2
7.2
7.9
7.9
7.9
7.9
7.9
7.9
7.9
7.9
7.9
7.9

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
A workaround is NA
NAworkaround
provided
in
A
is NA
NA
VMware
provided
in
A
workaround
is NA
NA
Knowledge
Base
VMware
provided
A
is NA
Toworkaround
reducein
the
article
2066856.
Knowledge
Base
VMware
provided
in
A
workaround
is JPCERT
likelihood
of
To
reduce
the
article
2066856.
Knowledge
Base
VMware
provided
A
workaround
exploitationvSph
likelihood
of
To
reducein
the is JPCERT
article
2066856.
Knowledge
Base
VMware
provided
in
A
workaround
is JPCERT
ere
components
exploitationvSph
likelihood
of
To
reduce
the
article
2066856.
JPCERT
Knowledge
Base
VMware
provided
in
should
be of
ere
components
exploitationvSph
likelihood
To
reduce
the
article
2066856.
Knowledge
Base
VMware
deployed
should
be on
ere
components
exploitationvSph
likelihood
of
To reduce
thean JPCERT
article
2066856.
JPCERT
Knowledge
Base
isolated
deployed
an Context
should
be on
ere
components
exploitationvSph
likelihood
of
To
reduce
the
article
2066856.
JPCERT
management
Information
isolated
deployed
should
be on
ere
components
exploitationvSph
likelihood
of an Context
network.
management
Information
isolated
Context
deployed
should
be on an Security
ere
components
exploitationvSph
network.
Security
management
Information
isolated
deployed
on
an
should
be
ere components Context
Recurity Labs
network.
Security
management
isolatedbe on an Information
Contextand
deployed
should
GmbH
the
Recurity
Labs
network. on an Recurity
Security
management
Information
isolated
Context
deployed
Bundesamt
GmbH
and
the
Labs
network.
Security
management
Information
isolated
Context
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
network.
Security
management
Information
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
network.
Security
Informationste
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity Labs
NA
chnik
(BSI)
Informationste
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
NA
chnik
(BSI)
Informationste
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
NA
chnik
(BSI)
Informationste
der
Sicherheit
in
Bundesamt
GmbH and
the
Recurity
Labs
NA
chnik
(BSI)
Informationste
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
NA
chnik (BSI)
Informationste
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
NA
chnik
(BSI)
Informationste
der
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
NA
chnik
Informationste
der (BSI)
Sicherheit
in
Bundesamt
GmbH
and
the
Recurity
Labs
NA
chnik (BSI)
Informationste
der
Sicherheit
Bundesamt
GmbH
andin
the
NA
chnik
(BSI)
Informationste
der
Sicherheit in
Bundesamt
NA
chnik
(BSI)in
Informationste
der
Sicherheit
NA
chnik (BSI)
Informationste
der
NA
chnik (BSI)
Informationste
NA
chnik (BSI)
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
Shanon Olsson
Shanon Olsson
Shanon Olsson
Shanon Olsson
Shanon Olsson
Shanon Olsson
Shanon Olsson
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
Alex Chapman
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Mattia Folador
Mattia Folador
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

5.0

5.0
5.0
4.4
4.4
4.4
4.4
4.4
4.4
4.4
4.3
4.3
4.3
4.3
4.3
4.3
3.3
3.3
3.3
3.3
3.3
3.3
3.3
3.3
3.3
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
4.3

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
Recurity
GmbH
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

4.3
4.3
4.3

Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs
Labs

9.3
9.3
9.3
9.3
9.3
9.3
9.3
5.8
5.8

5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Google
Security
Google
Security
Google
Security
Google
Security
Google
Security
Google
Security
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

Team
Team
Team
Team
Team
Team

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Tavis
Tavis
Tavis
Tavis
Tavis
Tavis
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
5.0
Ormandy
Ormandy
Ormandy
Ormandy
Ormandy
Ormandy
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8
6.8

None
A workaround
None
for
CVE-2014A
workaround
None
0112
is
for
CVE-2014A
workaround
documented
in
0112
is
for
CVE-2014A
workaround
VMware
documented
0112
is
for
CVE-2014A workaroundin
Knowledge
Base
VMware
documented
in
0112
is
for
CVE-2014article
2081470
Knowledge
Base
VMware
documented
in
0112
is
article 2081470
Knowledge
Base
VMware
documented
in
article
Knowledge
Base
None 2081470
VMware
article
Knowledge
Base
None 2081470
article
2081470
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

6.8
6.8
6.8
7.5
7.5
7.5
7.5
7.5
3.0
3.0
3.0
3.0
3.0
3.0
5.0
5.0
5.0

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Orange
Poland
Security
Trustwave
SpiderLabs
The Google
Security
Team
The
Google
Security
Team
The
Google
Security Team
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Jakub Mleczko
Tanya
Secker
The
Google
Security
Team
The
Google
Security
Team
The
Google
Security Team
NA
NA
NA
NA
NA
NA
NA
NA

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
securityNA
NA
Denis
assessment.co
Andzakovic
m
NA
Shanon Olsson
NA
Shanon Olsson
NA
Shanon Olsson
NA
Shanon Olsson
NA
Shanon Olsson
NA
Shanon Olsson
Peter
Digital Security Kamensky
Peter
Digital Security Kamensky
Peter
Digital Security Kamensky
Peter
Digital Security Kamensky
mitry Yudin
NA
@ret5et
mitry Yudin
NA
@ret5et
mitry Yudin
NA
@ret5et
mitry Yudin
NA
@ret5et
NA
NA

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA Thorsten
Tllmann
Thorsten
Tllmann
Thorsten
Tllmann
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None
None

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA

CVSS

AV:N/AC:M/AU:N/C:P/I:N/A:N
AV:N/AC:M/AU:N/C:P/I:N/A:N

AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C

Published

Last Update

1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012

3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012

AV:N/AC:L/AU:N/C:P/I:N/A:P
AV:N/AC:L/AU:N/C:P/I:N/A:P

AV:N/AC:M/AU:N/C:N/I:P/A:N
AV:N/AC:M/AU:N/C:N/I:P/A:N

AV:N/AC:L/AU:S/C:P/I:N/A:N
AV:N/AC:L/AU:S/C:P/I:N/A:N
AV:N/AC:L/AU:S/C:P/I:N/A:N

1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
1/30/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/8/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012

3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/8/2012
3/8/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012

AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P

AV:N/AC:H/AU:N/C:P/I:P/A:P

AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C

3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/15/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012

12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012

AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C

AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:L/AU:N/C:C/I:C/A:C

3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
3/29/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/12/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012

6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012

AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C

AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C

AV:N/AC:L/AU:S/C:C/I:C/A:C

AV:N/AC:L/AU:S/C:C/I:C/A:C

AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P

4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
4/26/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012

9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012

AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P

AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C

AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C

5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/3/2012
5/25/2012
5/25/2012
5/25/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012

6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
6/13/2012
5/25/2012
5/25/2012
5/25/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012

AV:N/AC:M/AU:N/C:C/I:C/A:C

AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C

AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C

6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
7/12/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012

6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
6/14/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
9/13/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012

AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P

AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P

8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012

12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012

AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:N/I:P/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N

AV:A/AC:L/AU:N/C:C/I:C/A:C

AV:A/AC:L/AU:N/C:C/I:C/A:C

AV:A/AC:M/AU:N/C:C/I:C/A:C

AV:A/AC:M/AU:N/C:C/I:C/A:C

8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
8/30/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012

12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
12/20/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
10/4/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012

AV:N/AC:M/AU:N/C:C/I:C/A:C

AV:N/AC:M/AU:N/C:C/I:C/A:C

AV:N/AC:M/AU:N/C:C/I:C/A:C

AV:N/AC:L/AU:N/C:N/I:N/A:P

AV:N/AC:L/AU:N/C:N/I:N/A:P

11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012

11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/8/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012

AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N

AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:S/C:P/I:N/A:N
AV:N/AC:L/AU:S/C:P/I:N/A:N
AV:N/AC:L/AU:S/C:P/I:N/A:N

AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C

AV:N/AC:L/AU:N/C:N/I:N/A:C

11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012

11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
11/15/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012

AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C

AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C

AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P

AV:N/AC:L/AU:N/C:N/I:N/A:C
AV:N/AC:L/AU:N/C:N/I:N/A:C

AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C

12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
1/31/2013
2/7/2013
2/7/2013

12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
12/13/2012
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
2/13/2013
2/13/2013

AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C
AV:N/AC:H/AU:N/C:C/I:C/A:C

AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P

2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/7/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
3/28/2013
3/28/2013
3/28/2013
3/28/2013

2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/13/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
2/21/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013

AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P

AV:N/AC:M/AU:N/C:N/I:P/A:N

AV:N/AC:L/AU:S/C:C/I:C/A:C
AV:N/AC:L/AU:S/C:C/I:C/A:C

AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P

3/28/2013
3/28/2013
4/4/2013
4/4/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
4/25/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
5/30/2013
6/11/2013
6/11/2013

5/30/2013
5/30/2013
4/4/2013
4/4/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
6/11/2013
6/11/2013

AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P

AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P

AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C
AV:L/AC:M/AU:N/C:C/I:C/A:C

AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P

7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
7/31/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
10/17/2013

1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/22/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
8/29/2013
1/16/2014

AV:N/AC:M/AU:N/C:N/I:N/A:C
AV:N/AC:M/AU:N/C:N/I:N/A:C
AV:N/AC:M/AU:N/C:N/I:N/A:C
AV:N/AC:M/AU:N/C:N/I:N/A:C
AV:N/AC:M/AU:N/C:N/I:N/A:C

AV:N/AC:M/AU:N/C:P/I:P/A:P

AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:L/AC:L/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C
AV:A/AC:M/AU:N/C:C/I:C/A:C

10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
10/17/2013
11/14/2013
11/14/2013
11/14/2013
11/14/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/5/2013
12/5/2013
12/5/2013

1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
11/14/2013
11/14/2013
11/14/2013
11/14/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/3/2013
12/5/2013
12/5/2013
12/5/2013

AV:N/AC:L/AU:N/C:N/I:N/A:P

AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:L/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:A/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:L/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P

12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014

12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/5/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
12/22/2013
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
1/16/2014
5/29/2014
12/4/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014

AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P
AV:N/AC:M/AU:N/C:N/I:N/A:P

AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:C/I:C/A:C
AV:N/AC:M/AU:N/C:P/I:P/A:N
AV:N/AC:M/AU:N/C:P/I:P/A:N

AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N

3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
3/11/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014

5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/10/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014

AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N
AV:N/AC:L/AU:N/C:P/I:N/A:N

AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P

4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
4/14/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014

4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
4/22/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
5/29/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014

AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P

6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014
6/10/2014

10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014
10/9/2014

AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:M/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:N/AC:L/AU:N/C:P/I:P/A:P
AV:L/AC:M/Au:S/C:P/I:P/A:N
AV:L/AC:M/Au:S/C:P/I:P/A:N
AV:L/AC:M/Au:S/C:P/I:P/A:N
AV:L/AC:M/Au:S/C:P/I:P/A:N
AV:L/AC:M/Au:S/C:P/I:P/A:N
AV:L/AC:M/Au:S/C:P/I:P/A:N
AV:N/AC:L/Au:N/C:N/I:N/A:P
AV:N/AC:L/Au:N/C:N/I:N/A:P
AV:N/AC:L/Au:N/C:N/I:N/A:P

6/10/2014
6/10/2014
6/10/2014
6/24/2014
6/24/2014
6/24/2014
6/24/2014
6/24/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/11/2014
9/11/2014
9/11/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014

10/9/2014
10/9/2014
10/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
9/9/2014
12/4/2014
9/9/2014
9/9/2014
12/4/2014
9/9/2014
9/9/2014
12/4/2014
9/9/2014
9/9/2014
9/9/2014
9/11/2014
9/11/2014
9/11/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014

9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014

10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014

9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
9/30/2014
10/22/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/9/2014
12/9/2014
12/9/2014
12/9/2014
12/9/2014
12/10/2014
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015

10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/17/2014
10/22/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
1/27/2015
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/4/2014
12/9/2014
12/9/2014
12/9/2014
12/9/2014
12/9/2014
12/10/2014
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015

1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/27/2015
1/29/2015
1/29/2015
1/29/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015

1/27/2015
1/27/2015
1/27/2015
1/27/2015
2/26/2015
1/27/2015
1/27/2015
1/27/2015
1/29/2015
1/29/2015
1/29/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/9/2015
4/9/2015
4/30/2015
4/16/2015
4/16/2015
4/17/2015
4/2/2015
4/2/2015
4/2/2015
4/16/2015
4/30/2015
4/30/2015
4/9/2015
4/2/2015
4/2/2015
5/7/2015
4/9/2015
4/9/2015
4/9/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/23/2015
4/23/2015
4/23/2015
4/2/2015
4/2/2015
4/23/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015

4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015

4/2/2015
5/7/2015
5/7/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/9/2015
4/9/2015
4/13/2015
4/13/2015
4/2/2015
4/2/2015
4/2/2015
5/7/2015
4/23/2015
4/2/2015
4/9/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/2/2015
4/23/2015
4/30/2015
4/9/2015
4/9/2015
4/9/2015
4/2/2015
5/8/2015
5/8/2015
4/16/2015
4/16/2015
4/30/2015
4/30/2015
7/2/2015

Você também pode gostar