VMware Fusion 13.5

CPE Details

VMware Fusion 13.5
13.5
2024-10-17
12h01 +00:00
2024-10-17
12h01 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:vmware:fusion:13.5:*:*:*:*:*:*:*

Informations

Vendor

vmware

Product

fusion

Version

13.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-38811 2024-09-03 09h47 +00:00 VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable. A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.
8.8
High
CVE-2024-22273 2024-05-21 17h29 +00:00 The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.
8.1
High
CVE-2024-22268 2024-05-14 12h58 +00:00 VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality. A malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.
7.1
High
CVE-2024-22267 2024-05-14 12h58 +00:00 VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
9.3
Critical
CVE-2024-22252 2024-03-05 17h57 +00:00 VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
9.3
Critical