we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of ESX
ESX vulnerability: memory corruption via NFC
An attacker can alter NFC data between the client and VMware ESX/ESXi/vCenter, in order to corrupt the memory, which can lead to code execution.
ESX vulnerability: memory corruption of client authentication
An attacker can setup a malicious sever, and invite VMware vCenter Server, vSphere Client and ESX clients to connect, in order to corrupt their memory, which leads to code execution.
ESX vulnerability: denial of service via vSphere API
An unauthenticated attacker can send a malicious query to the API of VMware ESX or ESXi, in order to stop the management service.
ESX vulnerability: using freed memory via XPath/generate-id
An attacker can use XSLT data with XPath or generate-id(), in order to stop applications linked to libxslt, and possibly to execute code.
ESX vulnerability: denial of service via RDATA 65535
When the ISC BIND DNS server processes a record with a RDATA larger than 65535 bytes it stops.
Display other vulnerabilities of ESX described by Vigil@nce...
. Vigil@nce is a service from
Orange Business Services