Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/vmware-server@6.5.5.328052
Typeebuild
Namespaceapp-emulation
Namevmware-server
Version6.5.5.328052
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2a5v-kuuc-7uaa
vulnerability_id VCID-2a5v-kuuc-7uaa
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2267
reference_id
reference_type
scores
0
value 0.02551
scoring_system epss
scoring_elements 0.85417
published_at 2026-04-01T12:55:00Z
1
value 0.02551
scoring_system epss
scoring_elements 0.85429
published_at 2026-04-02T12:55:00Z
2
value 0.02551
scoring_system epss
scoring_elements 0.85449
published_at 2026-04-04T12:55:00Z
3
value 0.02551
scoring_system epss
scoring_elements 0.85453
published_at 2026-04-07T12:55:00Z
4
value 0.02551
scoring_system epss
scoring_elements 0.85473
published_at 2026-04-08T12:55:00Z
5
value 0.02551
scoring_system epss
scoring_elements 0.85482
published_at 2026-04-09T12:55:00Z
6
value 0.02551
scoring_system epss
scoring_elements 0.85496
published_at 2026-04-11T12:55:00Z
7
value 0.02551
scoring_system epss
scoring_elements 0.85494
published_at 2026-04-12T12:55:00Z
8
value 0.02551
scoring_system epss
scoring_elements 0.85491
published_at 2026-04-13T12:55:00Z
9
value 0.02551
scoring_system epss
scoring_elements 0.85514
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2267
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt
reference_id CVE-2009-2267;OSVDB-59441
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt
2
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-2267
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a5v-kuuc-7uaa
1
url VCID-2kj7-a6r9-bfft
vulnerability_id VCID-2kj7-a6r9-bfft
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1806
reference_id
reference_type
scores
0
value 0.03824
scoring_system epss
scoring_elements 0.8815
published_at 2026-04-16T12:55:00Z
1
value 0.03824
scoring_system epss
scoring_elements 0.88079
published_at 2026-04-01T12:55:00Z
2
value 0.03824
scoring_system epss
scoring_elements 0.88088
published_at 2026-04-02T12:55:00Z
3
value 0.03824
scoring_system epss
scoring_elements 0.88103
published_at 2026-04-04T12:55:00Z
4
value 0.03824
scoring_system epss
scoring_elements 0.88109
published_at 2026-04-07T12:55:00Z
5
value 0.03824
scoring_system epss
scoring_elements 0.88128
published_at 2026-04-08T12:55:00Z
6
value 0.03824
scoring_system epss
scoring_elements 0.88134
published_at 2026-04-09T12:55:00Z
7
value 0.03824
scoring_system epss
scoring_elements 0.88143
published_at 2026-04-11T12:55:00Z
8
value 0.03824
scoring_system epss
scoring_elements 0.88136
published_at 2026-04-12T12:55:00Z
9
value 0.03824
scoring_system epss
scoring_elements 0.88137
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1806
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
27
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
28
reference_url http://securitytracker.com/id?1020238
reference_id
reference_type
scores
url http://securitytracker.com/id?1020238
29
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
30
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
33
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
34
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
39
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
41
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
43
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
44
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
45
reference_url http://www.securityfocus.com/bid/29640
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29640
46
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
47
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
48
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
49
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
50
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
51
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
52
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
53
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
54
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
55
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
56
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
57
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
58
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450768
reference_id 450768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450768
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1806
reference_id CVE-2008-1806
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1806
66
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
67
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
68
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
69
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
70
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
aliases CVE-2008-1806
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft
2
url VCID-2nvs-t3tu-6qb5
vulnerability_id VCID-2nvs-t3tu-6qb5
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5269
reference_id
reference_type
scores
0
value 0.08043
scoring_system epss
scoring_elements 0.92088
published_at 2026-04-01T12:55:00Z
1
value 0.08043
scoring_system epss
scoring_elements 0.92095
published_at 2026-04-02T12:55:00Z
2
value 0.08043
scoring_system epss
scoring_elements 0.92102
published_at 2026-04-04T12:55:00Z
3
value 0.08043
scoring_system epss
scoring_elements 0.92106
published_at 2026-04-07T12:55:00Z
4
value 0.08043
scoring_system epss
scoring_elements 0.92118
published_at 2026-04-08T12:55:00Z
5
value 0.08043
scoring_system epss
scoring_elements 0.92121
published_at 2026-04-13T12:55:00Z
6
value 0.08043
scoring_system epss
scoring_elements 0.92125
published_at 2026-04-12T12:55:00Z
7
value 0.08043
scoring_system epss
scoring_elements 0.92132
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5269
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=324771
reference_id 324771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=324771
3
reference_url https://security.gentoo.org/glsa/200711-08
reference_id GLSA-200711-08
reference_type
scores
url https://security.gentoo.org/glsa/200711-08
4
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
5
reference_url https://security.gentoo.org/glsa/201412-11
reference_id GLSA-201412-11
reference_type
scores
url https://security.gentoo.org/glsa/201412-11
6
reference_url https://access.redhat.com/errata/RHSA-2007:0992
reference_id RHSA-2007:0992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0992
7
reference_url https://usn.ubuntu.com/538-1/
reference_id USN-538-1
reference_type
scores
url https://usn.ubuntu.com/538-1/
8
reference_url https://usn.ubuntu.com/730-1/
reference_id USN-730-1
reference_type
scores
url https://usn.ubuntu.com/730-1/
fixed_packages
aliases CVE-2007-5269
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nvs-t3tu-6qb5
3
url VCID-2yer-rsfy-h3c2
vulnerability_id VCID-2yer-rsfy-h3c2
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1340
reference_id
reference_type
scores
0
value 0.00944
scoring_system epss
scoring_elements 0.76246
published_at 2026-04-01T12:55:00Z
1
value 0.00944
scoring_system epss
scoring_elements 0.76249
published_at 2026-04-02T12:55:00Z
2
value 0.00944
scoring_system epss
scoring_elements 0.7628
published_at 2026-04-04T12:55:00Z
3
value 0.00944
scoring_system epss
scoring_elements 0.7626
published_at 2026-04-07T12:55:00Z
4
value 0.00944
scoring_system epss
scoring_elements 0.76292
published_at 2026-04-08T12:55:00Z
5
value 0.00944
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-13T12:55:00Z
6
value 0.00944
scoring_system epss
scoring_elements 0.76333
published_at 2026-04-11T12:55:00Z
7
value 0.00944
scoring_system epss
scoring_elements 0.76311
published_at 2026-04-12T12:55:00Z
8
value 0.01077
scoring_system epss
scoring_elements 0.77841
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1340
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-1340
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yer-rsfy-h3c2
4
url VCID-63ya-au98-hkes
vulnerability_id VCID-63ya-au98-hkes
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5503.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5503
reference_id
reference_type
scores
0
value 0.10388
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-01T12:55:00Z
1
value 0.10388
scoring_system epss
scoring_elements 0.93192
published_at 2026-04-02T12:55:00Z
2
value 0.10388
scoring_system epss
scoring_elements 0.93197
published_at 2026-04-04T12:55:00Z
3
value 0.10388
scoring_system epss
scoring_elements 0.93194
published_at 2026-04-07T12:55:00Z
4
value 0.10388
scoring_system epss
scoring_elements 0.93203
published_at 2026-04-08T12:55:00Z
5
value 0.10388
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-09T12:55:00Z
6
value 0.10388
scoring_system epss
scoring_elements 0.93212
published_at 2026-04-11T12:55:00Z
7
value 0.10388
scoring_system epss
scoring_elements 0.93209
published_at 2026-04-12T12:55:00Z
8
value 0.10388
scoring_system epss
scoring_elements 0.93211
published_at 2026-04-13T12:55:00Z
9
value 0.10388
scoring_system epss
scoring_elements 0.93227
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5503
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=387431
reference_id 387431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=387431
3
reference_url https://security.gentoo.org/glsa/200712-04
reference_id GLSA-200712-04
reference_type
scores
url https://security.gentoo.org/glsa/200712-04
4
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
5
reference_url https://access.redhat.com/errata/RHSA-2007:1078
reference_id RHSA-2007:1078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1078
6
reference_url https://usn.ubuntu.com/550-1/
reference_id USN-550-1
reference_type
scores
url https://usn.ubuntu.com/550-1/
fixed_packages
aliases CVE-2007-5503
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63ya-au98-hkes
5
url VCID-7yq2-17us-5kdd
vulnerability_id VCID-7yq2-17us-5kdd
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1362
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10126
published_at 2026-04-01T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10248
published_at 2026-04-02T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10313
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10213
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10286
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10348
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10378
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10337
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.1019
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1362
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-1362
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yq2-17us-5kdd
6
url VCID-8fbf-8fea-27d9
vulnerability_id VCID-8fbf-8fea-27d9
summary
Two vulnerabilities in dnsmasq might allow for a Denial of Service or
    spoofing of DNS replies.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc
1
reference_url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
reference_id
reference_type
scores
url http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html
2
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520
4
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368
5
reference_url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
6
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
7
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
8
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
9
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
12
reference_url http://marc.info/?l=bugtraq&m=121630706004256&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121630706004256&w=2
13
reference_url http://marc.info/?l=bugtraq&m=121866517322103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=121866517322103&w=2
14
reference_url http://marc.info/?l=bugtraq&m=123324863916385&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=123324863916385&w=2
15
reference_url http://marc.info/?l=bugtraq&m=141879471518471&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879471518471&w=2
16
reference_url http://rhn.redhat.com/errata/RHSA-2008-0533.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0533.html
17
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json
18
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
reference_id
reference_type
scores
0
value 0.86697
scoring_system epss
scoring_elements 0.99425
published_at 2026-04-16T12:55:00Z
1
value 0.86697
scoring_system epss
scoring_elements 0.99423
published_at 2026-04-13T12:55:00Z
2
value 0.86697
scoring_system epss
scoring_elements 0.99417
published_at 2026-04-01T12:55:00Z
3
value 0.86697
scoring_system epss
scoring_elements 0.99416
published_at 2026-04-02T12:55:00Z
4
value 0.86697
scoring_system epss
scoring_elements 0.99418
published_at 2026-04-07T12:55:00Z
5
value 0.86697
scoring_system epss
scoring_elements 0.99419
published_at 2026-04-08T12:55:00Z
6
value 0.86697
scoring_system epss
scoring_elements 0.9942
published_at 2026-04-09T12:55:00Z
7
value 0.86697
scoring_system epss
scoring_elements 0.99422
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1447
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
20
reference_url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
reference_id
reference_type
scores
url https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037
21
reference_url http://secunia.com/advisories/30925
reference_id
reference_type
scores
url http://secunia.com/advisories/30925
22
reference_url http://secunia.com/advisories/30973
reference_id
reference_type
scores
url http://secunia.com/advisories/30973
23
reference_url http://secunia.com/advisories/30977
reference_id
reference_type
scores
url http://secunia.com/advisories/30977
24
reference_url http://secunia.com/advisories/30979
reference_id
reference_type
scores
url http://secunia.com/advisories/30979
25
reference_url http://secunia.com/advisories/30980
reference_id
reference_type
scores
url http://secunia.com/advisories/30980
26
reference_url http://secunia.com/advisories/30988
reference_id
reference_type
scores
url http://secunia.com/advisories/30988
27
reference_url http://secunia.com/advisories/30989
reference_id
reference_type
scores
url http://secunia.com/advisories/30989
28
reference_url http://secunia.com/advisories/30998
reference_id
reference_type
scores
url http://secunia.com/advisories/30998
29
reference_url http://secunia.com/advisories/31011
reference_id
reference_type
scores
url http://secunia.com/advisories/31011
30
reference_url http://secunia.com/advisories/31012
reference_id
reference_type
scores
url http://secunia.com/advisories/31012
31
reference_url http://secunia.com/advisories/31014
reference_id
reference_type
scores
url http://secunia.com/advisories/31014
32
reference_url http://secunia.com/advisories/31019
reference_id
reference_type
scores
url http://secunia.com/advisories/31019
33
reference_url http://secunia.com/advisories/31022
reference_id
reference_type
scores
url http://secunia.com/advisories/31022
34
reference_url http://secunia.com/advisories/31030
reference_id
reference_type
scores
url http://secunia.com/advisories/31030
35
reference_url http://secunia.com/advisories/31031
reference_id
reference_type
scores
url http://secunia.com/advisories/31031
36
reference_url http://secunia.com/advisories/31033
reference_id
reference_type
scores
url http://secunia.com/advisories/31033
37
reference_url http://secunia.com/advisories/31052
reference_id
reference_type
scores
url http://secunia.com/advisories/31052
38
reference_url http://secunia.com/advisories/31065
reference_id
reference_type
scores
url http://secunia.com/advisories/31065
39
reference_url http://secunia.com/advisories/31072
reference_id
reference_type
scores
url http://secunia.com/advisories/31072
40
reference_url http://secunia.com/advisories/31093
reference_id
reference_type
scores
url http://secunia.com/advisories/31093
41
reference_url http://secunia.com/advisories/31094
reference_id
reference_type
scores
url http://secunia.com/advisories/31094
42
reference_url http://secunia.com/advisories/31137
reference_id
reference_type
scores
url http://secunia.com/advisories/31137
43
reference_url http://secunia.com/advisories/31143
reference_id
reference_type
scores
url http://secunia.com/advisories/31143
44
reference_url http://secunia.com/advisories/31151
reference_id
reference_type
scores
url http://secunia.com/advisories/31151
45
reference_url http://secunia.com/advisories/31152
reference_id
reference_type
scores
url http://secunia.com/advisories/31152
46
reference_url http://secunia.com/advisories/31153
reference_id
reference_type
scores
url http://secunia.com/advisories/31153
47
reference_url http://secunia.com/advisories/31169
reference_id
reference_type
scores
url http://secunia.com/advisories/31169
48
reference_url http://secunia.com/advisories/31197
reference_id
reference_type
scores
url http://secunia.com/advisories/31197
49
reference_url http://secunia.com/advisories/31199
reference_id
reference_type
scores
url http://secunia.com/advisories/31199
50
reference_url http://secunia.com/advisories/31204
reference_id
reference_type
scores
url http://secunia.com/advisories/31204
51
reference_url http://secunia.com/advisories/31207
reference_id
reference_type
scores
url http://secunia.com/advisories/31207
52
reference_url http://secunia.com/advisories/31209
reference_id
reference_type
scores
url http://secunia.com/advisories/31209
53
reference_url http://secunia.com/advisories/31212
reference_id
reference_type
scores
url http://secunia.com/advisories/31212
54
reference_url http://secunia.com/advisories/31213
reference_id
reference_type
scores
url http://secunia.com/advisories/31213
55
reference_url http://secunia.com/advisories/31221
reference_id
reference_type
scores
url http://secunia.com/advisories/31221
56
reference_url http://secunia.com/advisories/31236
reference_id
reference_type
scores
url http://secunia.com/advisories/31236
57
reference_url http://secunia.com/advisories/31237
reference_id
reference_type
scores
url http://secunia.com/advisories/31237
58
reference_url http://secunia.com/advisories/31254
reference_id
reference_type
scores
url http://secunia.com/advisories/31254
59
reference_url http://secunia.com/advisories/31326
reference_id
reference_type
scores
url http://secunia.com/advisories/31326
60
reference_url http://secunia.com/advisories/31354
reference_id
reference_type
scores
url http://secunia.com/advisories/31354
61
reference_url http://secunia.com/advisories/31422
reference_id
reference_type
scores
url http://secunia.com/advisories/31422
62
reference_url http://secunia.com/advisories/31430
reference_id
reference_type
scores
url http://secunia.com/advisories/31430
63
reference_url http://secunia.com/advisories/31451
reference_id
reference_type
scores
url http://secunia.com/advisories/31451
64
reference_url http://secunia.com/advisories/31482
reference_id
reference_type
scores
url http://secunia.com/advisories/31482
65
reference_url http://secunia.com/advisories/31495
reference_id
reference_type
scores
url http://secunia.com/advisories/31495
66
reference_url http://secunia.com/advisories/31588
reference_id
reference_type
scores
url http://secunia.com/advisories/31588
67
reference_url http://secunia.com/advisories/31687
reference_id
reference_type
scores
url http://secunia.com/advisories/31687
68
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
69
reference_url http://secunia.com/advisories/31882
reference_id
reference_type
scores
url http://secunia.com/advisories/31882
70
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
71
reference_url http://secunia.com/advisories/33178
reference_id
reference_type
scores
url http://secunia.com/advisories/33178
72
reference_url http://secunia.com/advisories/33714
reference_id
reference_type
scores
url http://secunia.com/advisories/33714
73
reference_url http://secunia.com/advisories/33786
reference_id
reference_type
scores
url http://secunia.com/advisories/33786
74
reference_url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
reference_id
reference_type
scores
url http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc
75
reference_url http://security.gentoo.org/glsa/glsa-200807-08.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-08.xml
76
reference_url http://security.gentoo.org/glsa/glsa-200812-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-17.xml
77
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
78
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43334
79
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43637
80
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680
81
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239
82
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117
83
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725
84
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761
85
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917
86
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627
87
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1
88
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1
89
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
90
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
91
reference_url http://support.citrix.com/article/CTX117991
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX117991
92
reference_url http://support.citrix.com/article/CTX118183
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX118183
93
reference_url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
reference_id
reference_type
scores
url http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152
94
reference_url https://www.exploit-db.com/exploits/6122
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6122
95
reference_url https://www.exploit-db.com/exploits/6123
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6123
96
reference_url https://www.exploit-db.com/exploits/6130
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6130
97
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html
98
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html
99
reference_url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
100
reference_url http://up2date.astaro.com/2008/08/up2date_7202_released.html
reference_id
reference_type
scores
url http://up2date.astaro.com/2008/08/up2date_7202_released.html
101
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231
102
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018
103
reference_url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
reference_id
reference_type
scores
url http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning
104
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0002.txt
105
reference_url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
reference_id
reference_type
scores
url http://www.caughq.org/exploits/CAU-EX-2008-0003.txt
106
reference_url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
reference_id
reference_type
scores
url http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml
107
reference_url http://www.debian.org/security/2008/dsa-1603
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1603
108
reference_url http://www.debian.org/security/2008/dsa-1604
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1604
109
reference_url http://www.debian.org/security/2008/dsa-1605
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1605
110
reference_url http://www.debian.org/security/2008/dsa-1619
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1619
111
reference_url http://www.debian.org/security/2008/dsa-1623
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1623
112
reference_url http://www.doxpara.com/DMK_BO2K8.ppt
reference_id
reference_type
scores
url http://www.doxpara.com/DMK_BO2K8.ppt
113
reference_url http://www.doxpara.com/?p=1176
reference_id
reference_type
scores
url http://www.doxpara.com/?p=1176
114
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26667
115
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26668
116
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26669
117
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26670
118
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26671
119
reference_url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
reference_id
reference_type
scores
url http://www.ibm.com/support/docview.wss?uid=isg1IZ26672
120
reference_url http://www.ipcop.org/index.php?name=News&file=article&sid=40
reference_id
reference_type
scores
url http://www.ipcop.org/index.php?name=News&file=article&sid=40
121
reference_url http://www.isc.org/index.pl?/sw/bind/bind-security.php
reference_id
reference_type
scores
url http://www.isc.org/index.pl?/sw/bind/bind-security.php
122
reference_url http://www.kb.cert.org/vuls/id/800113
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/800113
123
reference_url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7DWR4J
124
reference_url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q
125
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:139
126
reference_url http://www.nominum.com/asset_upload_file741_2661.pdf
reference_id
reference_type
scores
url http://www.nominum.com/asset_upload_file741_2661.pdf
127
reference_url http://www.novell.com/support/viewContent.do?externalId=7000912
reference_id
reference_type
scores
url http://www.novell.com/support/viewContent.do?externalId=7000912
128
reference_url http://www.openbsd.org/errata42.html#013_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata42.html#013_bind
129
reference_url http://www.openbsd.org/errata43.html#004_bind
reference_id
reference_type
scores
url http://www.openbsd.org/errata43.html#004_bind
130
reference_url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog
131
reference_url http://www.phys.uu.nl/~rombouts/pdnsd.html
reference_id
reference_type
scores
url http://www.phys.uu.nl/~rombouts/pdnsd.html
132
reference_url http://www.redhat.com/support/errata/RHSA-2008-0789.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0789.html
133
reference_url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
reference_id
reference_type
scores
url http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html
134
reference_url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
135
reference_url http://www.securityfocus.com/archive/1/495289/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495289/100/0/threaded
136
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
137
reference_url http://www.securityfocus.com/bid/30131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30131
138
reference_url http://www.securitytracker.com/id?1020437
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020437
139
reference_url http://www.securitytracker.com/id?1020438
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020438
140
reference_url http://www.securitytracker.com/id?1020440
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020440
141
reference_url http://www.securitytracker.com/id?1020448
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020448
142
reference_url http://www.securitytracker.com/id?1020449
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020449
143
reference_url http://www.securitytracker.com/id?1020548
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020548
144
reference_url http://www.securitytracker.com/id?1020558
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020558
145
reference_url http://www.securitytracker.com/id?1020560
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020560
146
reference_url http://www.securitytracker.com/id?1020561
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020561
147
reference_url http://www.securitytracker.com/id?1020575
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020575
148
reference_url http://www.securitytracker.com/id?1020576
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020576
149
reference_url http://www.securitytracker.com/id?1020577
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020577
150
reference_url http://www.securitytracker.com/id?1020578
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020578
151
reference_url http://www.securitytracker.com/id?1020579
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020579
152
reference_url http://www.securitytracker.com/id?1020651
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020651
153
reference_url http://www.securitytracker.com/id?1020653
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020653
154
reference_url http://www.securitytracker.com/id?1020702
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020702
155
reference_url http://www.securitytracker.com/id?1020802
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020802
156
reference_url http://www.securitytracker.com/id?1020804
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020804
157
reference_url http://www.ubuntu.com/usn/usn-622-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-622-1
158
reference_url http://www.ubuntu.com/usn/usn-627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-627-1
159
reference_url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
reference_id
reference_type
scores
url http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
160
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190A.html
161
reference_url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-190B.html
162
reference_url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-260A.html
163
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
164
reference_url http://www.vupen.com/english/advisories/2008/2019/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2019/references
165
reference_url http://www.vupen.com/english/advisories/2008/2023/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2023/references
166
reference_url http://www.vupen.com/english/advisories/2008/2025/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2025/references
167
reference_url http://www.vupen.com/english/advisories/2008/2029/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2029/references
168
reference_url http://www.vupen.com/english/advisories/2008/2030/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2030/references
169
reference_url http://www.vupen.com/english/advisories/2008/2050/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2050/references
170
reference_url http://www.vupen.com/english/advisories/2008/2051/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2051/references
171
reference_url http://www.vupen.com/english/advisories/2008/2052/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2052/references
172
reference_url http://www.vupen.com/english/advisories/2008/2055/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2055/references
173
reference_url http://www.vupen.com/english/advisories/2008/2092/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2092/references
174
reference_url http://www.vupen.com/english/advisories/2008/2113/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2113/references
175
reference_url http://www.vupen.com/english/advisories/2008/2114/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2114/references
176
reference_url http://www.vupen.com/english/advisories/2008/2123/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2123/references
177
reference_url http://www.vupen.com/english/advisories/2008/2139/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2139/references
178
reference_url http://www.vupen.com/english/advisories/2008/2166/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2166/references
179
reference_url http://www.vupen.com/english/advisories/2008/2195/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2195/references
180
reference_url http://www.vupen.com/english/advisories/2008/2196/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2196/references
181
reference_url http://www.vupen.com/english/advisories/2008/2197/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2197/references
182
reference_url http://www.vupen.com/english/advisories/2008/2268
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2268
183
reference_url http://www.vupen.com/english/advisories/2008/2291
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2291
184
reference_url http://www.vupen.com/english/advisories/2008/2334
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2334
185
reference_url http://www.vupen.com/english/advisories/2008/2342
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2342
186
reference_url http://www.vupen.com/english/advisories/2008/2377
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2377
187
reference_url http://www.vupen.com/english/advisories/2008/2383
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2383
188
reference_url http://www.vupen.com/english/advisories/2008/2384
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2384
189
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
190
reference_url http://www.vupen.com/english/advisories/2008/2467
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2467
191
reference_url http://www.vupen.com/english/advisories/2008/2482
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2482
192
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
193
reference_url http://www.vupen.com/english/advisories/2008/2549
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2549
194
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
195
reference_url http://www.vupen.com/english/advisories/2008/2582
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2582
196
reference_url http://www.vupen.com/english/advisories/2008/2584
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2584
197
reference_url http://www.vupen.com/english/advisories/2009/0297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0297
198
reference_url http://www.vupen.com/english/advisories/2009/0311
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0311
199
reference_url http://www.vupen.com/english/advisories/2010/0622
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0622
200
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=449345
reference_id 449345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=449345
201
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
reference_id 490123
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
202
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
reference_id 492465
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465
203
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
reference_id 492698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698
204
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
reference_id 492700
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700
205
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
reference_id 493599
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
reference_id CVE-2008-1447
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-1447
242
reference_url https://security.gentoo.org/glsa/200807-08
reference_id GLSA-200807-08
reference_type
scores
url https://security.gentoo.org/glsa/200807-08
243
reference_url https://security.gentoo.org/glsa/200809-02
reference_id GLSA-200809-02
reference_type
scores
url https://security.gentoo.org/glsa/200809-02
244
reference_url https://security.gentoo.org/glsa/200812-17
reference_id GLSA-200812-17
reference_type
scores
url https://security.gentoo.org/glsa/200812-17
245
reference_url https://security.gentoo.org/glsa/200901-03
reference_id GLSA-200901-03
reference_type
scores
url https://security.gentoo.org/glsa/200901-03
246
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
247
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb
248
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py
249
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
reference_id OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c
250
reference_url https://access.redhat.com/errata/RHSA-2008:0533
reference_id RHSA-2008:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0533
251
reference_url https://access.redhat.com/errata/RHSA-2008:0789
reference_id RHSA-2008:0789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0789
252
reference_url https://usn.ubuntu.com/622-1/
reference_id USN-622-1
reference_type
scores
url https://usn.ubuntu.com/622-1/
253
reference_url https://usn.ubuntu.com/627-1/
reference_id USN-627-1
reference_type
scores
url https://usn.ubuntu.com/627-1/
fixed_packages
aliases CVE-2008-1447
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9
7
url VCID-9enb-qxzr-zka6
vulnerability_id VCID-9enb-qxzr-zka6
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://kb.vmware.com/kb/1006980
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1006980
1
reference_url http://kb.vmware.com/kb/1006986
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1006986
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4917
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22195
published_at 2026-04-16T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22152
published_at 2026-04-01T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.2231
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22353
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22138
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22221
published_at 2026-04-08T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22275
published_at 2026-04-09T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22295
published_at 2026-04-11T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22253
published_at 2026-04-12T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22193
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4917
3
reference_url http://secunia.com/advisories/32965
reference_id
reference_type
scores
url http://secunia.com/advisories/32965
4
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
5
reference_url http://securitytracker.com/id?1021300
reference_id
reference_type
scores
url http://securitytracker.com/id?1021300
6
reference_url http://securitytracker.com/id?1021301
reference_id
reference_type
scores
url http://securitytracker.com/id?1021301
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246
8
reference_url http://www.securityfocus.com/archive/1/498863/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498863/100/0/threaded
9
reference_url http://www.securityfocus.com/archive/1/498886/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498886/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/32597
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32597
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4917
reference_id CVE-2008-4917
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4917
17
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-4917
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9enb-qxzr-zka6
8
url VCID-a1zy-wpsh-ybdq
vulnerability_id VCID-a1zy-wpsh-ybdq
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
1
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
2
reference_url http://freetexthost.com/qr1tffkzpu
reference_id
reference_type
scores
url http://freetexthost.com/qr1tffkzpu
3
reference_url http://lists.vmware.com/pipermail/security-announce/2010/000090.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2010/000090.html
4
reference_url http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html
reference_id
reference_type
scores
url http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4811
reference_id
reference_type
scores
0
value 0.01279
scoring_system epss
scoring_elements 0.79599
published_at 2026-04-16T12:55:00Z
1
value 0.01279
scoring_system epss
scoring_elements 0.79521
published_at 2026-04-01T12:55:00Z
2
value 0.01279
scoring_system epss
scoring_elements 0.79527
published_at 2026-04-02T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79549
published_at 2026-04-04T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79536
published_at 2026-04-07T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.79564
published_at 2026-04-08T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79572
published_at 2026-04-09T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79594
published_at 2026-04-11T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.79578
published_at 2026-04-12T12:55:00Z
9
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4811
6
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
7
reference_url http://www.securityfocus.com/bid/36630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/36630
8
reference_url http://www.vmware.com/security/advisories/VMSA-2010-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2010-0007.html
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-4811
reference_id CVE-2009-4811
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-4811
34
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-4811
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a1zy-wpsh-ybdq
9
url VCID-b7yt-1bj3-13bp
vulnerability_id VCID-b7yt-1bj3-13bp
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1139
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22497
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.2267
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22715
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22504
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22584
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22639
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22656
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22615
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22559
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22573
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1139
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1139
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7yt-1bj3-13bp
10
url VCID-bz18-eys5-rua3
vulnerability_id VCID-bz18-eys5-rua3
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1364.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1364
reference_id
reference_type
scores
0
value 0.018
scoring_system epss
scoring_elements 0.8272
published_at 2026-04-01T12:55:00Z
1
value 0.018
scoring_system epss
scoring_elements 0.82736
published_at 2026-04-02T12:55:00Z
2
value 0.018
scoring_system epss
scoring_elements 0.82749
published_at 2026-04-04T12:55:00Z
3
value 0.018
scoring_system epss
scoring_elements 0.82746
published_at 2026-04-07T12:55:00Z
4
value 0.018
scoring_system epss
scoring_elements 0.82773
published_at 2026-04-08T12:55:00Z
5
value 0.018
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-09T12:55:00Z
6
value 0.018
scoring_system epss
scoring_elements 0.82795
published_at 2026-04-11T12:55:00Z
7
value 0.018
scoring_system epss
scoring_elements 0.82791
published_at 2026-04-12T12:55:00Z
8
value 0.018
scoring_system epss
scoring_elements 0.82786
published_at 2026-04-13T12:55:00Z
9
value 0.02049
scoring_system epss
scoring_elements 0.83891
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1364
2
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-1364
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz18-eys5-rua3
11
url VCID-d1tn-aydm-7ucp
vulnerability_id VCID-d1tn-aydm-7ucp
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1363
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13347
published_at 2026-04-01T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13449
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13514
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13308
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.1339
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.1344
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13412
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13378
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.1333
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13237
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1363
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-1363
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1tn-aydm-7ucp
12
url VCID-dc32-wm2e-h7fj
vulnerability_id VCID-dc32-wm2e-h7fj
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000054.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000054.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0910
reference_id
reference_type
scores
0
value 0.04399
scoring_system epss
scoring_elements 0.8902
published_at 2026-04-16T12:55:00Z
1
value 0.04399
scoring_system epss
scoring_elements 0.88951
published_at 2026-04-01T12:55:00Z
2
value 0.04399
scoring_system epss
scoring_elements 0.88959
published_at 2026-04-02T12:55:00Z
3
value 0.04399
scoring_system epss
scoring_elements 0.88975
published_at 2026-04-04T12:55:00Z
4
value 0.04399
scoring_system epss
scoring_elements 0.88978
published_at 2026-04-07T12:55:00Z
5
value 0.04399
scoring_system epss
scoring_elements 0.88996
published_at 2026-04-08T12:55:00Z
6
value 0.04399
scoring_system epss
scoring_elements 0.89001
published_at 2026-04-09T12:55:00Z
7
value 0.04399
scoring_system epss
scoring_elements 0.89013
published_at 2026-04-11T12:55:00Z
8
value 0.04399
scoring_system epss
scoring_elements 0.89008
published_at 2026-04-12T12:55:00Z
9
value 0.04399
scoring_system epss
scoring_elements 0.89006
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0910
2
reference_url http://seclists.org/fulldisclosure/2009/Apr/0036.html
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2009/Apr/0036.html
3
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786
5
reference_url http://www.securityfocus.com/bid/34373
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34373
6
reference_url http://www.securitytracker.com/id?1021974
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021974
7
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0005.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0005.html
8
reference_url http://www.vupen.com/english/advisories/2009/0944
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0944
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0910
reference_id CVE-2009-0910
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0910
14
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-0910
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dc32-wm2e-h7fj
13
url VCID-e5gp-hpdc-nydk
vulnerability_id VCID-e5gp-hpdc-nydk
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0967
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21878
published_at 2026-04-16T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21849
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22013
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22066
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21831
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21906
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21961
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21974
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21934
published_at 2026-04-12T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21877
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0967
2
reference_url http://secunia.com/advisories/30556
reference_id
reference_type
scores
url http://secunia.com/advisories/30556
3
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
4
reference_url http://securityreason.com/securityalert/3922
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3922
5
reference_url http://securitytracker.com/id?1020198
reference_id
reference_type
scores
url http://securitytracker.com/id?1020198
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/42878
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/42878
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583
9
reference_url http://www.securityfocus.com/archive/1/493080/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493080/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/29557
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29557
11
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0009.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0009.html
12
reference_url http://www.vupen.com/english/advisories/2008/1744
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1744
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-0967
reference_id CVE-2008-0967
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-0967
51
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-0967
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5gp-hpdc-nydk
14
url VCID-eyg9-ezua-1kfz
vulnerability_id VCID-eyg9-ezua-1kfz
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1138
reference_id
reference_type
scores
0
value 0.00769
scoring_system epss
scoring_elements 0.73446
published_at 2026-04-01T12:55:00Z
1
value 0.00769
scoring_system epss
scoring_elements 0.73454
published_at 2026-04-02T12:55:00Z
2
value 0.00769
scoring_system epss
scoring_elements 0.73477
published_at 2026-04-04T12:55:00Z
3
value 0.00769
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-07T12:55:00Z
4
value 0.00769
scoring_system epss
scoring_elements 0.73485
published_at 2026-04-08T12:55:00Z
5
value 0.00769
scoring_system epss
scoring_elements 0.73499
published_at 2026-04-09T12:55:00Z
6
value 0.00769
scoring_system epss
scoring_elements 0.73522
published_at 2026-04-11T12:55:00Z
7
value 0.00769
scoring_system epss
scoring_elements 0.73503
published_at 2026-04-12T12:55:00Z
8
value 0.00769
scoring_system epss
scoring_elements 0.73496
published_at 2026-04-13T12:55:00Z
9
value 0.00769
scoring_system epss
scoring_elements 0.73539
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1138
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1138
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyg9-ezua-1kfz
15
url VCID-gdac-gvg7-m3e9
vulnerability_id VCID-gdac-gvg7-m3e9
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1141
reference_id
reference_type
scores
0
value 0.0545
scoring_system epss
scoring_elements 0.9014
published_at 2026-04-01T12:55:00Z
1
value 0.0545
scoring_system epss
scoring_elements 0.90143
published_at 2026-04-02T12:55:00Z
2
value 0.0545
scoring_system epss
scoring_elements 0.90154
published_at 2026-04-04T12:55:00Z
3
value 0.0545
scoring_system epss
scoring_elements 0.90159
published_at 2026-04-07T12:55:00Z
4
value 0.0545
scoring_system epss
scoring_elements 0.90175
published_at 2026-04-08T12:55:00Z
5
value 0.0545
scoring_system epss
scoring_elements 0.9018
published_at 2026-04-09T12:55:00Z
6
value 0.0545
scoring_system epss
scoring_elements 0.90189
published_at 2026-04-11T12:55:00Z
7
value 0.0545
scoring_system epss
scoring_elements 0.90188
published_at 2026-04-12T12:55:00Z
8
value 0.0545
scoring_system epss
scoring_elements 0.90183
published_at 2026-04-13T12:55:00Z
9
value 0.0545
scoring_system epss
scoring_elements 0.90201
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1141
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1141
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdac-gvg7-m3e9
16
url VCID-ke4g-w7md-pkh6
vulnerability_id VCID-ke4g-w7md-pkh6
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1142
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.78066
published_at 2026-04-01T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.78075
published_at 2026-04-02T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78104
published_at 2026-04-04T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.78086
published_at 2026-04-07T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78112
published_at 2026-04-08T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78117
published_at 2026-04-09T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78143
published_at 2026-04-11T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78125
published_at 2026-04-12T12:55:00Z
8
value 0.01109
scoring_system epss
scoring_elements 0.78121
published_at 2026-04-13T12:55:00Z
9
value 0.01109
scoring_system epss
scoring_elements 0.78155
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1142
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1142
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke4g-w7md-pkh6
17
url VCID-kxd4-h9ev-1yby
vulnerability_id VCID-kxd4-h9ev-1yby
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1244
reference_id
reference_type
scores
0
value 0.00632
scoring_system epss
scoring_elements 0.70272
published_at 2026-04-01T12:55:00Z
1
value 0.00632
scoring_system epss
scoring_elements 0.70285
published_at 2026-04-02T12:55:00Z
2
value 0.00632
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-04T12:55:00Z
3
value 0.00632
scoring_system epss
scoring_elements 0.70279
published_at 2026-04-07T12:55:00Z
4
value 0.00632
scoring_system epss
scoring_elements 0.70324
published_at 2026-04-08T12:55:00Z
5
value 0.00632
scoring_system epss
scoring_elements 0.70339
published_at 2026-04-09T12:55:00Z
6
value 0.00632
scoring_system epss
scoring_elements 0.70363
published_at 2026-04-11T12:55:00Z
7
value 0.00632
scoring_system epss
scoring_elements 0.70348
published_at 2026-04-12T12:55:00Z
8
value 0.00632
scoring_system epss
scoring_elements 0.70334
published_at 2026-04-13T12:55:00Z
9
value 0.00632
scoring_system epss
scoring_elements 0.70378
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1244
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-1244
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxd4-h9ev-1yby
18
url VCID-njd2-w4zv-h3er
vulnerability_id VCID-njd2-w4zv-h3er
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2010/000092.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2010/000092.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1143
reference_id
reference_type
scores
0
value 0.0149
scoring_system epss
scoring_elements 0.8109
published_at 2026-04-16T12:55:00Z
1
value 0.0149
scoring_system epss
scoring_elements 0.80989
published_at 2026-04-01T12:55:00Z
2
value 0.0149
scoring_system epss
scoring_elements 0.80998
published_at 2026-04-02T12:55:00Z
3
value 0.0149
scoring_system epss
scoring_elements 0.81021
published_at 2026-04-04T12:55:00Z
4
value 0.0149
scoring_system epss
scoring_elements 0.8102
published_at 2026-04-07T12:55:00Z
5
value 0.0149
scoring_system epss
scoring_elements 0.81048
published_at 2026-04-08T12:55:00Z
6
value 0.0149
scoring_system epss
scoring_elements 0.81054
published_at 2026-04-09T12:55:00Z
7
value 0.0149
scoring_system epss
scoring_elements 0.81072
published_at 2026-04-11T12:55:00Z
8
value 0.0149
scoring_system epss
scoring_elements 0.81059
published_at 2026-04-12T12:55:00Z
9
value 0.0149
scoring_system epss
scoring_elements 0.81052
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1143
2
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
3
reference_url http://securitytracker.com/id?1023945
reference_id
reference_type
scores
url http://securitytracker.com/id?1023945
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16298
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16298
5
reference_url http://www.securityfocus.com/bid/39949
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39949
6
reference_url http://www.vmware.com/security/advisories/VMSA-2010-0008.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2010-0008.html
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/12610.txt
reference_id CVE-2010-1143
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/12610.txt
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1143
reference_id CVE-2010-1143
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1143
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33940.txt
reference_id CVE-2010-1143;OSVDB-64440
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33940.txt
13
reference_url https://www.securityfocus.com/bid/39949/info
reference_id CVE-2010-1143;OSVDB-64440
reference_type exploit
scores
url https://www.securityfocus.com/bid/39949/info
14
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1143
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njd2-w4zv-h3er
19
url VCID-pw1x-gvns-bbcx
vulnerability_id VCID-pw1x-gvns-bbcx
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt
reference_id
reference_type
scores
url ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt
1
reference_url http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt
reference_id
reference_type
scores
url http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt
2
reference_url http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
4
reference_url http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
5
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
9
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0040
reference_id
reference_type
scores
0
value 0.08276
scoring_system epss
scoring_elements 0.92254
published_at 2026-04-16T12:55:00Z
1
value 0.08276
scoring_system epss
scoring_elements 0.92209
published_at 2026-04-01T12:55:00Z
2
value 0.08276
scoring_system epss
scoring_elements 0.92246
published_at 2026-04-12T12:55:00Z
3
value 0.08276
scoring_system epss
scoring_elements 0.92242
published_at 2026-04-13T12:55:00Z
4
value 0.08276
scoring_system epss
scoring_elements 0.92216
published_at 2026-04-02T12:55:00Z
5
value 0.08276
scoring_system epss
scoring_elements 0.92222
published_at 2026-04-04T12:55:00Z
6
value 0.08276
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-07T12:55:00Z
7
value 0.08276
scoring_system epss
scoring_elements 0.92235
published_at 2026-04-08T12:55:00Z
8
value 0.08276
scoring_system epss
scoring_elements 0.92239
published_at 2026-04-09T12:55:00Z
9
value 0.08276
scoring_system epss
scoring_elements 0.92245
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0040
12
reference_url http://secunia.com/advisories/33970
reference_id
reference_type
scores
url http://secunia.com/advisories/33970
13
reference_url http://secunia.com/advisories/33976
reference_id
reference_type
scores
url http://secunia.com/advisories/33976
14
reference_url http://secunia.com/advisories/34137
reference_id
reference_type
scores
url http://secunia.com/advisories/34137
15
reference_url http://secunia.com/advisories/34140
reference_id
reference_type
scores
url http://secunia.com/advisories/34140
16
reference_url http://secunia.com/advisories/34143
reference_id
reference_type
scores
url http://secunia.com/advisories/34143
17
reference_url http://secunia.com/advisories/34145
reference_id
reference_type
scores
url http://secunia.com/advisories/34145
18
reference_url http://secunia.com/advisories/34152
reference_id
reference_type
scores
url http://secunia.com/advisories/34152
19
reference_url http://secunia.com/advisories/34210
reference_id
reference_type
scores
url http://secunia.com/advisories/34210
20
reference_url http://secunia.com/advisories/34265
reference_id
reference_type
scores
url http://secunia.com/advisories/34265
21
reference_url http://secunia.com/advisories/34272
reference_id
reference_type
scores
url http://secunia.com/advisories/34272
22
reference_url http://secunia.com/advisories/34320
reference_id
reference_type
scores
url http://secunia.com/advisories/34320
23
reference_url http://secunia.com/advisories/34324
reference_id
reference_type
scores
url http://secunia.com/advisories/34324
24
reference_url http://secunia.com/advisories/34388
reference_id
reference_type
scores
url http://secunia.com/advisories/34388
25
reference_url http://secunia.com/advisories/34462
reference_id
reference_type
scores
url http://secunia.com/advisories/34462
26
reference_url http://secunia.com/advisories/34464
reference_id
reference_type
scores
url http://secunia.com/advisories/34464
27
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
28
reference_url http://secunia.com/advisories/35258
reference_id
reference_type
scores
url http://secunia.com/advisories/35258
29
reference_url http://secunia.com/advisories/35302
reference_id
reference_type
scores
url http://secunia.com/advisories/35302
30
reference_url http://secunia.com/advisories/35379
reference_id
reference_type
scores
url http://secunia.com/advisories/35379
31
reference_url http://secunia.com/advisories/35386
reference_id
reference_type
scores
url http://secunia.com/advisories/35386
32
reference_url http://secunia.com/advisories/36096
reference_id
reference_type
scores
url http://secunia.com/advisories/36096
33
reference_url http://security.gentoo.org/glsa/glsa-200903-28.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-28.xml
34
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
35
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48819
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48819
36
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
37
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
38
reference_url http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com
reference_id
reference_type
scores
url http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com
39
reference_url http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441
40
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316
41
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458
42
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
43
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
44
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
45
reference_url http://support.apple.com/kb/HT3613
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3613
46
reference_url http://support.apple.com/kb/HT3639
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3639
47
reference_url http://support.apple.com/kb/HT3757
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3757
48
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm
49
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
50
reference_url http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document
reference_id
reference_type
scores
url http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document
51
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html
52
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html
53
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
54
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
55
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0046
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0046
56
reference_url http://www.debian.org/security/2009/dsa-1750
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1750
57
reference_url http://www.debian.org/security/2009/dsa-1830
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1830
58
reference_url http://www.kb.cert.org/vuls/id/649212
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/649212
59
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
60
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
61
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
62
reference_url http://www.redhat.com/support/errata/RHSA-2009-0315.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0315.html
63
reference_url http://www.redhat.com/support/errata/RHSA-2009-0325.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0325.html
64
reference_url http://www.redhat.com/support/errata/RHSA-2009-0333.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0333.html
65
reference_url http://www.redhat.com/support/errata/RHSA-2009-0340.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0340.html
66
reference_url http://www.securityfocus.com/archive/1/501767/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501767/100/0/threaded
67
reference_url http://www.securityfocus.com/archive/1/503912/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/503912/100/0/threaded
68
reference_url http://www.securityfocus.com/archive/1/505990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/505990/100/0/threaded
69
reference_url http://www.securityfocus.com/bid/33827
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33827
70
reference_url http://www.securityfocus.com/bid/33990
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33990
71
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
72
reference_url http://www.us-cert.gov/cas/techalerts/TA09-218A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-218A.html
73
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0007.html
74
reference_url http://www.vupen.com/english/advisories/2009/0469
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0469
75
reference_url http://www.vupen.com/english/advisories/2009/0473
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0473
76
reference_url http://www.vupen.com/english/advisories/2009/0632
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0632
77
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
78
reference_url http://www.vupen.com/english/advisories/2009/1451
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1451
79
reference_url http://www.vupen.com/english/advisories/2009/1462
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1462
80
reference_url http://www.vupen.com/english/advisories/2009/1522
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1522
81
reference_url http://www.vupen.com/english/advisories/2009/1560
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1560
82
reference_url http://www.vupen.com/english/advisories/2009/1621
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1621
83
reference_url http://www.vupen.com/english/advisories/2009/2172
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/2172
84
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=486355
reference_id 486355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=486355
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040
reference_id CVE-2009-0040
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040
100
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0040
reference_id CVE-2009-0040
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0040
101
reference_url https://security.gentoo.org/glsa/200903-28
reference_id GLSA-200903-28
reference_type
scores
url https://security.gentoo.org/glsa/200903-28
102
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
103
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
104
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-10
reference_id mfsa2009-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-10
105
reference_url https://access.redhat.com/errata/RHSA-2009:0315
reference_id RHSA-2009:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0315
106
reference_url https://access.redhat.com/errata/RHSA-2009:0325
reference_id RHSA-2009:0325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0325
107
reference_url https://access.redhat.com/errata/RHSA-2009:0333
reference_id RHSA-2009:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0333
108
reference_url https://access.redhat.com/errata/RHSA-2009:0340
reference_id RHSA-2009:0340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0340
109
reference_url https://usn.ubuntu.com/728-1/
reference_id USN-728-1
reference_type
scores
url https://usn.ubuntu.com/728-1/
110
reference_url https://usn.ubuntu.com/730-1/
reference_id USN-730-1
reference_type
scores
url https://usn.ubuntu.com/730-1/
fixed_packages
aliases CVE-2009-0040
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw1x-gvns-bbcx
20
url VCID-q5ts-6ax2-bqgb
vulnerability_id VCID-q5ts-6ax2-bqgb
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000054.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000054.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4916
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11264
published_at 2026-04-16T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11335
published_at 2026-04-01T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11474
published_at 2026-04-02T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11533
published_at 2026-04-04T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11318
published_at 2026-04-07T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.114
published_at 2026-04-08T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11458
published_at 2026-04-09T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11464
published_at 2026-04-11T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11431
published_at 2026-04-12T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11403
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4916
2
reference_url http://seclists.org/fulldisclosure/2009/Apr/0036.html
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2009/Apr/0036.html
3
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439
5
reference_url http://www.securityfocus.com/bid/34373
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34373
6
reference_url http://www.securitytracker.com/id?1021973
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021973
7
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0005.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0005.html
8
reference_url http://www.vupen.com/english/advisories/2009/0944
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0944
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4916
reference_id CVE-2008-4916
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4916
81
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-4916
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ts-6ax2-bqgb
21
url VCID-r2aq-6u1w-dubh
vulnerability_id VCID-r2aq-6u1w-dubh
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000054.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000054.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0909
reference_id
reference_type
scores
0
value 0.03944
scoring_system epss
scoring_elements 0.8836
published_at 2026-04-16T12:55:00Z
1
value 0.03944
scoring_system epss
scoring_elements 0.88292
published_at 2026-04-01T12:55:00Z
2
value 0.03944
scoring_system epss
scoring_elements 0.883
published_at 2026-04-02T12:55:00Z
3
value 0.03944
scoring_system epss
scoring_elements 0.88315
published_at 2026-04-04T12:55:00Z
4
value 0.03944
scoring_system epss
scoring_elements 0.88319
published_at 2026-04-07T12:55:00Z
5
value 0.03944
scoring_system epss
scoring_elements 0.88339
published_at 2026-04-08T12:55:00Z
6
value 0.03944
scoring_system epss
scoring_elements 0.88345
published_at 2026-04-09T12:55:00Z
7
value 0.03944
scoring_system epss
scoring_elements 0.88355
published_at 2026-04-11T12:55:00Z
8
value 0.03944
scoring_system epss
scoring_elements 0.88347
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0909
2
reference_url http://seclists.org/fulldisclosure/2009/Apr/0036.html
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2009/Apr/0036.html
3
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251
5
reference_url http://www.securityfocus.com/bid/34373
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34373
6
reference_url http://www.securitytracker.com/id?1021974
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021974
7
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0005.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0005.html
8
reference_url http://www.vupen.com/english/advisories/2009/0944
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0944
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0909
reference_id CVE-2009-0909
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0909
14
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-0909
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2aq-6u1w-dubh
22
url VCID-r4en-2px9-pkcw
vulnerability_id VCID-r4en-2px9-pkcw
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1361
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12351
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12459
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12502
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12307
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12437
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12443
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12404
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12364
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12265
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1361
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-1361
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4en-2px9-pkcw
23
url VCID-r55y-rbsq-pkb9
vulnerability_id VCID-r55y-rbsq-pkb9
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3707
reference_id
reference_type
scores
0
value 0.21257
scoring_system epss
scoring_elements 0.95642
published_at 2026-04-01T12:55:00Z
1
value 0.21257
scoring_system epss
scoring_elements 0.95651
published_at 2026-04-02T12:55:00Z
2
value 0.21257
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-04T12:55:00Z
3
value 0.21257
scoring_system epss
scoring_elements 0.9566
published_at 2026-04-07T12:55:00Z
4
value 0.21257
scoring_system epss
scoring_elements 0.95668
published_at 2026-04-08T12:55:00Z
5
value 0.21257
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-09T12:55:00Z
6
value 0.21257
scoring_system epss
scoring_elements 0.95677
published_at 2026-04-11T12:55:00Z
7
value 0.21257
scoring_system epss
scoring_elements 0.95676
published_at 2026-04-12T12:55:00Z
8
value 0.21257
scoring_system epss
scoring_elements 0.95678
published_at 2026-04-13T12:55:00Z
9
value 0.21257
scoring_system epss
scoring_elements 0.95686
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3707
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/33271.py
reference_id CVE-2009-3707;OSVDB-58728
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/33271.py
2
reference_url https://www.securityfocus.com/bid/36630/info
reference_id CVE-2009-3707;OSVDB-58728
reference_type exploit
scores
url https://www.securityfocus.com/bid/36630/info
3
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-3707
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r55y-rbsq-pkb9
24
url VCID-rcck-xn4c-k3at
vulnerability_id VCID-rcck-xn4c-k3at
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1808
reference_id
reference_type
scores
0
value 0.0261
scoring_system epss
scoring_elements 0.8566
published_at 2026-04-16T12:55:00Z
1
value 0.0261
scoring_system epss
scoring_elements 0.85565
published_at 2026-04-01T12:55:00Z
2
value 0.0261
scoring_system epss
scoring_elements 0.85577
published_at 2026-04-02T12:55:00Z
3
value 0.0261
scoring_system epss
scoring_elements 0.85594
published_at 2026-04-04T12:55:00Z
4
value 0.0261
scoring_system epss
scoring_elements 0.856
published_at 2026-04-07T12:55:00Z
5
value 0.0261
scoring_system epss
scoring_elements 0.8562
published_at 2026-04-08T12:55:00Z
6
value 0.0261
scoring_system epss
scoring_elements 0.85631
published_at 2026-04-09T12:55:00Z
7
value 0.0261
scoring_system epss
scoring_elements 0.85644
published_at 2026-04-11T12:55:00Z
8
value 0.0261
scoring_system epss
scoring_elements 0.85641
published_at 2026-04-12T12:55:00Z
9
value 0.0261
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1808
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://secunia.com/advisories/35204
reference_id
reference_type
scores
url http://secunia.com/advisories/35204
27
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
28
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
29
reference_url http://securitytracker.com/id?1020240
reference_id
reference_type
scores
url http://securitytracker.com/id?1020240
30
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
31
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
34
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
35
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
36
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
37
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
39
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
40
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2009-0329.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0329.html
45
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
47
reference_url http://www.securityfocus.com/bid/29637
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29637
48
reference_url http://www.securityfocus.com/bid/29639
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29639
49
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
50
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
51
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
52
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
53
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
54
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
55
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
56
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
57
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
58
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
59
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
60
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
61
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
62
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450774
reference_id 450774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450774
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1808
reference_id CVE-2008-1808
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1808
77
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
78
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
79
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
80
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
81
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
82
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
aliases CVE-2008-1808
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at
25
url VCID-rpue-d1na-gkaa
vulnerability_id VCID-rpue-d1na-gkaa
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2100
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35981
published_at 2026-04-16T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.35871
published_at 2026-04-01T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36061
published_at 2026-04-02T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36091
published_at 2026-04-04T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-07T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.35975
published_at 2026-04-08T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.35998
published_at 2026-04-09T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36004
published_at 2026-04-11T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.35965
published_at 2026-04-12T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.35941
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2100
1
reference_url http://secunia.com/advisories/30556
reference_id
reference_type
scores
url http://secunia.com/advisories/30556
2
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
3
reference_url http://securityreason.com/securityalert/3922
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3922
4
reference_url http://securitytracker.com/id?1020200
reference_id
reference_type
scores
url http://securitytracker.com/id?1020200
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/42872
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/42872
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647
8
reference_url http://www.securityfocus.com/archive/1/493080/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493080/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/29552
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29552
10
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0009.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0009.html
11
reference_url http://www.vupen.com/english/advisories/2008/1744
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1744
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2100
reference_id CVE-2008-2100
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2100
27
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-2100
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpue-d1na-gkaa
26
url VCID-rzpn-qmzx-w3gt
vulnerability_id VCID-rzpn-qmzx-w3gt
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1140
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25595
published_at 2026-04-01T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25667
published_at 2026-04-02T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25708
published_at 2026-04-04T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25476
published_at 2026-04-07T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25549
published_at 2026-04-08T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25597
published_at 2026-04-09T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25608
published_at 2026-04-11T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25566
published_at 2026-04-12T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.2551
published_at 2026-04-13T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25514
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1140
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1140
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzpn-qmzx-w3gt
27
url VCID-sz64-mgub-abf2
vulnerability_id VCID-sz64-mgub-abf2
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3733
reference_id
reference_type
scores
0
value 0.9006
scoring_system epss
scoring_elements 0.9958
published_at 2026-04-01T12:55:00Z
1
value 0.9006
scoring_system epss
scoring_elements 0.99581
published_at 2026-04-02T12:55:00Z
2
value 0.9006
scoring_system epss
scoring_elements 0.99582
published_at 2026-04-04T12:55:00Z
3
value 0.9006
scoring_system epss
scoring_elements 0.99583
published_at 2026-04-07T12:55:00Z
4
value 0.9006
scoring_system epss
scoring_elements 0.99584
published_at 2026-04-13T12:55:00Z
5
value 0.9006
scoring_system epss
scoring_elements 0.99585
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3733
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33310.nse
reference_id CVE-2009-3733;OSVDB-59440
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33310.nse
2
reference_url https://www.securityfocus.com/bid/36842/info
reference_id CVE-2009-3733;OSVDB-59440
reference_type exploit
scores
url https://www.securityfocus.com/bid/36842/info
3
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-3733
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sz64-mgub-abf2
28
url VCID-tawd-pjmt-ukag
vulnerability_id VCID-tawd-pjmt-ukag
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1392
reference_id
reference_type
scores
0
value 0.00754
scoring_system epss
scoring_elements 0.73171
published_at 2026-04-01T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73181
published_at 2026-04-02T12:55:00Z
2
value 0.00754
scoring_system epss
scoring_elements 0.73202
published_at 2026-04-04T12:55:00Z
3
value 0.00754
scoring_system epss
scoring_elements 0.73176
published_at 2026-04-07T12:55:00Z
4
value 0.00754
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-08T12:55:00Z
5
value 0.00754
scoring_system epss
scoring_elements 0.73226
published_at 2026-04-09T12:55:00Z
6
value 0.00754
scoring_system epss
scoring_elements 0.73251
published_at 2026-04-11T12:55:00Z
7
value 0.00754
scoring_system epss
scoring_elements 0.73232
published_at 2026-04-12T12:55:00Z
8
value 0.00754
scoring_system epss
scoring_elements 0.73225
published_at 2026-04-13T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1392
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-1392
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tawd-pjmt-ukag
29
url VCID-txkg-jsdf-93e6
vulnerability_id VCID-txkg-jsdf-93e6
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1807
reference_id
reference_type
scores
0
value 0.05336
scoring_system epss
scoring_elements 0.90071
published_at 2026-04-16T12:55:00Z
1
value 0.05336
scoring_system epss
scoring_elements 0.90013
published_at 2026-04-01T12:55:00Z
2
value 0.05336
scoring_system epss
scoring_elements 0.90016
published_at 2026-04-02T12:55:00Z
3
value 0.05336
scoring_system epss
scoring_elements 0.90027
published_at 2026-04-04T12:55:00Z
4
value 0.05336
scoring_system epss
scoring_elements 0.90032
published_at 2026-04-07T12:55:00Z
5
value 0.05336
scoring_system epss
scoring_elements 0.90048
published_at 2026-04-08T12:55:00Z
6
value 0.05336
scoring_system epss
scoring_elements 0.90053
published_at 2026-04-09T12:55:00Z
7
value 0.05336
scoring_system epss
scoring_elements 0.90062
published_at 2026-04-11T12:55:00Z
8
value 0.05336
scoring_system epss
scoring_elements 0.9006
published_at 2026-04-12T12:55:00Z
9
value 0.05336
scoring_system epss
scoring_elements 0.90055
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
27
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
28
reference_url http://securitytracker.com/id?1020239
reference_id
reference_type
scores
url http://securitytracker.com/id?1020239
29
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
30
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
33
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
34
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
39
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
41
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
43
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
44
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
45
reference_url http://www.securityfocus.com/bid/29641
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29641
46
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
47
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
48
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
49
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
50
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
51
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
52
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
53
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
54
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
55
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
56
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
57
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
58
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450773
reference_id 450773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450773
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1807
reference_id CVE-2008-1807
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1807
66
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
67
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
68
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
69
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
70
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
aliases CVE-2008-1807
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6
30
url VCID-uw16-r5d8-nfbu
vulnerability_id VCID-uw16-r5d8-nfbu
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2098
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27634
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27674
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27711
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27501
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.2757
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27612
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27617
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27573
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27516
published_at 2026-04-13T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27523
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2098
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-2098
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uw16-r5d8-nfbu
31
url VCID-wknw-5jfy-c3dh
vulnerability_id VCID-wknw-5jfy-c3dh
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1137
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71709
published_at 2026-04-01T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71734
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71708
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71759
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71783
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71766
published_at 2026-04-12T12:55:00Z
8
value 0.00689
scoring_system epss
scoring_elements 0.71749
published_at 2026-04-13T12:55:00Z
9
value 0.00689
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1137
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2010-1137
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wknw-5jfy-c3dh
32
url VCID-x226-fmea-gqhh
vulnerability_id VCID-x226-fmea-gqhh
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3732
reference_id
reference_type
scores
0
value 0.30069
scoring_system epss
scoring_elements 0.96628
published_at 2026-04-01T12:55:00Z
1
value 0.30069
scoring_system epss
scoring_elements 0.96637
published_at 2026-04-02T12:55:00Z
2
value 0.30069
scoring_system epss
scoring_elements 0.96643
published_at 2026-04-04T12:55:00Z
3
value 0.30069
scoring_system epss
scoring_elements 0.96647
published_at 2026-04-07T12:55:00Z
4
value 0.30069
scoring_system epss
scoring_elements 0.96655
published_at 2026-04-08T12:55:00Z
5
value 0.30069
scoring_system epss
scoring_elements 0.96656
published_at 2026-04-09T12:55:00Z
6
value 0.30069
scoring_system epss
scoring_elements 0.96658
published_at 2026-04-11T12:55:00Z
7
value 0.30069
scoring_system epss
scoring_elements 0.96659
published_at 2026-04-12T12:55:00Z
8
value 0.30069
scoring_system epss
scoring_elements 0.96662
published_at 2026-04-13T12:55:00Z
9
value 0.30069
scoring_system epss
scoring_elements 0.96669
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3732
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/12188.txt
reference_id CVE-2009-3732;OSVDB-63605
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/12188.txt
2
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2009-3732
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x226-fmea-gqhh
33
url VCID-xscf-xy4a-huce
vulnerability_id VCID-xscf-xy4a-huce
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2101
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-16T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.1922
published_at 2026-04-01T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19355
published_at 2026-04-02T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19406
published_at 2026-04-04T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19123
published_at 2026-04-07T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19202
published_at 2026-04-08T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19255
published_at 2026-04-09T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19261
published_at 2026-04-11T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19214
published_at 2026-04-12T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.1916
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2101
2
reference_url http://secunia.com/advisories/31713
reference_id
reference_type
scores
url http://secunia.com/advisories/31713
3
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
4
reference_url http://securityreason.com/securityalert/4202
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4202
5
reference_url http://securitytracker.com/id?1020794
reference_id
reference_type
scores
url http://securitytracker.com/id?1020794
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44797
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44797
7
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/30937
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30937
9
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
10
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2101
reference_id CVE-2008-2101
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-2101
16
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-2101
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xscf-xy4a-huce
34
url VCID-xwej-smtp-sfef
vulnerability_id VCID-xwej-smtp-sfef
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5671
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.3029
published_at 2026-04-16T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30387
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30417
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30462
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30271
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.3033
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30364
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30367
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30323
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30275
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5671
2
reference_url http://secunia.com/advisories/30556
reference_id
reference_type
scores
url http://secunia.com/advisories/30556
3
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
4
reference_url http://securityreason.com/securityalert/3922
reference_id
reference_type
scores
url http://securityreason.com/securityalert/3922
5
reference_url http://securitytracker.com/id?1020197
reference_id
reference_type
scores
url http://securitytracker.com/id?1020197
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688
8
reference_url http://www.securityfocus.com/archive/1/493080/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493080/100/0/threaded
9
reference_url http://www.securityfocus.com/archive/1/493148/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493148/100/0/threaded
10
reference_url http://www.securityfocus.com/archive/1/493172/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/493172/100/0/threaded
11
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0009.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0009.html
12
reference_url http://www.vupen.com/english/advisories/2008/1744
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1744
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-5671
reference_id CVE-2007-5671
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-5671
41
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2007-5671
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwej-smtp-sfef
35
url VCID-y97g-phmz-rubu
vulnerability_id VCID-y97g-phmz-rubu
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3868
reference_id
reference_type
scores
0
value 0.1931
scoring_system epss
scoring_elements 0.95334
published_at 2026-04-01T12:55:00Z
1
value 0.1931
scoring_system epss
scoring_elements 0.95343
published_at 2026-04-02T12:55:00Z
2
value 0.1931
scoring_system epss
scoring_elements 0.95349
published_at 2026-04-04T12:55:00Z
3
value 0.1931
scoring_system epss
scoring_elements 0.95354
published_at 2026-04-07T12:55:00Z
4
value 0.22333
scoring_system epss
scoring_elements 0.95808
published_at 2026-04-08T12:55:00Z
5
value 0.22333
scoring_system epss
scoring_elements 0.95811
published_at 2026-04-09T12:55:00Z
6
value 0.22333
scoring_system epss
scoring_elements 0.95815
published_at 2026-04-12T12:55:00Z
7
value 0.22333
scoring_system epss
scoring_elements 0.95817
published_at 2026-04-13T12:55:00Z
8
value 0.22333
scoring_system epss
scoring_elements 0.95828
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3868
1
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2011-3868
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y97g-phmz-rubu
36
url VCID-z8f9-7v4h-5kfw
vulnerability_id VCID-z8f9-7v4h-5kfw
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2008/000042.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2008/000042.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4915
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22167
published_at 2026-04-16T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22125
published_at 2026-04-01T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22283
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22194
published_at 2026-04-08T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22248
published_at 2026-04-09T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22268
published_at 2026-04-11T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22226
published_at 2026-04-12T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22166
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4915
2
reference_url http://secunia.com/advisories/32612
reference_id
reference_type
scores
url http://secunia.com/advisories/32612
3
reference_url http://secunia.com/advisories/32624
reference_id
reference_type
scores
url http://secunia.com/advisories/32624
4
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46415
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46415
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6309
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6309
7
reference_url http://www.securityfocus.com/archive/1/498138/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498138/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/32168
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32168
9
reference_url http://www.securitytracker.com/id?1021154
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021154
10
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0018.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0018.html
11
reference_url http://www.vupen.com/english/advisories/2008/3052
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/3052
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4915
reference_id CVE-2008-4915
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4915
19
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
fixed_packages
aliases CVE-2008-4915
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8f9-7v4h-5kfw
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-server@6.5.5.328052