CVE-2011-2145 (GCVE-0-2011-2145)
Vulnerability from cvelistv5 – Published: 2011-06-06 19:00 – Updated: 2024-08-06 22:53
VLAI?
Summary
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:53:17.007Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "44904",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44904"
},
{
"name": "48098",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48098"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html"
},
{
"name": "vmware-mountvmhgfs-privilege-esc(67815)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815"
},
{
"name": "44840",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44840"
},
{
"name": "1025601",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025601"
},
{
"name": "openSUSE-SU-2011:0617",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "https://hermes.opensuse.org/messages/8711677"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \"procedural error.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "44904",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44904"
},
{
"name": "48098",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48098"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html"
},
{
"name": "vmware-mountvmhgfs-privilege-esc(67815)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815"
},
{
"name": "44840",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44840"
},
{
"name": "1025601",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025601"
},
{
"name": "openSUSE-SU-2011:0617",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "https://hermes.opensuse.org/messages/8711677"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \"procedural error.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "44904",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44904"
},
{
"name": "48098",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48098"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html"
},
{
"name": "vmware-mountvmhgfs-privilege-esc(67815)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815"
},
{
"name": "44840",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44840"
},
{
"name": "1025601",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025601"
},
{
"name": "openSUSE-SU-2011:0617",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/8711677"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2145",
"datePublished": "2011-06-06T19:00:00",
"dateReserved": "2011-05-17T00:00:00",
"dateUpdated": "2024-08-06T22:53:17.007Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B6F7416-E694-4EC9-9FE5-0C24448ECB34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE5ECA1B-7415-4390-8018-670F2C3CDF35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"889DE9BE-886F-4BEF-A794-5B5DE73D2322\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD59C463-F352-4F6C-853F-415E3FB4ABDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BDAA7C8-8F2F-4037-A517-2C1EDB70B203\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73C9E205-87EE-4CE2-A252-DED7BB6D4EAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"051D820C-E5F4-4DA2-8914-5A33FCFF2D1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69FFA61C-2258-4006-AECA-D324F5700990\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50D2840A-5AF2-4AC4-9243-07CE93E9E9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C158CD97-41BA-4422-9A55-B1A8650A0900\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"477D5F22-7DDD-461D-9CD1-2B2A968F6CB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C174C452-7249-4B26-9F26-DFE9B3476874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAA72ED8-3229-4220-BE75-712CA6E21062\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13A31E93-7671-492E-A78F-89CF4703B04D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99ADA116-A571-4788-8DF2-09E8A2AF92F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2818FD22-8BC5-4803-8D62-D7C7C22556F9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9EC02F3-3905-460D-8949-3B26394215CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05924C67-F9A0-450E-A5B8-059651DD32E3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \\\"procedural error.\\\"\"}, {\"lang\": \"es\", \"value\": \"mount.vmhgfs en el Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, cuando es utilizado un Sistema Operativo invitado de Solaris o FreeBSD, permite a los usuarios del sistema operativo invitado modificar archivos del sistema operativo invitado arbitrarios por medio de vectores no especificados, relacionados con un \\\"procedural error\\\".\"}]",
"id": "CVE-2011-2145",
"lastModified": "2024-11-21T01:27:41.140",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:N/I:C/A:C\", \"baseScore\": 6.3, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.4, \"impactScore\": 9.2, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-06-06T19:55:02.833",
"references": "[{\"url\": \"http://secunia.com/advisories/44840\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/44904\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/48098\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1025601\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/67815\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://hermes.opensuse.org/messages/8711677\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/44840\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/44904\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/48098\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025601\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/67815\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://hermes.opensuse.org/messages/8711677\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2145\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-06-06T19:55:02.833\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \\\"procedural error.\\\"\"},{\"lang\":\"es\",\"value\":\"mount.vmhgfs en el Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, cuando es utilizado un Sistema Operativo invitado de Solaris o FreeBSD, permite a los usuarios del sistema operativo invitado modificar archivos del sistema operativo invitado arbitrarios por medio de vectores no especificados, relacionados con un \\\"procedural error\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:C/A:C\",\"baseScore\":6.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":9.2,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6F7416-E694-4EC9-9FE5-0C24448ECB34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5ECA1B-7415-4390-8018-670F2C3CDF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"889DE9BE-886F-4BEF-A794-5B5DE73D2322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD59C463-F352-4F6C-853F-415E3FB4ABDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BDAA7C8-8F2F-4037-A517-2C1EDB70B203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73C9E205-87EE-4CE2-A252-DED7BB6D4EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"051D820C-E5F4-4DA2-8914-5A33FCFF2D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69FFA61C-2258-4006-AECA-D324F5700990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D2840A-5AF2-4AC4-9243-07CE93E9E9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C158CD97-41BA-4422-9A55-B1A8650A0900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477D5F22-7DDD-461D-9CD1-2B2A968F6CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C174C452-7249-4B26-9F26-DFE9B3476874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA72ED8-3229-4220-BE75-712CA6E21062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A31E93-7671-492E-A78F-89CF4703B04D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99ADA116-A571-4788-8DF2-09E8A2AF92F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2818FD22-8BC5-4803-8D62-D7C7C22556F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9EC02F3-3905-460D-8949-3B26394215CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05924C67-F9A0-450E-A5B8-059651DD32E3\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/44840\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/44904\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/48098\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1025601\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67815\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://hermes.opensuse.org/messages/8711677\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/44840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/44904\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/48098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025601\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://hermes.opensuse.org/messages/8711677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…