Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-5973

VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.8%
CVSS Severity
CVSS v2 Score 4.4
Products affected by CVE-2013-5973
  • Vmware » Esx » Version: 4.0
    cpe:2.3:o:vmware:esx:4.0
  • Vmware » Esx » Version: 4.1
    cpe:2.3:o:vmware:esx:4.1
  • Vmware » Esxi » Version: 4.0
    cpe:2.3:o:vmware:esxi:4.0
  • Vmware » Esxi » Version: 4.1
    cpe:2.3:o:vmware:esxi:4.1
  • Vmware » Esxi » Version: 5.0
    cpe:2.3:o:vmware:esxi:5.0
  • Vmware » Esxi » Version: 5.1
    cpe:2.3:o:vmware:esxi:5.1
  • Vmware » Esxi » Version: 5.5
    cpe:2.3:o:vmware:esxi:5.5


Contact Us

Shodan ® - All rights reserved