Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors."}, {"lang": "es", "value": "Host Guest File System (HGFS) en VMware Workstation 10.x anterior a 10.0.5, VMware Player 6.x anterior a 6.0.5, y VMware Fusion 6.x anterior a 6.0.5 y 7.x anterior a 7.0.1 permite a usuarios del sistema operativo invitado causar una denegaci\u00f3n de servicio del sistema operativo invitado a trav\u00e9s de vectores no especificados."}], "id": "CVE-2015-1043", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2015-01-29T18:59:02.657", "references": [{"source": "cve@mitre.org", "url": "http://secunia.com/advisories/62551"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/72337"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1031644"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62551"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/72337"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1031644"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}