First published: Thu Dec 29 2005(Updated: )
Unspecified vulnerability in the Management Interface in VMware ESX Server 2.x up to 2.5.x before 24 December 2005 allows "remote code execution in the Web browser" via unspecified attack vectors, probably related to cross-site scripting (XSS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =2.0 | |
VMware ESX | =2.0.1 | |
VMware ESX | =2.1.2 | |
VMware ESX | =2.5 | |
VMware ESX | =2.5.2 | |
VMware ESX | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4583 is classified as a high severity vulnerability due to the potential for remote code execution in VMware ESX Server.
To address CVE-2005-4583, it is recommended to upgrade VMware ESX Server to version 2.5.x or later, as these versions contain security patches.
CVE-2005-4583 is associated with unspecified remote code execution attacks likely related to cross-site scripting (XSS) vulnerabilities.
CVE-2005-4583 affects VMware ESX Server versions 2.0, 2.0.1, 2.1.1, 2.1.2, 2.5, and 2.5.2.
Yes, CVE-2005-4583 can potentially be exploited remotely without authentication, increasing its risk to users.