{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T07:36:57.929","vulnerabilities":[{"cve":{"id":"CVE-2009-3732","sourceIdentifier":"cve@mitre.org","published":"2010-04-12T18:30:00.460","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in vmware-vmrc.exe build 158248 in VMware Remote Console (aka VMrc) allows remote attackers to execute arbitrary code via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de formato de cadena en vmware-vmrc.exe build 158248 en VMware Remote Console (también conocido como VMrc) permite a atacantes remotos jcutar codigo arbitrario a través de vectores inespecíficos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5.0","versionEndExcluding":"2.5.4","matchCriteriaId":"2579A3BF-B7C0-4052-8D6A-31E872ECD2B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*","matchCriteriaId":"E87681DB-CBD8-46A6-BD9A-FB621B627B0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","versionStartIncluding":"2.5.0","versionEndExcluding":"2.5.4","matchCriteriaId":"B66157E4-285D-4975-BED8-9A52326F2100"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*","matchCriteriaId":"5F747AC1-E163-41A4-BAC7-FDF46F4057D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndIncluding":"2.0.2","matchCriteriaId":"1F9554F5-950A-422F-BC26-80C1BCCDD792"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.0","versionEndExcluding":"6.5.4","matchCriteriaId":"662DDDC1-E5A9-4D11-BC2E-66E05FBEB5AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*","matchCriteriaId":"AB33DBC9-3B63-457E-A353-B9E7378211AE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://lists.vmware.com/pipermail/security-announce/2010/000090.html","source":"cve@mitre.org","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/39110","source":"cve@mitre.org","tags":["Not Applicable"]},{"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.vmware.com/security/advisories/VMSA-2010-0007.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://lists.vmware.com/pipermail/security-announce/2010/000090.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/39110","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.vmware.com/security/advisories/VMSA-2010-0007.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}