{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T23:16:21.432","vulnerabilities":[{"cve":{"id":"CVE-2010-1139","sourceIdentifier":"cve@mitre.org","published":"2010-04-12T18:30:00.587","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata."},{"lang":"es","value":"Vulnerabilidad de formato de cadena en vmrun en VMware VIX API v1.6.x, VMware Workstation v6.5.x antes de v6.5.4 build 246459, VMware Player v2.5.x antes de v2.5.4 build 246.459, y VMware Server v2.x en Linux y VMware Fusion v2.x antes de v2.0.7 build 246.742, permite a usuarios locales conseguir privilegios a través de especificadores de formato de cadenas en los metadatos de proceso."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*","matchCriteriaId":"8E8F3BFF-676B-4E2C-98BA-DCA71E49060F"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"B3E658DA-56E8-49F0-B486-4EF622B63627"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*","matchCriteriaId":"541D77A2-99C5-4CDB-877F-7E83E1E3369E"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"A6B53C0A-5A0C-4168-8AD3-F3E957AE8919"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*","matchCriteriaId":"FE944A70-CB9C-4712-9802-509531396A02"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*","matchCriteriaId":"252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*","matchCriteriaId":"62DA49FA-6657-45B5-BF69-D3A03BA62A4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*","matchCriteriaId":"949C3917-4D7E-4B51-A872-BFBECB4D2CB2"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","matchCriteriaId":"155AD4FB-E527-4103-BCEF-801B653DEA37"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"5A2543D5-AE09-4E90-B27E-95075BE4ACBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"E6CFDD84-A482-42C2-B43F-839F4D7F1130"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"9E565F23-AEEE-41A4-80EC-01961AD5560E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","matchCriteriaId":"155AD4FB-E527-4103-BCEF-801B653DEA37"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*","matchCriteriaId":"8E18541B-36B6-40A7-9749-FA47A10379C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"55EBD95F-3DF7-49F3-A7AA-47085E0B7C88"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"A6DA47C9-3D1A-49A7-8976-AE05D6730673"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"692CC131-5C6C-4AD6-B85C-07DF21168BC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"617EFBFF-D047-4A0B-ACB6-83B27710F6F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"F1D0DF91-17E8-45D4-B625-737FE50C23CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"A6C47EB8-8844-4D49-9246-008F7AE45C60"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vix_api:1.6.0:*:*:*:*:*:*:*","matchCriteriaId":"F9FDEEE1-BC47-4EE6-A56B-C7626D554019"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:vix_api:1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"98918409-9F58-4FBC-B5C1-4015B5E3C0FE"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html","source":"cve@mitre.org"},{"url":"http://lists.vmware.com/pipermail/security-announce/2010/000090.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://osvdb.org/63606","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/39201","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/39206","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/39215","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/39407","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id?1023835","source":"cve@mitre.org"},{"url":"http://www.vmware.com/security/advisories/VMSA-2010-0007.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.vmware.com/pipermail/security-announce/2010/000090.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://osvdb.org/63606","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/39201","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/39206","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/39215","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/39407","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1023835","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vmware.com/security/advisories/VMSA-2010-0007.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}