Download VMware Fusion 10.1.0 Build 7370838 for Mac from FileHorse. 100% Safe and Secure The easiest, fastest and most reliable way to run Windows apps on a Mac. VMware Fusion 10.1.0 – Run Windows apps alongside Mac apps without rebooting. VMware Fusion 10 and Fusion 10 Pro–the latest versions of its virtualization.
5.5NoneRemoteLowSingle systemPartialNonePartialVMware ESXi (6.7 before ESXi601-SG and 6.5 before ESXi601), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.2Exec Code Overflow2019-05-24. 7.2NoneLocalLowNot requiredCompleteCompleteCompleteVMware ESXi (6.7 before ESXi601, 6.5 before ESXi601, 6.0 before ESXi601), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present.
This issue may allow a guest to execute code on the host.3DoS Exec Code2019-05-29. 6.0NoneRemoteMediumSingle systemPartialPartialPartialVMware ESXi (6.0 before ESXi601-SG, 5.5 ESXi501-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets.
Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's.vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.9Exec Code Overflow2018-01-11.
6.0NoneRemoteMediumSingle systemPartialPartialPartialVMware ESXi (6.5 before ESXi601-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session.
Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's.vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
Use of this information constitutes acceptance for use in an AS IS condition.There are NO warranties, implied or otherwise, with regard to this information or its use.Any use of this information is at the user's risk.It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,INDIRECT or any other kind of loss.