{"uuid": "e9d922d2-4103-48d1-9166-7bb64440f1e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-3947", "type": "seen", "source": "https://t.me/information_security_channel/35900", "content": "Critical Flaw in VMware Workstation, Fusion Allows Code Execution on Host From Guest\nhttp://feedproxy.google.com/~r/Securityweek/~3/g_Xx_52_ONk/critical-flaw-vmware-workstation-fusion-allows-code-execution-host-guest\n\nVMware has patched three serious vulnerabilities in its products, including a critical flaw in Workstation and Fusion that can be exploited to execute arbitrary code on the host from the guest operating system.\nThe critical flaw, tracked as CVE-2020-3947, is caused by a use-after-free bug in the vmnetdhcp component.\nread more (https://www.securityweek.com/critical-flaw-vmware-workstation-fusion-allows-code-execution-host-guest)", "creation_timestamp": "2020-03-13T16:59:14.000000Z"}