Danish vulnerability assessment clearinghouse, Secunia, has released advisory SA23680 which states that there are multiple vulnerabilities found within VMware ESX Server that affects both VMware ESX Server 2.x and 3.x. Marked as highly critical, Secunia states that vulnerabilities have been reported in VMware ESX Server which can be exploited by malicious people to gain knowledge of sensitive information, bypass Danish vulnerability assessment clearinghouse, Secunia, has released advisory SA23680 which states that there are multiple vulnerabilities found within VMware ESX Server that affects both VMware ESX Server 2.x and 3.x. Marked as highly critical, Secunia states that vulnerabilities have been reported in VMware ESX Server which can be exploited by malicious people to gain knowledge of sensitive information, bypass certain security restrictions, cause a DoS (denial of service), gain escalated privileges, or compromise a system. The solution is to provide the following patches: ESX 3.0.1 – Apply patch ESX 3.0.1 Patch ESX-9986131. ESX 3.0.0 – Apply patch ESX 3.0.0 Patch ESX-3069097. ESX 2.5.4 – Apply ESX 2.5.4 Upgrade Patch 3 (Build# 36502) ESX 2.5.3 – Apply ESX 2.5.3 Upgrade Patch 6 (Build# 35703) ESX 2.1.3 – Apply ESX 2.1.3 Upgrade Patch 4 (Build# 35803) ESX 2.0.2 – Apply ESX 2.0.2 Upgrade Patch 4 (Build# 35801) For more information, visit the following original advisories: VI3 – ESX Patch 9986131 VI3 – ESX Patch 3069097 ESX 2.5.4 – ESX Patch 200612 ESX 2.5.3 – ESX Patch 200612 ESX 2.1.3 – ESX Patch 200612 ESX 2.0.2 – ESX Patch 200612 Software Development