{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2012-0075.txt"
    },
    "title": "VMware Workstation, Player, Fusion, ESXi and ESX patches address security issues",
    "serial_number": "2012-0075",
    "publish_date": "22-06-2012 12:55:00",
    "description": "VMware products allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file.",
    "url_title": "2012-0075",
    "content_markdown": null,
    "content_html": null,
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}