A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of multiple VMWare products. User interaction is required in that a user must visit a malicious web page or open a malicious video file.
5da5e1c6b9fa68402f609d44cbaeed06b7475924eea31e4c0ece915536bb26c7