VMware Inc - (Freeware)
Sharing data between host computer and virtual machine is very much possible with VMware Player which makes all very easy.
VMware Player is a software program that allows having multiple operating systems on one computer using more virtual machines. It helps to easy operate any virtual machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESX, as well as Microsoft Virtual Server virtual machines or Microsoft Virtual PC virtual machines.
With this tool it is possible to create virtual machines and install an operating system without leaving the main system.This program can be very interesting to go from one OS to another to test the compatibility of professional software or for beta testers who can work easily on a given and contained in a virtual machine configuration.
# Resolved Issues
* General Issues
- Linux guests running the Linux kernel version 2.6.34 or later could not be pinged from the host via an IPv6 address.
- On rare occasions, Linux guests would suddenly fail to Autofit or enter Unity.
- Unity mode would exit if the title bar of an application contained certain non UTF-8 encoded extended ASCII characters.
- On Windows hosts, the VMware Player user interface sometimes became unresponsive when minimized from full-screen mode if the suggestion balloon was being displayed.
- On Windows hosts, the user interface sometimes became unresponsive if the application was rendered on an extended display that was abruptly disconnected.
* Security Issues
- VMware host Checkpoint file memory corruption
> Input data was not properly validated when loading Checkpoint files. This issue could have allowed an attacker with the ability to load a specially crafted Checkpoint file to execute arbitrary code on the host.
- VMware virtual machine remote device denial of service
> A device (such as CD-ROM or keyboard) that is available to a virtual machine while physically connected to a system that does not run the virtual machine is referred to as a remote device. Traffic coming from remote virtual devices was incorrectly handled. This issue could have allowed an attacker who was capable of manipulating the traffic from a remote virtual device to crash the virtual machine.