Quoting from FrSIRT
Advisory ID : FrSIRT/ADV-2006-3075
CVE ID : CVE-2005-3618 - CVE-2005-3620 - CVE-2006-2481
Rated as : Low Risk 
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 2006-08-01
Technical Description
Multiple vulnerabilities have been identified in VMware ESX Server, which may be exploited by attackers to disclose sensitive information or manipulate arbitrary data.
The first issue is due to a design error where certain passwords changed via the management interface are stored in clear text in a world-readable file, which could be exploited by attackers to gain knowledge of sensitive information.
The second vulnerability is due to a design error in the session ID management where credentials are encoded in a base64 format, which could be exploited by attackers to gain knowledge of sensitive information.
The third flaw is due to an error when handling certain HTTP requests, which could be exploited by attackers to change a user's password when visiting a malicious web site while logged in.
Affected Products
VMware ESX Server versions 2.x
Solution
Upgrade to VMware ESX Server version 2.5.3 Upgrade Patch 2, verison 2.1.3 Upgrade Patch 1, or version 2.0.2 Upgrade Patch 1 :
http://www.vmware.com/support/
References
http://www.frsirt.com/english/advisories/2006/3075
http://www.corsaire.com/advisories/c051114-001.txt
http://www.corsaire.com/advisories/c051114-003.txt
http://www.corsaire.com/advisories/c060512-001.txt
Credits
Vulnerabilities reported by Stephen de Vries and Martin O'Neal
ChangeLog
2006-08-01 : Initial release