Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

1,542

Total CVEs

1,542

CISA KEV

35

Known Exploits

9.3

Avg CVSS Score

Severity Distribution

HIGH 1542

Showing 14 of 34 CVEs matching "VMware" · CISA KEV

CVE-2018-1273KEV
High

Spring Data Commons contains a property binder vulnerability which can allow an attacker to perform remote code execution.

VMware TanzuEPSS 94.3%
CVE-2020-5410KEV
High

Spring, by VMware Tanzu, Cloud Config contains a path traversal vulnerability that allows applications to serve arbitrary configuration files.

VMware TanzuEPSS 94.3%
CVE-2018-6961KEV
High

VMware SD-WAN Edge by VeloCloud contains a command injection vulnerability in the local web UI component. Successful exploitation of this issue could result in remote code execution.

VMwareEPSS 93.6%
CVE-2021-21973KEV
High

VMware vCenter Server and Cloud Foundation Server contain a SSRF vulnerability due to improper validation of URLs in a vCenter Server plugin. This allows for information disclosure.

VMwareEPSS 90.3%
CVE-2021-21975KEV
High

Server Side Request Forgery (SSRF) in vRealize Operations Manager API prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API to perform a SSRF attack to steal administrative credentials.

VMwareEPSS 94.4%
CVE-2021-22017KEV
High

Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization.

VMwareEPSS 79.5%
CVE-2020-3992KEV
High

VMware ESXi OpenSLP contains a use-after-free vulnerability that allows an attacker residing in the management network with access to port 427 to perform remote code execution.

VMwareEPSS 82.7%
CVE-2019-5544KEV
High

VMware ESXi and Horizon Desktop as a Service (DaaS) OpenSLP contains a heap-based buffer overflow vulnerability that allows an attacker with network access to port 427 to overwrite the heap of the OpenSLP service to perform remote code execution.

VMwareEPSS 92.7%
CVE-2021-21985KEV
High

VMware vSphere Client contains an improper input validation vulnerability in the Virtual SAN Health Check plug-in, which is enabled by default in vCenter Server, which allows for remote code execution.

VMwareEPSS 94.4%
CVE-2020-4006KEV
High

VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector contain a command injection vulnerability. An attacker with network access to the administrative configurator on port 8443 and a valid password for the configurator administrator account can execute commands with unrestricted privileges on the underlying operating system.

VMwareEPSS 12.8%
CVE-2020-3950KEV
High

VMware Fusion, Remote Console (VMRC) for Mac, and Horizon Client for Mac contain a privilege escalation vulnerability due to improper use of setuid binaries that allows attackers to escalate privileges to root.

VMwareEPSS 17.9%
CVE-2021-22005KEV
High

VMware vCenter Server contains a file upload vulnerability in the Analytics service that allows a user with network access to port 443 to execute code.

VMwareCVSS 9.8EPSS 94.5%
Exploit
CVE-2020-3952KEV
High

VMware vCenter Server contains an information disclosure vulnerability in the VMware Directory Service (vmdir) when the Platform Services Controller (PSC) does not correctly implement access controls. Successful exploitation allows an attacker with network access to port 389 to extract sensitive information.

VMwareEPSS 94.4%
CVE-2021-21972KEV
High

VMware vCenter Server vSphere Client contains a remote code execution vulnerability in a vCenter Server plugin which allows an attacker with network access to port 443 to execute commands with unrestricted privileges on the underlying operating system.

VMwareEPSS 93.8%