| CVE ID | CVSS3.1 | Exploitable | Vendor | Product | Vulnerability | Date added |
|---|---|---|---|---|---|---|
| CVE-2025-22224 | 9.3 | True | VMware | ESXi and Workstation | VMware ESXi and Workstation TOCTOU Race Condition Vulnerability | 2025-03-04 00:00:00 |
| CVE-2025-22225 | 8.2 | True | VMware | ESXi | VMware ESXi Arbitrary Write Vulnerability | 2025-03-04 00:00:00 |
| CVE-2025-22226 | 7.1 | True | VMware | ESXi, Workstation, and Fusion | VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability | 2025-03-04 00:00:00 |
| CVE-2024-38812 | 9.8 | True | VMware | vCenter Server | VMware vCenter Server Heap-Based Buffer Overflow Vulnerability | 2024-11-20 00:00:00 |
| CVE-2024-38813 | 7.5 | True | VMware | vCenter Server | VMware vCenter Server Privilege Escalation Vulnerability | 2024-11-20 00:00:00 |
| CVE-2024-37085 | 6.8 | True | VMware | ESXi | VMware ESXi Authentication Bypass Vulnerability | 2024-07-30 00:00:00 |
| CVE-2022-22948 | 6.5 | True | VMware | vCenter Server | VMware vCenter Server Incorrect Default File Permissions Vulnerability | 2024-07-17 00:00:00 |
| CVE-2023-34048 | 9.8 | True | VMware | vCenter Server | VMware vCenter Server Out-of-Bounds Write Vulnerability | 2024-01-22 00:00:00 |
| CVE-2023-20867 | 3.9 | True | VMware | Tools | VMware Tools Authentication Bypass Vulnerability | 2023-06-23 00:00:00 |
| CVE-2023-20887 | 9.8 | True | VMware | Aria Operations for Networks | Vmware Aria Operations for Networks Command Injection Vulnerability | 2023-06-22 00:00:00 |
| CVE-2022-22947 | 10.0 | True | VMware | Spring Cloud Gateway | VMware Spring Cloud Gateway Code Injection Vulnerability | 2022-05-16 00:00:00 |
| CVE-2022-22960 | 7.8 | True | VMware | Multiple Products | VMware Multiple Products Privilege Escalation Vulnerability | 2022-04-15 00:00:00 |
| CVE-2022-22954 | 9.8 | True | VMware | Workspace ONE Access and Identity Manager | VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability | 2022-04-14 00:00:00 |
| CVE-2022-22965 | 9.8 | True | VMware | Spring Framework | Spring Framework JDK 9+ Remote Code Execution Vulnerability | 2022-04-04 00:00:00 |
| CVE-2018-6961 | 8.1 | True | VMware | SD-WAN Edge | VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability | 2022-03-25 00:00:00 |
| CVE-2021-21973 | 5.3 | True | VMware | vCenter Server and Cloud Foundation | VMware vCenter Server and Cloud Foundation Server Side Request Forgery (SSRF) Vulnerability | 2022-03-07 00:00:00 |
| CVE-2021-21975 | 7.5 | True | VMware | vRealize Operations Manager API | VMware Server Side Request Forgery in vRealize Operations Manager API | 2022-01-18 00:00:00 |
| CVE-2021-22017 | 5.3 | True | VMware | vCenter Server | VMware vCenter Server Improper Access Control | 2022-01-10 00:00:00 |
| CVE-2020-4006 | 9.1 | True | VMware | Multiple Products | Multiple VMware Products Command Injection Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-21985 | 9.8 | True | VMware | vCenter Server | VMware vCenter Server Improper Input Validation Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-21972 | 9.8 | True | VMware | vCenter Server | VMware vCenter Server Remote Code Execution Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-3952 | 9.8 | True | VMware | vCenter Server | VMware vCenter Server Information Disclosure Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-22005 | 9.8 | True | VMware | vCenter Server | VMware vCenter Server File Upload Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-3950 | 7.8 | True | VMware | Multiple Products | VMware Multiple Products Privilege Escalation Vulnerability | 2021-11-03 00:00:00 |
| CVE-2020-3992 | 9.8 | True | VMware | ESXi | VMware ESXi OpenSLP Use-After-Free Vulnerability | 2021-11-03 00:00:00 |
| CVE-2019-5544 | 9.8 | True | VMware | VMware ESXi and Horizon DaaS | VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability | 2021-11-03 00:00:00 |
AVET INS is an owner of VULNDBASE brand and website. This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD page for more information. CVE is a registered trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE site. CWE is a registered trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE page. KEV (Known Exploited Vulnerabilities) is a catalog maintained by CISA. EUVD is the official EU repository for timely, curated cybersecurity vulnerability intelligence and remediation guidance run by ENISA. DORA (Digital Operational Resilience Act) is and EU directive.
Copyright AVET INS 1997 - 2026