Currently exploited vulnerabilities

CVE ID CVSS3.1 Exploitable Vendor Product Vulnerability Date added
CVE-2025-22224 9.3 True VMware ESXi and Workstation VMware ESXi and Workstation TOCTOU Race Condition Vulnerability 2025-03-04 00:00:00
CVE-2025-22225 8.2 True VMware ESXi VMware ESXi Arbitrary Write Vulnerability 2025-03-04 00:00:00
CVE-2025-22226 7.1 True VMware ESXi, Workstation, and Fusion VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability 2025-03-04 00:00:00
CVE-2024-38812 9.8 True VMware vCenter Server VMware vCenter Server Heap-Based Buffer Overflow Vulnerability 2024-11-20 00:00:00
CVE-2024-38813 7.5 True VMware vCenter Server VMware vCenter Server Privilege Escalation Vulnerability 2024-11-20 00:00:00
CVE-2024-37085 6.8 True VMware ESXi VMware ESXi Authentication Bypass Vulnerability 2024-07-30 00:00:00
CVE-2022-22948 6.5 True VMware vCenter Server VMware vCenter Server Incorrect Default File Permissions Vulnerability 2024-07-17 00:00:00
CVE-2023-34048 9.8 True VMware vCenter Server VMware vCenter Server Out-of-Bounds Write Vulnerability 2024-01-22 00:00:00
CVE-2023-20867 3.9 True VMware Tools VMware Tools Authentication Bypass Vulnerability 2023-06-23 00:00:00
CVE-2023-20887 9.8 True VMware Aria Operations for Networks Vmware Aria Operations for Networks Command Injection Vulnerability 2023-06-22 00:00:00
CVE-2022-22947 10.0 True VMware Spring Cloud Gateway VMware Spring Cloud Gateway Code Injection Vulnerability 2022-05-16 00:00:00
CVE-2022-22960 7.8 True VMware Multiple Products VMware Multiple Products Privilege Escalation Vulnerability 2022-04-15 00:00:00
CVE-2022-22954 9.8 True VMware Workspace ONE Access and Identity Manager VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability 2022-04-14 00:00:00
CVE-2022-22965 9.8 True VMware Spring Framework Spring Framework JDK 9+ Remote Code Execution Vulnerability 2022-04-04 00:00:00
CVE-2018-6961 8.1 True VMware SD-WAN Edge VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability 2022-03-25 00:00:00
CVE-2021-21973 5.3 True VMware vCenter Server and Cloud Foundation VMware vCenter Server and Cloud Foundation Server Side Request Forgery (SSRF) Vulnerability 2022-03-07 00:00:00
CVE-2021-21975 7.5 True VMware vRealize Operations Manager API VMware Server Side Request Forgery in vRealize Operations Manager API 2022-01-18 00:00:00
CVE-2021-22017 5.3 True VMware vCenter Server VMware vCenter Server Improper Access Control 2022-01-10 00:00:00
CVE-2020-4006 9.1 True VMware Multiple Products Multiple VMware Products Command Injection Vulnerability 2021-11-03 00:00:00
CVE-2021-21985 9.8 True VMware vCenter Server VMware vCenter Server Improper Input Validation Vulnerability 2021-11-03 00:00:00
CVE-2021-21972 9.8 True VMware vCenter Server VMware vCenter Server Remote Code Execution Vulnerability 2021-11-03 00:00:00
CVE-2020-3952 9.8 True VMware vCenter Server VMware vCenter Server Information Disclosure Vulnerability 2021-11-03 00:00:00
CVE-2021-22005 9.8 True VMware vCenter Server VMware vCenter Server File Upload Vulnerability 2021-11-03 00:00:00
CVE-2020-3950 7.8 True VMware Multiple Products VMware Multiple Products Privilege Escalation Vulnerability 2021-11-03 00:00:00
CVE-2020-3992 9.8 True VMware ESXi VMware ESXi OpenSLP Use-After-Free Vulnerability 2021-11-03 00:00:00
CVE-2019-5544 9.8 True VMware VMware ESXi and Horizon DaaS VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability 2021-11-03 00:00:00

AVET INS is an owner of VULNDBASE brand and website. This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD page for more information. CVE is a registered trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE site. CWE is a registered trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE page. KEV (Known Exploited Vulnerabilities) is a catalog maintained by CISA. EUVD is the official EU repository for timely, curated cybersecurity vulnerability intelligence and remediation guidance run by ENISA. DORA (Digital Operational Resilience Act) is and EU directive.

Copyright AVET INS 1997 - 2026