www.vmware.com Open in urlscan Pro
2a02:26f0:3500:89b::2ef  Public Scan

URL: https://www.vmware.com/security/advisories.html
Submission: On June 12 via api from IN — Scanned from NL

Form analysis 3 forms found in the DOM

//www.vmware.com/search.html

<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
  <input type="text" name="q" id="ub-search" class="d-none" placeholder="Search" title="Search" aria-role="searchbox" role="searchbox">
  <a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">

									<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
								 </a>
  <input type="hidden" name="num" value="20">
  <input type="hidden" name="filter" value="0">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="hidden" name="oe" value="UTF-8">
  <input type="hidden" name="entqr" value="0">
  <input type="hidden" name="start" value="0">
  <input type="hidden" name="sort" value="">
  <input type="hidden" name="tlen" value="200">
  <input type="hidden" name="numgm" value="3">
  <input type="hidden" name="cn" value="vmware">
  <input type="hidden" name="cid" value="">
  <input type="hidden" name="tid" value="">
  <input type="hidden" name="getfields" value="*">
  <input type="hidden" name="partialfields" value="">
  <input type="hidden" name="requiredfields" value="">
  <input type="hidden" name="place" value="top">
  <input type="hidden" name="client" value="VMware_Site_1">
  <input type="hidden" name="site" value="VMware_Site_1">
  <input type="hidden" name="cc" value="en">
  <input type="hidden" name="stype" value="main">
</form>

//www.vmware.com/search.html

<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
  <a href="javascript:void(0);" tabindex="-1" class="search-icon ml-lg-3" name="nav_utility : Search">
      </a>
  <input type="text" name="q" id="ub-search" placeholder="Search" title="Search" role="searchbox">
  <input type="hidden" name="num" value="20">
  <input type="hidden" name="filter" value="0">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="hidden" name="oe" value="UTF-8">
  <input type="hidden" name="entqr" value="0">
  <input type="hidden" name="start" value="0">
  <input type="hidden" name="sort" value="">
  <input type="hidden" name="tlen" value="200">
  <input type="hidden" name="numgm" value="3">
  <input type="hidden" name="cn" value="vmware">
  <input type="hidden" name="cid" value="">
  <input type="hidden" name="tid" value="">
  <input type="hidden" name="getfields" value="*">
  <input type="hidden" name="partialfields" value="">
  <input type="hidden" name="requiredfields" value="">
  <input type="hidden" name="place" value="top">
  <input type="hidden" name="client" value="VMware_Site_1">
  <input type="hidden" name="site" value="VMware_Site_1">
  <input type="hidden" name="cc" value="en">
  <input type="hidden" name="stype" value="main">
</form>

Name: securitysignup

<form accept-charset="UNKNOWN" id="securitysignup" name="securitysignup" data-gtm-form-interact-id="0">
  <label class="email-input-label" for="securityEmail">*Email</label>
  <input id="securityEmail" name="email" size="25" type="text" data-gtm-form-interact-field-id="0">
  <span class="subscriptionerrorMsg sa-validation-alerts" tabindex="0"></span>
  <input name="email-button" class="sa-subscription-modal-button sa-subscription-submit-button" type="submit" onclick="s_objectID='content_advisories :  : 0';" value="Submit">
</form>

Text Content

Skip to Promo Skip to main content
Global Search

US Store
Login
Cloud Services Console Customer Connect Partner Connect
 * Multi-Cloud Services
 * Products
 * Solutions
 * Partners
 * Resources

GET STARTED
Global Search

Main Menu


TAKE CONTROL OF YOUR
MULTI-CLOUD ENVIRONMENT

73% OF ENTERPRISES USE TWO OR MORE PUBLIC CLOUDS TODAY. WHILE MULTI-CLOUD
ACCELERATES DIGITAL TRANSFORMATION, IT ALSO INTRODUCES COMPLEXITY AND RISK.


VMWARE CROSS-CLOUD™ SERVICES ENABLE ORGANIZATIONS TO UNLOCK THE POTENTIAL OF
MULTI-CLOUD WITH ENTERPRISE SECURITY AND RESILIENCY.

BUILD & OPERATE CLOUD NATIVE APPS

GIVE DEVELOPERS THE FLEXIBILITY TO USE ANY APP FRAMEWORK AND TOOLING FOR A
SECURE, CONSISTENT AND FAST PATH TO PRODUCTION ON ANY CLOUD.

CONNECT & SECURE APPS & CLOUDS

DELIVER SECURITY AND NETWORKING AS A BUILT-IN DISTRIBUTED SERVICE ACROSS USERS,
APPS, DEVICES, AND WORKLOADS IN ANY CLOUD.

RUN ENTERPRISE APPS ANYWHERE

RUN ENTERPRISE APPS AND PLATFORM SERVICES AT SCALE ACROSS PUBLIC AND TELCO
CLOUDS, DATA CENTERS AND EDGE ENVIRONMENTS.

AUTOMATE & OPTIMIZE APPS & CLOUDS

OPERATE APPS AND INFRASTRUCTURE CONSISTENTLY, WITH UNIFIED GOVERNANCE AND
VISIBILITY INTO PERFORMANCE AND COSTS ACROSS CLOUDS.

ACCESS ANY APP ON ANY DEVICE

EMPOWER YOUR EMPLOYEES TO BE PRODUCTIVE FROM ANYWHERE, WITH SECURE, FRICTIONLESS
ACCESS TO ENTERPRISE APPS FROM ANY DEVICE.


SEE HOW VMWARE CAN HELP LEARN ABOUT CROSS-CLOUD SERVICES
Main Menu

ANYWHERE WORKSPACE

Access Any App on Any Device Securely

Horizon Horizon Cloud Workspace ONE Workspace ONE UEM

APP PLATFORM

Build and Operate Cloud Native Apps

Tanzu

CLOUD & EDGE INFRASTRUCTURE

Run Enterprise Apps Anywhere

Cloud Foundation/Cloud Foundation+ SD-WAN/SASE Telco Cloud vSAN/vSAN+
vSphere/vSphere+ VMware Cloud Disaster Recovery

CLOUD MANAGEMENT

Automate and Optimize Apps and Clouds

VMware Aria CloudHealth Skyline

DESKTOP HYPERVISOR

Manage apps in a local virtualization sandbox

Fusion for Mac Workstation Player Workstation Pro

SECURITY & NETWORKING

Connect and Secure Apps and Clouds

Carbon Black Cloud Carbon Black Endpoint NSX NSX Advanced Load Balancer NSX
Distributed Firewall

RUN VMWARE ON ANY CLOUD. ANY ENVIRONMENT. ANYWHERE.

ON PUBLIC & HYBRID CLOUDS

Alibaba Cloud VMware Service Azure VMware Solution Google Cloud VMware Engine
IBM Cloud for VMware Solutions Oracle Cloud VMware Solutions VMware Cloud on AWS
VMware Cloud on AWS GovCloud (US)

ON PRIVATE CLOUD & HCI

Dell EMC VxRail VMware on AWS Outposts VMware Verified Cloud Providers

SEE ALL PRODUCTS
SaaS (Subscription) product version available
Main Menu

SOLUTIONS

ANYWHERE WORKSPACE

ACCESS ANY APP ON ANY DEVICE SECURELY

APP PLATFORM

BUILD AND OPERATE CLOUD NATIVE APPS

CLOUD INFRASTRUCTURE

RUN ENTERPRISE APPS ANYWHERE

CLOUD MANAGEMENT

AUTOMATE AND OPTIMIZE APPS AND CLOUDS

EDGE INFRASTRUCTURE

ENABLE THE MULTI-CLOUD EDGE

NETWORKING

ENABLE CONNECTIVITY FOR APPS AND CLOUDS

SECURITY

SECURE APPS AND CLOUDS

BY INDUSTRY

Communications Service Providers Federal Government Financial Services
Healthcare Providers State and Local Government

MANAGE YOUR MULTI-CLOUD ENVIRONMENT

Multi-Cloud made easy with a portfolio of cross-cloud services designed to
build, operate, secure, and access applications on any cloud.

LEARN MORE

SEE ALL SOLUTIONS SEE ALL INDUSTRIES
Main Menu

FOR CUSTOMERS

Find a Cloud Provider Find a Partner VMware Marketplace Work with a Partner

FOR PARTNERS

Become a Cloud Provider Cloud Partner Navigator Get Cloud Verified Learning and
Selling Resources Partner Connect Login Partner Executive Edge Technology
Partner Hub Work with VMware

WORKING TOGETHER WITH PARTNERS FOR CUSTOMER SUCCESS

See how we work with a global partner to help companies prepare for multi-cloud.

VIEW PARTNER STORY
Main Menu

TOOLS & TRAINING

VMware Customer Connect VMware Trust Center Learning & Certification Tech Zone
Product Downloads Product Trials Cloud Services Engagement Platform Hands-on
Labs

SERVICES

Professional Services Customer Success

SUPPORT

VMware Customer Connect Support Offerings Skyline Support Customer Welcome
Center

MARKETPLACE

Cloud Marketplace VMware Marketplace

VIDEOS

VMware Video Library VMware Explore Video Library

BLOGS & COMMUNITIES

Blogs Podcasts News & Stories Communities

CUSTOMERS

Customer Stories

EVENTS

VMware Explore SpringOne All Events & Webcasts

SEE ALL RESOURCES
Ellipsis
VMware Security Solutions  Advisories




VMWARE SECURITY ADVISORIES

VMware Security Advisories document remediation for security vulnerabilities
that are reported in VMware products. Sign up on the right-hand side of this
page to receive new and updated advisories in e-mail

RSS Feed

Sign up for Security Advisories

SIGN UP FOR SECURITY ADVISORIES

Stay up to date on the latest VMware Security advisories and updates.





Close
*Email
Hide Filter
Show Filter
336 Results
Nothing selected
 * All
 * Critical
 * Important
 * Moderate
 * Low

Search Field requires minimum 5 characters


336 Results
Sort By
Recently Added Recently Modified
Recently Added

Show 102550100 entries
Search:

Advisory ID SeverityCVE(s)Updated OnUpdated On VMSA-2023-0012VMware Aria
Operations for Networks updates address multiple vulnerabilities.
(CVE-2023-20887, CVE-2023-20888, CVE-2023-20889) 8.8 - 9.8
critical
VMware Aria Operations for Networks updates address multiple vulnerabilities.
(CVE-2023-20887, CVE-2023-20888, CVE-2023-20889)7-06-20237-06-2023
VMSA-2023-0011VMware Workspace ONE Access and Identity Manager update addresses
an Insecure Redirect Vulnerability. (CVE-2023-20884) 6.1
moderate
VMware Workspace ONE Access and Identity Manager update addresses an Insecure
Redirect Vulnerability. (CVE-2023-20884)30-05-202330-05-2023 VMSA-2023-0010NSX-T
update addresses cross-site scripting vulnerability (CVE-2023-20868) 4.3
moderate
NSX-T update addresses cross-site scripting vulnerability
(CVE-2023-20868)23-05-202323-05-2023 VMSA-2023-0009VMware Aria Operations update
addresses multiple Local Privilege Escalations and a Deserialization issue
(CVE-2023-20877, CVE-2023-20878, CVE-2023-20879, CVE-2023-20880) 6.4-8.8
important
VMware Aria Operations update addresses multiple Local Privilege Escalations and
a Deserialization issue (CVE-2023-20877, CVE-2023-20878, CVE-2023-20879,
CVE-2023-20880)11-05-202311-05-2023 VMSA-2023-0008VMware Workstation and Fusion
updates address multiple security vulnerabilities (CVE-2023-20869,
CVE-2023-20870, CVE-2023-20871, CVE-2023-20872) 7.3-9.3
critical
VMware Workstation and Fusion updates address multiple security vulnerabilities
(CVE-2023-20869, CVE-2023-20870, CVE-2023-20871,
CVE-2023-20872)25-04-202325-04-2023 VMSA-2023-0007VMware Aria Operations for
Logs (Operations for Logs) update addresses multiple vulnerabilities.
(CVE-2023-20864, CVE-2023-20865) 7.2-9.8
critical
VMware Aria Operations for Logs (Operations for Logs) update addresses multiple
vulnerabilities. (CVE-2023-20864, CVE-2023-20865)20-04-202320-04-2023
VMSA-2023-0006VMware Workspace ONE Content update addresses a passcode bypass
vulnerability (CVE-2023-20857) 6.3
moderate
VMware Workspace ONE Content update addresses a passcode bypass vulnerability
(CVE-2023-20857)28-02-202328-02-2023 VMSA-2023-0004VMware Carbon Black App
Control updates address an injection vulnerability (CVE-2023-20858) 9.1
critical
VMware Carbon Black App Control updates address an injection vulnerability
(CVE-2023-20858)21-02-202321-02-2023 VMSA-2023-0005VMware vRealize Orchestrator
update addresses an XML External Entity (XXE) vulnerability (CVE-2023-20855) 8.8
important
VMware vRealize Orchestrator update addresses an XML External Entity (XXE)
vulnerability (CVE-2023-20855)21-02-202321-02-2023 VMSA-2023-0003VMware
Workstation update addresses an arbitrary file deletion vulnerability
(CVE-2023-20854) 7.8
important
VMware Workstation update addresses an arbitrary file deletion vulnerability
(CVE-2023-20854)2-02-20232-02-2023 VMSA-2023-0002VMware vRealize Operations
(vROps) update addresses a CSRF bypass vulnerability (CVE-2023-20856) 6.5
moderate
VMware vRealize Operations (vROps) update addresses a CSRF bypass vulnerability
(CVE-2023-20856)31-01-202331-01-2023 VMSA-2023-0001.1VMware vRealize Log Insight
latest updates address multiple security vulnerabilities (CVE-2022-31706,
CVE-2022-31704, CVE-2022-31710, CVE-2022-31711) 5.3-9.8
critical
VMware vRealize Log Insight latest updates address multiple security
vulnerabilities (CVE-2022-31706, CVE-2022-31704, CVE-2022-31710,
CVE-2022-31711)31-01-202324-01-2023 VMSA-2022-0034VMware vRealize Operations
(vROps) updates address privilege escalation vulnerabilities (CVE-2022-31707,
CVE-2022-31708) 4.4-7.2
important
VMware vRealize Operations (vROps) updates address privilege escalation
vulnerabilities (CVE-2022-31707, CVE-2022-31708)15-12-202215-12-2022
VMSA-2022-0031VMware vRealize Network Insight (vRNI) updates address command
injection and directory traversal security vulnerabilities (CVE-2022-31702,
CVE-2022-31703) 7.5-9.8
critical
VMware vRealize Network Insight (vRNI) updates address command injection and
directory traversal security vulnerabilities (CVE-2022-31702,
CVE-2022-31703)13-12-202213-12-2022 VMSA-2022-0033VMware ESXi, Workstation, and
Fusion updates address a heap out-of-bounds write vulnerability (CVE-2022-31705)
5.9-9.3
critical
VMware ESXi, Workstation, and Fusion updates address a heap out-of-bounds write
vulnerability (CVE-2022-31705)13-12-202213-12-2022 VMSA-2022-0032VMware
Workspace ONE Access and Identity Manager updates address multiple
vulnerabilities (CVE-2022-31700, CVE-2022-31701). 5.3-7.2
important
VMware Workspace ONE Access and Identity Manager updates address multiple
vulnerabilities (CVE-2022-31700, CVE-2022-31701).13-12-202213-12-2022
VMSA-2022-0030VMware ESXi and vCenter Server updates address multiple security
vulnerabilities (CVE-2022-31696, CVE-2022-31697, CVE-2022-31698, CVE-2022-31699)
4.2-7.5
important
VMware ESXi and vCenter Server updates address multiple security vulnerabilities
(CVE-2022-31696, CVE-2022-31697, CVE-2022-31698,
CVE-2022-31699)8-12-20228-12-2022 VMSA-2022-0029VMware Tools for Windows update
addresses a denial-of-service vulnerability (CVE-2022-31693) 3.3
low
VMware Tools for Windows update addresses a denial-of-service vulnerability
(CVE-2022-31693)29-11-202229-11-2022 VMSA-2022-0028VMware Workspace ONE Assist
update addresses multiple vulnerabilities. 4.2-9.8
critical
VMware Workspace ONE Assist update addresses multiple
vulnerabilities.8-11-20228-11-2022 VMSA-2022-0027.2VMware Cloud Foundation
updates address multiple vulnerabilities. 5.3-9.8
critical
VMware Cloud Foundation updates address multiple
vulnerabilities.9-03-202325-10-2022 VMSA-2022-0026VMware vRealize Operations
patches address an arbitrary file read vulnerability (CVE-2022-31682). 4.9
moderate
VMware vRealize Operations patches address an arbitrary file read vulnerability
(CVE-2022-31682).11-10-202211-10-2022 VMSA-2022-0025VMware ESXi and vCenter
Server updates address multiple security vulnerabilities (CVE-2022-31680,
CVE-2022-31681) 3.8-7.2
important
VMware ESXi and vCenter Server updates address multiple security vulnerabilities
(CVE-2022-31680, CVE-2022-31681)6-10-20226-10-2022 VMSA-2022-0024.1VMware Tools
update addresses a local privilege escalation vulnerability (CVE-2022-31676) 7.0
important
VMware Tools update addresses a local privilege escalation vulnerability
(CVE-2022-31676)2-09-202223-08-2022 VMSA-2022-0022VMware vRealize Operations
contains multiple vulnerabilities 5.6-7.2
important
VMware vRealize Operations contains multiple vulnerabilities9-08-20229-08-2022
VMSA-2022-0023VMware Workstation update addresses an unprotected storage of
credentials vulnerability (CVE-2022-22983) 5.7
moderate
VMware Workstation update addresses an unprotected storage of credentials
vulnerability (CVE-2022-22983)9-08-20229-08-2022 VMSA-2022-0021.1VMware
Workspace ONE Access, Access Connector, Identity Manager, Identity Manager
Connector and vRealize Automation updates address multiple vulnerabilities.
4.7-9.8
critical
VMware Workspace ONE Access, Access Connector, Identity Manager, Identity
Manager Connector and vRealize Automation updates address multiple
vulnerabilities.9-08-20222-08-2022 VMSA-2022-0020.2VMware ESXi addresses
Return-Stack-Buffer-Underflow and Branch Type Confusion vulnerabilities 5.6
moderate
VMware ESXi addresses Return-Stack-Buffer-Underflow and Branch Type Confusion
vulnerabilities25-10-202212-07-2022 VMSA-2022-0018VMware vCenter Server updates
address a server-side request forgery vulnerability (CVE-2022-22982) 5.3
moderate
VMware vCenter Server updates address a server-side request forgery
vulnerability (CVE-2022-22982)23-07-202212-07-2022 VMSA-2022-0019VMware vRealize
Log Insight contains multiple stored cross-site scripting vulnerabilities 3.9
low
VMware vRealize Log Insight contains multiple stored cross-site scripting
vulnerabilities12-07-202212-07-2022 VMSA-2022-0017VMware HCX update addresses an
information disclosure vulnerability (CVE-2022-22953) 2.7
low
VMware HCX update addresses an information disclosure vulnerability
(CVE-2022-22953)15-06-202215-06-2022 VMSA-2022-0016VMware ESXi addresses
DirectPath I/O (PCI-Passthrough) Information Leak vulnerabilities
(CVE-2022-21123, CVE-2022-21125, CVE-2022-21166) 3.8
low
VMware ESXi addresses DirectPath I/O (PCI-Passthrough) Information Leak
vulnerabilities (CVE-2022-21123, CVE-2022-21125,
CVE-2022-21166)14-06-202214-06-2022 VMSA-2022-0015VMware Tools for Windows
update addresses an XML External Entity (XXE) vulnerability (CVE-2022-22977) 5.8
moderate
VMware Tools for Windows update addresses an XML External Entity (XXE)
vulnerability (CVE-2022-22977)24-05-202224-05-2022 VMSA-2022-0014.1VMware
Workspace ONE Access, Identity Manager and vRealize Automation updates address
multiple vulnerabilities. 7.8-9.8
critical
VMware Workspace ONE Access, Identity Manager and vRealize Automation updates
address multiple vulnerabilities.27-05-202218-05-2022 VMSA-2022-0013VMware Cloud
Director update addresses remote code execution vulnerability (CVE-2022-22966)
9.1
critical
VMware Cloud Director update addresses remote code execution vulnerability
(CVE-2022-22966)14-04-202214-04-2022 VMSA-2022-0011.1VMware Workspace ONE
Access, Identity Manager and vRealize Automation updates address multiple
vulnerabilities. 5.3-9.8
critical
VMware Workspace ONE Access, Identity Manager and vRealize Automation updates
address multiple vulnerabilities.13-04-20226-04-2022 VMSA-2022-0012.1VMware
Horizon Agent for Linux update addresses multiple vulnerabilities
(CVE-2022-22962, CVE-2022-22964) 7.3
important
VMware Horizon Agent for Linux update addresses multiple vulnerabilities
(CVE-2022-22962, CVE-2022-22964)20-04-20226-04-2022 VMSA-2022-0010.6VMware
Response to Spring Framework Remote Code Execution Vulnerability
(CVE-2022-22965) 9.8
critical
VMware Response to Spring Framework Remote Code Execution Vulnerability
(CVE-2022-22965)30-04-20222-04-2022 VMSA-2022-0009.1VMware vCenter Server
updates address an information disclosure vulnerability (CVE-2022-22948) 5.5
moderate
VMware vCenter Server updates address an information disclosure vulnerability
(CVE-2022-22948)18-05-202229-03-2022 VMSA-2022-0008VMware Carbon Black App
Control update addresses multiple vulnerabilities (CVE-2022-22951,
CVE-2022-22952) 9.1
critical
VMware Carbon Black App Control update addresses multiple vulnerabilities
(CVE-2022-22951, CVE-2022-22952)23-03-202223-03-2022 VMSA-2022-0007VMware Tools
for Windows update addresses an uncontrolled search path vulnerability
(CVE-2022-22943) 5.6
moderate
VMware Tools for Windows update addresses an uncontrolled search path
vulnerability (CVE-2022-22943)1-03-20221-03-2022 VMSA-2022-0006VMware Workspace
ONE Boxer update addresses a stored cross-site scripting (XSS) vulnerability
(CVE-2022-22944) 6.6
moderate
VMware Workspace ONE Boxer update addresses a stored cross-site scripting (XSS)
vulnerability (CVE-2022-22944)23-02-202223-02-2022 VMSA-2022-0005.2VMware NSX
Data Center for vSphere update addresses CLI shell injection vulnerability
(CVE-2022-22945) 8.8
important
VMware NSX Data Center for vSphere update addresses CLI shell injection
vulnerability (CVE-2022-22945)7-04-202215-02-2022 VMSA-2022-0004VMware ESXi,
Workstation, and Fusion updates address multiple security vulnerabilities
(CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050)
5.3-8.4
critical
VMware ESXi, Workstation, and Fusion updates address multiple security
vulnerabilities (CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043,
CVE-2021-22050)15-02-202215-02-2022 VMSA-2022-0003.1VMware Cloud Foundation
contains an information disclosure vulnerability due to the logging of plaintext
credentials within some log files. 6.0
moderate
VMware Cloud Foundation contains an information disclosure vulnerability due to
the logging of plaintext credentials within some log files. 14-02-202231-01-2022
VMSA-2022-0002VMware Workstation and Horizon Client for Windows updates address
a denial-of-service vulnerability (CVE-2022-22938) 4.0
moderate
VMware Workstation and Horizon Client for Windows updates address a
denial-of-service vulnerability (CVE-2022-22938)18-01-202218-01-2022
VMSA-2022-0001.2VMware Workstation, Fusion and ESXi updates address a
heap-overflow vulnerability (CVE-2021-22045) 7.7
important
VMware Workstation, Fusion and ESXi updates address a heap-overflow
vulnerability (CVE-2021-22045)14-02-20224-01-2022 VMSA-2021-0030VMware Workspace
ONE Access, Identity Manager and vRealize Automation updates address multiple
vulnerabilities (CVE-2021-22056, CVE-2021-22057) 5.5-6.6
moderate
VMware Workspace ONE Access, Identity Manager and vRealize Automation updates
address multiple vulnerabilities (CVE-2021-22056,
CVE-2021-22057)17-12-202117-12-2021 VMSA-2021-0029VMware Workspace ONE UEM
console patches address SSRF vulnerability (CVE-2021-22054) 9.1
critical
VMware Workspace ONE UEM console patches address SSRF vulnerability
(CVE-2021-22054)16-12-202116-12-2021 VMSA-2021-0028.13VMware Response to Apache
Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046)
9.0-10.0
critical
VMware Response to Apache Log4j Remote Code Execution Vulnerabilities
(CVE-2021-44228, CVE-2021-45046)14-04-202210-12-2021 VMSA-2021-0027.1VMware
vCenter Server updates address arbitrary file read and SSRF vulnerabilities
(CVE-2021-21980, CVE-2021-22049) 6.5-7.5
important
VMware vCenter Server updates address arbitrary file read and SSRF
vulnerabilities (CVE-2021-21980, CVE-2021-22049)15-02-202223-11-2021

Showing 1 to 50 of 336 entries
1234567

Company

About Us Executive Leadership News & Stories Investor Relations Customer Stories
Diversity, Equity & Inclusion Environment, Social & Governance
Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust
Center COVID-19 Resources

Support

VMware Customer Connect Support Policies Product Documentation Compatibility
Guide Terms & Conditions California Transparency Act Statement
Twitter YouTube Facebook LinkedIn Contact Sales

--------------------------------------------------------------------------------

© 2023 VMware, Inc. Terms of Use Your California Privacy Rights Privacy
Accessibility Trademarks Glossary Help Feedback
Cookies Settings





WE CARE ABOUT YOUR PRIVACY

We use cookies to provide you with the best experience on our website, to
improve usability and performance and thereby improve what we offer to you. Our
website may also use third-party cookies to display advertising that is more
relevant to you. By clicking on the “Accept All” button you agree to the storing
of cookies on your device. If you close the cookie banner, only strictly
necessary cookies will be stored on your device. If you want to know more about
how we use cookies, please see our Cookie Policy.

Cookies Settings Accept All Cookies



COOKIE PREFERENCE CENTER




 * GENERAL INFORMATION ON COOKIES


 * STRICTLY NECESSARY


 * PERFORMANCE


 * FUNCTIONAL


 * ADVERTISING


 * SOCIAL MEDIA

GENERAL INFORMATION ON COOKIES

When you visit our website, we use cookies to ensure that we give you the best
experience. This information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies by clicking on the
different category headings to find out more and change your settings. However,
blocking some types of cookies may impact your experience on the site and the
services we are able to offer. Further information can be found in our
Cookie Policy.

STRICTLY NECESSARY

Always Active

Strictly necessary cookies are always enabled since they are essential for our
website to function. They enable core functionality such as security, network
management, and website accessibility. You can set your browser to block or
alert you about these cookies, but this may affect how the website functions.
For more information please visit www.aboutcookies.org or
www.allaboutcookies.org.

Cookies Details‎

PERFORMANCE

Performance


Performance cookies are used to analyze the user experience to improve our
website by collecting and reporting information on how you use it. They allow us
to know which pages are the most and least popular, see how visitors move around
the site, optimize our website and make it easier to navigate.

Cookies Details‎

FUNCTIONAL

Functional


Functional cookies help us keep track of your past browsing choices so we can
improve usability and customize your experience. These cookies enable the
website to remember your preferred settings, language preferences, location and
other customizable elements such as font or text size. If you do not allow these
cookies, then some or all of these services may not function properly.

Cookies Details‎

ADVERTISING

Advertising


Advertising cookies are used to send you relevant advertising and promotional
information. They may be set through our site by third parties to build a
profile of your interests and show you relevant advertisements on other sites.
These cookies do not directly store personal information, but their function is
based on uniquely identifying your browser and internet device.

Cookies Details‎

SOCIAL MEDIA

Social Media


Social media cookies are intended to facilitate the sharing of content and to
improve the user experience. These cookies can sometimes track your activities.
We do not control social media cookies and they do not allow us to gain access
to your social media accounts. Please refer to the relevant social media
platform’s privacy policies for more information.

Cookies Details‎
Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * View Third Party Cookies
    * Name
      cookie name


Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All

word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1