www.vmware.com
Open in
urlscan Pro
2a02:26f0:3500:89b::2ef
Public Scan
URL:
https://www.vmware.com/security/advisories.html
Submission: On June 12 via api from IN — Scanned from NL
Submission: On June 12 via api from IN — Scanned from NL
Form analysis
3 forms found in the DOM//www.vmware.com/search.html
<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
<input type="text" name="q" id="ub-search" class="d-none" placeholder="Search" title="Search" aria-role="searchbox" role="searchbox">
<a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">
<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
</a>
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
//www.vmware.com/search.html
<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
<a href="javascript:void(0);" tabindex="-1" class="search-icon ml-lg-3" name="nav_utility : Search">
</a>
<input type="text" name="q" id="ub-search" placeholder="Search" title="Search" role="searchbox">
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
Name: securitysignup —
<form accept-charset="UNKNOWN" id="securitysignup" name="securitysignup" data-gtm-form-interact-id="0">
<label class="email-input-label" for="securityEmail">*Email</label>
<input id="securityEmail" name="email" size="25" type="text" data-gtm-form-interact-field-id="0">
<span class="subscriptionerrorMsg sa-validation-alerts" tabindex="0"></span>
<input name="email-button" class="sa-subscription-modal-button sa-subscription-submit-button" type="submit" onclick="s_objectID='content_advisories : : 0';" value="Submit">
</form>
Text Content
Skip to Promo Skip to main content Global Search US Store Login Cloud Services Console Customer Connect Partner Connect * Multi-Cloud Services * Products * Solutions * Partners * Resources GET STARTED Global Search Main Menu TAKE CONTROL OF YOUR MULTI-CLOUD ENVIRONMENT 73% OF ENTERPRISES USE TWO OR MORE PUBLIC CLOUDS TODAY. WHILE MULTI-CLOUD ACCELERATES DIGITAL TRANSFORMATION, IT ALSO INTRODUCES COMPLEXITY AND RISK. VMWARE CROSS-CLOUD™ SERVICES ENABLE ORGANIZATIONS TO UNLOCK THE POTENTIAL OF MULTI-CLOUD WITH ENTERPRISE SECURITY AND RESILIENCY. BUILD & OPERATE CLOUD NATIVE APPS GIVE DEVELOPERS THE FLEXIBILITY TO USE ANY APP FRAMEWORK AND TOOLING FOR A SECURE, CONSISTENT AND FAST PATH TO PRODUCTION ON ANY CLOUD. CONNECT & SECURE APPS & CLOUDS DELIVER SECURITY AND NETWORKING AS A BUILT-IN DISTRIBUTED SERVICE ACROSS USERS, APPS, DEVICES, AND WORKLOADS IN ANY CLOUD. RUN ENTERPRISE APPS ANYWHERE RUN ENTERPRISE APPS AND PLATFORM SERVICES AT SCALE ACROSS PUBLIC AND TELCO CLOUDS, DATA CENTERS AND EDGE ENVIRONMENTS. AUTOMATE & OPTIMIZE APPS & CLOUDS OPERATE APPS AND INFRASTRUCTURE CONSISTENTLY, WITH UNIFIED GOVERNANCE AND VISIBILITY INTO PERFORMANCE AND COSTS ACROSS CLOUDS. ACCESS ANY APP ON ANY DEVICE EMPOWER YOUR EMPLOYEES TO BE PRODUCTIVE FROM ANYWHERE, WITH SECURE, FRICTIONLESS ACCESS TO ENTERPRISE APPS FROM ANY DEVICE. SEE HOW VMWARE CAN HELP LEARN ABOUT CROSS-CLOUD SERVICES Main Menu ANYWHERE WORKSPACE Access Any App on Any Device Securely Horizon Horizon Cloud Workspace ONE Workspace ONE UEM APP PLATFORM Build and Operate Cloud Native Apps Tanzu CLOUD & EDGE INFRASTRUCTURE Run Enterprise Apps Anywhere Cloud Foundation/Cloud Foundation+ SD-WAN/SASE Telco Cloud vSAN/vSAN+ vSphere/vSphere+ VMware Cloud Disaster Recovery CLOUD MANAGEMENT Automate and Optimize Apps and Clouds VMware Aria CloudHealth Skyline DESKTOP HYPERVISOR Manage apps in a local virtualization sandbox Fusion for Mac Workstation Player Workstation Pro SECURITY & NETWORKING Connect and Secure Apps and Clouds Carbon Black Cloud Carbon Black Endpoint NSX NSX Advanced Load Balancer NSX Distributed Firewall RUN VMWARE ON ANY CLOUD. ANY ENVIRONMENT. ANYWHERE. ON PUBLIC & HYBRID CLOUDS Alibaba Cloud VMware Service Azure VMware Solution Google Cloud VMware Engine IBM Cloud for VMware Solutions Oracle Cloud VMware Solutions VMware Cloud on AWS VMware Cloud on AWS GovCloud (US) ON PRIVATE CLOUD & HCI Dell EMC VxRail VMware on AWS Outposts VMware Verified Cloud Providers SEE ALL PRODUCTS SaaS (Subscription) product version available Main Menu SOLUTIONS ANYWHERE WORKSPACE ACCESS ANY APP ON ANY DEVICE SECURELY APP PLATFORM BUILD AND OPERATE CLOUD NATIVE APPS CLOUD INFRASTRUCTURE RUN ENTERPRISE APPS ANYWHERE CLOUD MANAGEMENT AUTOMATE AND OPTIMIZE APPS AND CLOUDS EDGE INFRASTRUCTURE ENABLE THE MULTI-CLOUD EDGE NETWORKING ENABLE CONNECTIVITY FOR APPS AND CLOUDS SECURITY SECURE APPS AND CLOUDS BY INDUSTRY Communications Service Providers Federal Government Financial Services Healthcare Providers State and Local Government MANAGE YOUR MULTI-CLOUD ENVIRONMENT Multi-Cloud made easy with a portfolio of cross-cloud services designed to build, operate, secure, and access applications on any cloud. LEARN MORE SEE ALL SOLUTIONS SEE ALL INDUSTRIES Main Menu FOR CUSTOMERS Find a Cloud Provider Find a Partner VMware Marketplace Work with a Partner FOR PARTNERS Become a Cloud Provider Cloud Partner Navigator Get Cloud Verified Learning and Selling Resources Partner Connect Login Partner Executive Edge Technology Partner Hub Work with VMware WORKING TOGETHER WITH PARTNERS FOR CUSTOMER SUCCESS See how we work with a global partner to help companies prepare for multi-cloud. VIEW PARTNER STORY Main Menu TOOLS & TRAINING VMware Customer Connect VMware Trust Center Learning & Certification Tech Zone Product Downloads Product Trials Cloud Services Engagement Platform Hands-on Labs SERVICES Professional Services Customer Success SUPPORT VMware Customer Connect Support Offerings Skyline Support Customer Welcome Center MARKETPLACE Cloud Marketplace VMware Marketplace VIDEOS VMware Video Library VMware Explore Video Library BLOGS & COMMUNITIES Blogs Podcasts News & Stories Communities CUSTOMERS Customer Stories EVENTS VMware Explore SpringOne All Events & Webcasts SEE ALL RESOURCES Ellipsis VMware Security Solutions Advisories VMWARE SECURITY ADVISORIES VMware Security Advisories document remediation for security vulnerabilities that are reported in VMware products. Sign up on the right-hand side of this page to receive new and updated advisories in e-mail RSS Feed Sign up for Security Advisories SIGN UP FOR SECURITY ADVISORIES Stay up to date on the latest VMware Security advisories and updates. Close *Email Hide Filter Show Filter 336 Results Nothing selected * All * Critical * Important * Moderate * Low Search Field requires minimum 5 characters 336 Results Sort By Recently Added Recently Modified Recently Added Show 102550100 entries Search: Advisory ID SeverityCVE(s)Updated OnUpdated On VMSA-2023-0012VMware Aria Operations for Networks updates address multiple vulnerabilities. (CVE-2023-20887, CVE-2023-20888, CVE-2023-20889) 8.8 - 9.8 critical VMware Aria Operations for Networks updates address multiple vulnerabilities. (CVE-2023-20887, CVE-2023-20888, CVE-2023-20889)7-06-20237-06-2023 VMSA-2023-0011VMware Workspace ONE Access and Identity Manager update addresses an Insecure Redirect Vulnerability. (CVE-2023-20884) 6.1 moderate VMware Workspace ONE Access and Identity Manager update addresses an Insecure Redirect Vulnerability. (CVE-2023-20884)30-05-202330-05-2023 VMSA-2023-0010NSX-T update addresses cross-site scripting vulnerability (CVE-2023-20868) 4.3 moderate NSX-T update addresses cross-site scripting vulnerability (CVE-2023-20868)23-05-202323-05-2023 VMSA-2023-0009VMware Aria Operations update addresses multiple Local Privilege Escalations and a Deserialization issue (CVE-2023-20877, CVE-2023-20878, CVE-2023-20879, CVE-2023-20880) 6.4-8.8 important VMware Aria Operations update addresses multiple Local Privilege Escalations and a Deserialization issue (CVE-2023-20877, CVE-2023-20878, CVE-2023-20879, CVE-2023-20880)11-05-202311-05-2023 VMSA-2023-0008VMware Workstation and Fusion updates address multiple security vulnerabilities (CVE-2023-20869, CVE-2023-20870, CVE-2023-20871, CVE-2023-20872) 7.3-9.3 critical VMware Workstation and Fusion updates address multiple security vulnerabilities (CVE-2023-20869, CVE-2023-20870, CVE-2023-20871, CVE-2023-20872)25-04-202325-04-2023 VMSA-2023-0007VMware Aria Operations for Logs (Operations for Logs) update addresses multiple vulnerabilities. (CVE-2023-20864, CVE-2023-20865) 7.2-9.8 critical VMware Aria Operations for Logs (Operations for Logs) update addresses multiple vulnerabilities. (CVE-2023-20864, CVE-2023-20865)20-04-202320-04-2023 VMSA-2023-0006VMware Workspace ONE Content update addresses a passcode bypass vulnerability (CVE-2023-20857) 6.3 moderate VMware Workspace ONE Content update addresses a passcode bypass vulnerability (CVE-2023-20857)28-02-202328-02-2023 VMSA-2023-0004VMware Carbon Black App Control updates address an injection vulnerability (CVE-2023-20858) 9.1 critical VMware Carbon Black App Control updates address an injection vulnerability (CVE-2023-20858)21-02-202321-02-2023 VMSA-2023-0005VMware vRealize Orchestrator update addresses an XML External Entity (XXE) vulnerability (CVE-2023-20855) 8.8 important VMware vRealize Orchestrator update addresses an XML External Entity (XXE) vulnerability (CVE-2023-20855)21-02-202321-02-2023 VMSA-2023-0003VMware Workstation update addresses an arbitrary file deletion vulnerability (CVE-2023-20854) 7.8 important VMware Workstation update addresses an arbitrary file deletion vulnerability (CVE-2023-20854)2-02-20232-02-2023 VMSA-2023-0002VMware vRealize Operations (vROps) update addresses a CSRF bypass vulnerability (CVE-2023-20856) 6.5 moderate VMware vRealize Operations (vROps) update addresses a CSRF bypass vulnerability (CVE-2023-20856)31-01-202331-01-2023 VMSA-2023-0001.1VMware vRealize Log Insight latest updates address multiple security vulnerabilities (CVE-2022-31706, CVE-2022-31704, CVE-2022-31710, CVE-2022-31711) 5.3-9.8 critical VMware vRealize Log Insight latest updates address multiple security vulnerabilities (CVE-2022-31706, CVE-2022-31704, CVE-2022-31710, CVE-2022-31711)31-01-202324-01-2023 VMSA-2022-0034VMware vRealize Operations (vROps) updates address privilege escalation vulnerabilities (CVE-2022-31707, CVE-2022-31708) 4.4-7.2 important VMware vRealize Operations (vROps) updates address privilege escalation vulnerabilities (CVE-2022-31707, CVE-2022-31708)15-12-202215-12-2022 VMSA-2022-0031VMware vRealize Network Insight (vRNI) updates address command injection and directory traversal security vulnerabilities (CVE-2022-31702, CVE-2022-31703) 7.5-9.8 critical VMware vRealize Network Insight (vRNI) updates address command injection and directory traversal security vulnerabilities (CVE-2022-31702, CVE-2022-31703)13-12-202213-12-2022 VMSA-2022-0033VMware ESXi, Workstation, and Fusion updates address a heap out-of-bounds write vulnerability (CVE-2022-31705) 5.9-9.3 critical VMware ESXi, Workstation, and Fusion updates address a heap out-of-bounds write vulnerability (CVE-2022-31705)13-12-202213-12-2022 VMSA-2022-0032VMware Workspace ONE Access and Identity Manager updates address multiple vulnerabilities (CVE-2022-31700, CVE-2022-31701). 5.3-7.2 important VMware Workspace ONE Access and Identity Manager updates address multiple vulnerabilities (CVE-2022-31700, CVE-2022-31701).13-12-202213-12-2022 VMSA-2022-0030VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31696, CVE-2022-31697, CVE-2022-31698, CVE-2022-31699) 4.2-7.5 important VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31696, CVE-2022-31697, CVE-2022-31698, CVE-2022-31699)8-12-20228-12-2022 VMSA-2022-0029VMware Tools for Windows update addresses a denial-of-service vulnerability (CVE-2022-31693) 3.3 low VMware Tools for Windows update addresses a denial-of-service vulnerability (CVE-2022-31693)29-11-202229-11-2022 VMSA-2022-0028VMware Workspace ONE Assist update addresses multiple vulnerabilities. 4.2-9.8 critical VMware Workspace ONE Assist update addresses multiple vulnerabilities.8-11-20228-11-2022 VMSA-2022-0027.2VMware Cloud Foundation updates address multiple vulnerabilities. 5.3-9.8 critical VMware Cloud Foundation updates address multiple vulnerabilities.9-03-202325-10-2022 VMSA-2022-0026VMware vRealize Operations patches address an arbitrary file read vulnerability (CVE-2022-31682). 4.9 moderate VMware vRealize Operations patches address an arbitrary file read vulnerability (CVE-2022-31682).11-10-202211-10-2022 VMSA-2022-0025VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31680, CVE-2022-31681) 3.8-7.2 important VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31680, CVE-2022-31681)6-10-20226-10-2022 VMSA-2022-0024.1VMware Tools update addresses a local privilege escalation vulnerability (CVE-2022-31676) 7.0 important VMware Tools update addresses a local privilege escalation vulnerability (CVE-2022-31676)2-09-202223-08-2022 VMSA-2022-0022VMware vRealize Operations contains multiple vulnerabilities 5.6-7.2 important VMware vRealize Operations contains multiple vulnerabilities9-08-20229-08-2022 VMSA-2022-0023VMware Workstation update addresses an unprotected storage of credentials vulnerability (CVE-2022-22983) 5.7 moderate VMware Workstation update addresses an unprotected storage of credentials vulnerability (CVE-2022-22983)9-08-20229-08-2022 VMSA-2022-0021.1VMware Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector and vRealize Automation updates address multiple vulnerabilities. 4.7-9.8 critical VMware Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector and vRealize Automation updates address multiple vulnerabilities.9-08-20222-08-2022 VMSA-2022-0020.2VMware ESXi addresses Return-Stack-Buffer-Underflow and Branch Type Confusion vulnerabilities 5.6 moderate VMware ESXi addresses Return-Stack-Buffer-Underflow and Branch Type Confusion vulnerabilities25-10-202212-07-2022 VMSA-2022-0018VMware vCenter Server updates address a server-side request forgery vulnerability (CVE-2022-22982) 5.3 moderate VMware vCenter Server updates address a server-side request forgery vulnerability (CVE-2022-22982)23-07-202212-07-2022 VMSA-2022-0019VMware vRealize Log Insight contains multiple stored cross-site scripting vulnerabilities 3.9 low VMware vRealize Log Insight contains multiple stored cross-site scripting vulnerabilities12-07-202212-07-2022 VMSA-2022-0017VMware HCX update addresses an information disclosure vulnerability (CVE-2022-22953) 2.7 low VMware HCX update addresses an information disclosure vulnerability (CVE-2022-22953)15-06-202215-06-2022 VMSA-2022-0016VMware ESXi addresses DirectPath I/O (PCI-Passthrough) Information Leak vulnerabilities (CVE-2022-21123, CVE-2022-21125, CVE-2022-21166) 3.8 low VMware ESXi addresses DirectPath I/O (PCI-Passthrough) Information Leak vulnerabilities (CVE-2022-21123, CVE-2022-21125, CVE-2022-21166)14-06-202214-06-2022 VMSA-2022-0015VMware Tools for Windows update addresses an XML External Entity (XXE) vulnerability (CVE-2022-22977) 5.8 moderate VMware Tools for Windows update addresses an XML External Entity (XXE) vulnerability (CVE-2022-22977)24-05-202224-05-2022 VMSA-2022-0014.1VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities. 7.8-9.8 critical VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities.27-05-202218-05-2022 VMSA-2022-0013VMware Cloud Director update addresses remote code execution vulnerability (CVE-2022-22966) 9.1 critical VMware Cloud Director update addresses remote code execution vulnerability (CVE-2022-22966)14-04-202214-04-2022 VMSA-2022-0011.1VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities. 5.3-9.8 critical VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities.13-04-20226-04-2022 VMSA-2022-0012.1VMware Horizon Agent for Linux update addresses multiple vulnerabilities (CVE-2022-22962, CVE-2022-22964) 7.3 important VMware Horizon Agent for Linux update addresses multiple vulnerabilities (CVE-2022-22962, CVE-2022-22964)20-04-20226-04-2022 VMSA-2022-0010.6VMware Response to Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) 9.8 critical VMware Response to Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965)30-04-20222-04-2022 VMSA-2022-0009.1VMware vCenter Server updates address an information disclosure vulnerability (CVE-2022-22948) 5.5 moderate VMware vCenter Server updates address an information disclosure vulnerability (CVE-2022-22948)18-05-202229-03-2022 VMSA-2022-0008VMware Carbon Black App Control update addresses multiple vulnerabilities (CVE-2022-22951, CVE-2022-22952) 9.1 critical VMware Carbon Black App Control update addresses multiple vulnerabilities (CVE-2022-22951, CVE-2022-22952)23-03-202223-03-2022 VMSA-2022-0007VMware Tools for Windows update addresses an uncontrolled search path vulnerability (CVE-2022-22943) 5.6 moderate VMware Tools for Windows update addresses an uncontrolled search path vulnerability (CVE-2022-22943)1-03-20221-03-2022 VMSA-2022-0006VMware Workspace ONE Boxer update addresses a stored cross-site scripting (XSS) vulnerability (CVE-2022-22944) 6.6 moderate VMware Workspace ONE Boxer update addresses a stored cross-site scripting (XSS) vulnerability (CVE-2022-22944)23-02-202223-02-2022 VMSA-2022-0005.2VMware NSX Data Center for vSphere update addresses CLI shell injection vulnerability (CVE-2022-22945) 8.8 important VMware NSX Data Center for vSphere update addresses CLI shell injection vulnerability (CVE-2022-22945)7-04-202215-02-2022 VMSA-2022-0004VMware ESXi, Workstation, and Fusion updates address multiple security vulnerabilities (CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050) 5.3-8.4 critical VMware ESXi, Workstation, and Fusion updates address multiple security vulnerabilities (CVE-2021-22040, CVE-2021-22041, CVE-2021-22042, CVE-2021-22043, CVE-2021-22050)15-02-202215-02-2022 VMSA-2022-0003.1VMware Cloud Foundation contains an information disclosure vulnerability due to the logging of plaintext credentials within some log files. 6.0 moderate VMware Cloud Foundation contains an information disclosure vulnerability due to the logging of plaintext credentials within some log files. 14-02-202231-01-2022 VMSA-2022-0002VMware Workstation and Horizon Client for Windows updates address a denial-of-service vulnerability (CVE-2022-22938) 4.0 moderate VMware Workstation and Horizon Client for Windows updates address a denial-of-service vulnerability (CVE-2022-22938)18-01-202218-01-2022 VMSA-2022-0001.2VMware Workstation, Fusion and ESXi updates address a heap-overflow vulnerability (CVE-2021-22045) 7.7 important VMware Workstation, Fusion and ESXi updates address a heap-overflow vulnerability (CVE-2021-22045)14-02-20224-01-2022 VMSA-2021-0030VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities (CVE-2021-22056, CVE-2021-22057) 5.5-6.6 moderate VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities (CVE-2021-22056, CVE-2021-22057)17-12-202117-12-2021 VMSA-2021-0029VMware Workspace ONE UEM console patches address SSRF vulnerability (CVE-2021-22054) 9.1 critical VMware Workspace ONE UEM console patches address SSRF vulnerability (CVE-2021-22054)16-12-202116-12-2021 VMSA-2021-0028.13VMware Response to Apache Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046) 9.0-10.0 critical VMware Response to Apache Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046)14-04-202210-12-2021 VMSA-2021-0027.1VMware vCenter Server updates address arbitrary file read and SSRF vulnerabilities (CVE-2021-21980, CVE-2021-22049) 6.5-7.5 important VMware vCenter Server updates address arbitrary file read and SSRF vulnerabilities (CVE-2021-21980, CVE-2021-22049)15-02-202223-11-2021 Showing 1 to 50 of 336 entries 1234567 Company About Us Executive Leadership News & Stories Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide Terms & Conditions California Transparency Act Statement Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2023 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Trademarks Glossary Help Feedback Cookies Settings WE CARE ABOUT YOUR PRIVACY We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you close the cookie banner, only strictly necessary cookies will be stored on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookies Settings Accept All Cookies COOKIE PREFERENCE CENTER * GENERAL INFORMATION ON COOKIES * STRICTLY NECESSARY * PERFORMANCE * FUNCTIONAL * ADVERTISING * SOCIAL MEDIA GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. STRICTLY NECESSARY Always Active Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookies Details PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookies Details FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookies Details ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookies Details SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1