Browse all 219 CVE security advisories affecting VMware. AI-powered Chinese analysis, POCs, and references for each vulnerability.
VMware operates as a leading provider of cloud computing and virtualization platforms, enabling enterprises to manage data centers and deploy software-defined infrastructure. With 219 recorded CVEs, its attack surface reflects the complexity of managing hypervisors and management interfaces. Historically, vulnerabilities have frequently involved remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation or authentication bypasses in web-based management consoles. Notable incidents include critical flaws in vCenter Server and ESXi that allowed attackers to gain unauthorized administrative access or execute arbitrary commands on host systems. These exploits underscore the risks associated with centralized management tools, where a single compromise can impact entire virtualized environments. The high volume of vulnerabilities highlights the necessity for rigorous patch management and secure configuration practices to mitigate potential breaches in enterprise infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2017-4951 | VMware AirWatch Console 跨站请求伪造漏洞 — AirWatch Console | 8.8 | - | 2018-01-29 |
| CVE-2017-4942 | VMware AirWatch Console 安全漏洞 — Airwatch Console | 4.9 | - | 2017-12-13 |
| CVE-2017-4896 | VMWare Airwatch Inbox for Android 安全漏洞 — Airwatch Console | 6.5 | - | 2017-05-10 |
This page lists every published CVE security advisory associated with VMware. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.