Known Vulnerabilities for Esxi by Vmware

Listed below are 10 of the newest known vulnerabilities associated with "Esxi" by "Vmware".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-29552 json The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This... 7.5 - HIGH 2023-04-25 2023-05-04
CVE-2022-31705 json VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A mal... 8.2 - HIGH 2022-12-14 2022-12-19
CVE-2022-31699 json VMware ESXi contains a heap-overflow vulnerability. A malicious local actor with restricted privileges within a sandbox proce... 3.3 - LOW 2022-12-13 2022-12-15
CVE-2022-31696 json VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor ... 8.8 - HIGH 2022-12-13 2023-08-08
CVE-2022-31681 json VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, m... 6.5 - MEDIUM 2022-10-07 2022-10-11
CVE-2022-29901 json Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigati... 6.5 - MEDIUM 2022-07-12 2024-02-04
CVE-2022-23825 json Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to informa... 6.5 - MEDIUM 2022-07-14 2024-02-04
CVE-2022-21166 json Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user... 5.5 - MEDIUM 2022-06-15 2023-11-07
CVE-2022-21125 json Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentia... 5.5 - MEDIUM 2022-06-15 2023-11-07
CVE-2022-21123 json Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially e... 5.5 - MEDIUM 2022-06-15 2023-11-07

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
VmwareEsxi7.0.0
Operating
System
VmwareEsxi7.0.0
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
Operating
System
VmwareEsxi6.7
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report