cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-38817,https://securityvulnerability.io/vulnerability/CVE-2024-38817,VMware NSX Injection Vulnerability Allows Root Access,"VMware NSX contains a command injection vulnerability.  A malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.",VMware,"Vmware Nsx, Vmware Cloud Foundation",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-09T20:15:00.000Z,0 CVE-2022-31678,https://securityvulnerability.io/vulnerability/CVE-2022-31678,XML External Entity Vulnerability in VMware Cloud Foundation NSX-V,"VMware Cloud Foundation (specifically the NSX-V component) is susceptible to an XML External Entity (XXE) vulnerability, which may allow remote users to exploit the issue. This vulnerability can lead to conditions that enable denial-of-service or unintended disclosure of sensitive information from affected systems. It is crucial for users operating VCF 3.x with NSX-V deployed to review security advisories and apply necessary patches to mitigate any potential threats.",Vmware,Vmware Cloud Foundation (nsx-v),9.1,CRITICAL,0.0014700000174343586,false,,false,false,false,,,false,false,,2022-10-28T00:00:00.000Z,0 CVE-2022-22945,https://securityvulnerability.io/vulnerability/CVE-2022-22945,CLI Shell Injection Vulnerability in VMware NSX Edge,The vulnerability in VMware NSX Edge allows an authenticated attacker with SSH access to execute arbitrary commands with root privileges on the underlying operating system. This poses a significant risk as it can lead to unauthorized access and manipulation of the system.,Vmware,Vmware Nsx Edge,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-16T16:38:35.000Z,0 CVE-2021-21981,https://securityvulnerability.io/vulnerability/CVE-2021-21981,Privilege Escalation Issue in VMware NSX-T Due to RBAC Misconfiguration,"VMware NSX-T has a vulnerability related to privilege escalation that stems from a misconfiguration in Role-Based Access Control (RBAC). This flaw allows attackers who have a local guest user account to escalate their privileges beyond the level of access they are assigned. By successfully exploiting this vulnerability, an attacker could potentially manipulate security roles, leading to unauthorized access within the NSX-T environment. This poses significant security risks, especially in environments with sensitive information.",Vmware,Vmware Nsx-t,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-04-19T14:37:21.000Z,0 CVE-2020-3993,https://securityvulnerability.io/vulnerability/CVE-2020-3993,Security Vulnerability in VMware NSX-T Products,"VMware NSX-T versions prior to 3.0.2 and 2.5.2.2.0 are susceptible to a vulnerability that allows a KVM host to download and install unauthorized packages from the NSX manager. This flaw can potentially be exploited by an attacker positioned to perform a man-in-the-middle (MITM) attack, enabling them to compromise the transport node and put the security of the environment at risk.",Vmware,Vmware Nsx-t,5.9,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2020-10-20T16:11:19.000Z,0