cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-20884,https://securityvulnerability.io/vulnerability/CVE-2023-20884,,VMware Workspace ONE Access and VMware Identity Manager contain an insecure redirect vulnerability. An unauthenticated malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure.,Vmware,"VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware Cloud Foundation (Cloud Foundation)",6.1,MEDIUM,0.0005600000149570405,false,false,false,false,,false,false,2023-05-30T16:15:00.000Z,0 CVE-2022-31701,https://securityvulnerability.io/vulnerability/CVE-2022-31701,,VMware Workspace ONE Access and Identity Manager contain a broken authentication vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.,Vmware,"Vmware Workspace One Access (access), Vmware Identity Manager (vidm)",5.3,MEDIUM,0.0007200000109151006,false,false,false,false,,false,false,2022-12-14T00:00:00.000Z,0 CVE-2022-31700,https://securityvulnerability.io/vulnerability/CVE-2022-31700,,VMware Workspace ONE Access and Identity Manager contain an authenticated remote code execution vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.,Vmware,"Vmware Workspace One Access (access), Vmware Identity Manager (vidm)",7.2,HIGH,0.002309999894350767,false,false,false,false,,false,false,2022-12-14T00:00:00.000Z,0 CVE-2022-31657,https://securityvulnerability.io/vulnerability/CVE-2022-31657,,VMware Workspace ONE Access and Identity Manager contain a URL injection vulnerability. A malicious actor with network access may be able to redirect an authenticated user to an arbitrary domain.,Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",9.8,CRITICAL,0.002139999996870756,false,false,false,false,,false,false,2022-08-05T15:07:39.000Z,0 CVE-2022-31656,https://securityvulnerability.io/vulnerability/CVE-2022-31656,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",9.8,CRITICAL,0.3905799984931946,false,false,false,false,,false,false,2022-08-05T15:07:24.000Z,0 CVE-2022-31658,https://securityvulnerability.io/vulnerability/CVE-2022-31658,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.2,HIGH,0.0025400000158697367,false,false,false,false,,false,false,2022-08-05T15:07:10.000Z,0 CVE-2022-31661,https://securityvulnerability.io/vulnerability/CVE-2022-31661,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two privilege escalation vulnerabilities. A malicious actor with local access can escalate privileges to 'root'.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2022-08-05T15:06:55.000Z,0 CVE-2022-31659,https://securityvulnerability.io/vulnerability/CVE-2022-31659,,VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.,Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.2,HIGH,0.0025400000158697367,false,false,false,false,,false,false,2022-08-05T15:06:41.000Z,0 CVE-2022-31663,https://securityvulnerability.io/vulnerability/CVE-2022-31663,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a reflected cross-site scripting (XSS) vulnerability. Due to improper user input sanitization, a malicious actor with some user interaction may be able to inject javascript code in the target user's window.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",6.1,MEDIUM,0.0007200000109151006,false,false,false,false,,false,false,2022-08-05T15:06:30.000Z,0 CVE-2022-31664,https://securityvulnerability.io/vulnerability/CVE-2022-31664,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2022-08-05T15:06:15.000Z,0 CVE-2022-31665,https://securityvulnerability.io/vulnerability/CVE-2022-31665,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.2,HIGH,0.0025400000158697367,false,false,false,false,,false,false,2022-08-05T15:06:00.000Z,0 CVE-2022-31660,https://securityvulnerability.io/vulnerability/CVE-2022-31660,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.8,HIGH,0.0010000000474974513,false,false,false,false,,false,false,2022-08-05T15:05:45.000Z,0 CVE-2022-31662,https://securityvulnerability.io/vulnerability/CVE-2022-31662,,"VMware Workspace ONE Access, Identity Manager, Connectors and vRealize Automation contain a path traversal vulnerability. A malicious actor with network access may be able to access arbitrary files.",Vmware,"Vmware Workspace One Access, Access Connector, Identity Manager, Vidm Connector And Vrealize Automation",7.5,HIGH,0.0016299999551847577,false,false,false,false,,false,false,2022-08-05T15:05:34.000Z,0 CVE-2022-22972,https://securityvulnerability.io/vulnerability/CVE-2022-22972,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",9.8,CRITICAL,0.4040899872779846,false,false,false,true,true,false,false,2022-05-20T20:18:39.000Z,0 CVE-2022-22973,https://securityvulnerability.io/vulnerability/CVE-2022-22973,,VMware Workspace ONE Access and Identity Manager contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.,Vmware,Vmware Workspace One Access And Identity Manager.,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2022-05-20T20:18:27.000Z,0 CVE-2022-22958,https://securityvulnerability.io/vulnerability/CVE-2022-22958,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation.",7.2,HIGH,0.0025400000158697367,false,false,false,false,,false,false,2022-04-13T17:05:58.000Z,0 CVE-2022-22955,https://securityvulnerability.io/vulnerability/CVE-2022-22955,,VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.,Vmware,Vmware Workspace One Access,9.8,CRITICAL,0.0024300001095980406,false,false,false,false,,false,false,2022-04-13T17:05:58.000Z,0 CVE-2022-22961,https://securityvulnerability.io/vulnerability/CVE-2022-22961,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an information disclosure vulnerability due to returning excess information. A malicious actor with remote access may leak the hostname of the target system. Successful exploitation of this issue can lead to targeting victims.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",5.3,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2022-04-13T17:05:56.000Z,0 CVE-2022-22959,https://securityvulnerability.io/vulnerability/CVE-2022-22959,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. A malicious actor can trick a user through a cross site request forgery to unintentionally validate a malicious JDBC URI.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",4.3,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2022-04-13T17:05:54.000Z,0 CVE-2022-22960,https://securityvulnerability.io/vulnerability/CVE-2022-22960,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation",7.8,HIGH,0.001769999973475933,true,false,false,true,,false,false,2022-04-13T00:00:00.000Z,0 CVE-2022-22957,https://securityvulnerability.io/vulnerability/CVE-2022-22957,,"VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution.",Vmware,"Vmware Workspace One Access, Identity Manager And Vrealize Automation.",7.2,HIGH,0.013369999825954437,false,false,false,false,,false,false,2022-04-13T00:00:00.000Z,0 CVE-2022-22956,https://securityvulnerability.io/vulnerability/CVE-2022-22956,,VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.,Vmware,Vmware Workspace One Access,9.8,CRITICAL,0.003019999945536256,false,false,false,false,,false,false,2022-04-13T00:00:00.000Z,0 CVE-2022-22954,https://securityvulnerability.io/vulnerability/CVE-2022-22954,,VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.,Vmware,Vmware Workspace One Access And Identity Manager,9.8,CRITICAL,0.9748899936676025,true,false,true,true,true,false,false,2022-04-11T19:37:39.000Z,0 CVE-2021-22056,https://securityvulnerability.io/vulnerability/CVE-2021-22056,,"VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 and Identity Manager 3.3.5, 3.3.4, and 3.3.3 contain an SSRF vulnerability. A malicious actor with network access may be able to make HTTP requests to arbitrary origins and read the full response.",Vmware,Vmware Workspace One Access And Identity Manager,7.5,HIGH,0.0018500000005587935,false,false,false,false,,false,false,2021-12-20T20:08:27.000Z,0 CVE-2021-22057,https://securityvulnerability.io/vulnerability/CVE-2021-22057,,"VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 contain an authentication bypass vulnerability. A malicious actor, who has successfully provided first-factor authentication, may be able to obtain second-factor authentication provided by VMware Verify.",Vmware,Vmware Workspace One Access,8.8,HIGH,0.0010300000431016088,false,false,false,false,,false,false,2021-12-20T20:08:26.000Z,0