Browse all 7 CVE security advisories affecting VMware Tanzu. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-5426 | Scheduler for TAS can transmit privileged UAA token in plaintext — Pivotal SchedulerCWE-319 | 9.8 | - | 2020-11-11 |
| CVE-2020-5425 | User Impersonation possible in Tanzu SSO — Single Sign-On for VMware TanzuCWE-287 | 8.2 | - | 2020-10-31 |
| CVE-2020-5419 | RabbitMQ arbitrary code execution using local binary planting — RabbitMQCWE-427 | 6.7 | - | 2020-08-31 |
| CVE-2020-5415 | Concourse's GitLab auth allows impersonation — ConcourseCWE-290 | 9.6 | - | 2020-08-12 |
| CVE-2020-5396 | JMX Insecure Default Configuration in GemFire — VMware Tanzu GemFire for VMsCWE-284 | 9.8 | - | 2020-07-31 |
| CVE-2020-5414 | App Autoscaler logs credentials — PCF AutoscalingCWE-200 | 6.1 | - | 2020-07-31 |
| CVE-2019-11286 | JMX Credential Deserialization in GemFire — VMware GemFireCWE-502 | 9.1 | - | 2020-07-31 |
This page lists every published CVE security advisory associated with VMware Tanzu. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.