<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution in VMware vCenter™ Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974648#M48595</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Hi,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I understand your point but what I'm saying it's that individual personal opinions (born of equally personal experiences) are not enough to determine whether or not a product version is suitable to be used in a production context like yours which is certainly different from mine or someone else's. Nothing more nothing less.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Regards,&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ferdinando&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jun 2023 17:53:23 GMT</pubDate>
    <dc:creator>Kinnison</dc:creator>
    <dc:date>2023-06-26T17:53:23Z</dc:date>
    <item>
      <title>Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974605#M48590</link>
      <description>&lt;P&gt;We are on 7.0 u3l. Per the links below we need to upgrade to 7.0 u3m. With 7.0 u3m just being released, is it stable and ready for production or do we need to let it bake longer before making the upgrade? I am always leery with security patches/upgrade that have been recently released.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.vmware.com/security/advisories/VMSA-2023-0014.html" target="_blank"&gt;https://www.vmware.com/security/advisories/VMSA-2023-0014.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-vmware-products-could-allow-for-arbitrary-code-execution_2023-069" target="_blank"&gt;https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-vmware-products-could-allow-for-arbitrary-code-execution_2023-069&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SYSTEMS AFFECTED:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;VMware - VMware vCenter Server (vCenter Server) versions prior to 8.0 U1b&lt;/LI&gt;&lt;LI&gt;VMware - VMware vCenter Server (vCenter Server) versions prior to 7.0 u3m&lt;/LI&gt;&lt;LI&gt;VMware - VMware Cloud Foundation (vCenter Server) versions prior to 7.0 U3m, 8.0 U1&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 26 Jun 2023 14:08:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974605#M48590</guid>
      <dc:creator>kpubmcc</dc:creator>
      <dc:date>2023-06-26T14:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974622#M48592</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I could be wrong but in my opinion it will be quite difficult that you will be able to find an unambiguous answer in the context of a forum. In the end it just depends on your / your company policies for handling information security related matter and consequently how to act and when.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Regards,&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ferdinando&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 15:30:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974622#M48592</guid>
      <dc:creator>Kinnison</dc:creator>
      <dc:date>2023-06-26T15:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974626#M48593</link>
      <description>&lt;LI-SPOILER&gt;really? I would expect that with the release of the vulnerability notice last week, several entities would be early adopters and have already applied the update to 7.0 u3m. I understand that it may take time for bugs to show up for that version, but I am asking for any word on initial stability issues since it has just been released.&lt;/LI-SPOILER&gt;</description>
      <pubDate>Mon, 26 Jun 2023 15:41:21 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974626#M48593</guid>
      <dc:creator>kpubmcc</dc:creator>
      <dc:date>2023-06-26T15:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974648#M48595</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I understand your point but what I'm saying it's that individual personal opinions (born of equally personal experiences) are not enough to determine whether or not a product version is suitable to be used in a production context like yours which is certainly different from mine or someone else's. Nothing more nothing less.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Regards,&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ferdinando&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 17:53:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Multiple-Vulnerabilities-in-VMware-Products-Could-Allow-for/m-p/2974648#M48595</guid>
      <dc:creator>Kinnison</dc:creator>
      <dc:date>2023-06-26T17:53:23Z</dc:date>
    </item>
  </channel>
</rss>

