Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
virtual machine vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-26254
Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
1 Article
10
CVSSv2
CVE-2013-0809
Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and previous versions, 6 Update 41 and previous versions, and 5.0 Update 40 and previous versions allows remote malicious users to execute arbitrary code vi...
Sun Jre 1.6.0
Oracle Jre 1.6.0
Oracle Jre
Sun Jdk 1.6.0
Oracle Jdk 1.6.0
Oracle Jdk
Sun Jre 1.5.0
Oracle Jre 1.5.0
Sun Jdk 1.5.0
Oracle Jdk 1.5.0
Oracle Jre 1.7.0
Oracle Jdk 1.7.0
1.9
CVSSv2
CVE-2018-12437
LibTomCrypt up to and including 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same p...
Libtom Libtomcrypt
Linaro Op-tee
6.5
CVSSv2
CVE-2019-14418
An issue exists in Veritas Resiliency Platform (VRP) prior to 3.4 HF1. When uploading an application bundle, a directory traversal vulnerability allows a VRP user with sufficient privileges to overwrite any file in the VRP virtual machine. A malicious VRP user could use this to r...
Veritas Resiliency Platform 2.2
Veritas Resiliency Platform 3.3
Veritas Resiliency Platform 3.3.1
Veritas Resiliency Platform 3.2
Veritas Resiliency Platform 3.1
Veritas Resiliency Platform 3.0
Veritas Resiliency Platform 2.1
Veritas Resiliency Platform 2.0
Veritas Resiliency Platform 1.2
Veritas Resiliency Platform 3.3.2
5
CVSSv2
CVE-2013-5531
Cisco Identity Services Engine (ISE) 1.x prior to 1.1.1 allows remote malicious users to bypass authentication, and read support-bundle configuration and credentials data, via a crafted session on TCP port 443, aka Bug ID CSCty20405.
Cisco Identity Services Engine Software 1.1
Cisco Identity Services Engine Software 1.0
2.6
CVSSv2
CVE-2006-3547
EMC VMware Player allows user-assisted malicious users to cause a denial of service (unrecoverable application failure) via a long value of the ide1:0.fileName parameter in the .vmx file of a virtual machine. NOTE: third parties have disputed this issue, saying that write access ...
Vmware Player
1.9
CVSSv2
CVE-2018-12440
BoringSSL through 2018-06-14 allows a memory-cache side-channel attack on DSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a DSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Google Boringssl
4
CVSSv2
CVE-2019-5532
VMware vCenter Server (6.7.x before 6.7 U3, 6.5 before 6.5 U3 and 6.0 before 6.0 U3j) contains an information disclosure vulnerability due to the logging of credentials in plain-text for virtual machines deployed through OVF. A malicious user with access to the log files containi...
Vmware Vcenter Server 6.0
Vmware Vcenter Server 6.7
Vmware Vcenter Server 6.5
4.7
CVSSv2
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel prior to 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
Linux Linux Kernel 3.3
Linux Linux Kernel
7.4
CVSSv2
CVE-2014-0049
Buffer overflow in the complete_emulated_mmio function in arch/x86/kvm/x86.c in the Linux kernel prior to 3.13.6 allows guest OS users to execute arbitrary code on the host OS by leveraging a loop that triggers an invalid memory copy affecting certain cancel_work_item data.
Linux Linux Kernel
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »