Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle vm virtualbox vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-2011-2305
Unspecified vulnerability in Oracle VM VirtualBox 4.0 allows local users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Vm Virtualbox 3.0
Oracle Vm Virtualbox 3.1
Oracle Vm Virtualbox 3.2
Oracle Vm Virtualbox 4.0
7.5
CVSSv2
CVE-2013-3779
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 before 4.71 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
Oracle Vm Virtualbox 4.61
Oracle Vm Virtualbox 4.62
Oracle Virtualization 4.7
Oracle Vm Virtualbox 4.6
Oracle Virtualization 4.62
Oracle Virtualization 4.63
Oracle Virtualization 4.6
Oracle Virtualization 4.61
Oracle Vm Virtualbox 4.63
Oracle Vm Virtualbox 4.7
4.4
CVSSv2
CVE-2019-2520
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Ora...
Oracle Vm Virtualbox
Oracle Vm Virtualbox 6.0.0
4.6
CVSSv2
CVE-2019-2552
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
2.1
CVSSv2
CVE-2019-2501
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
2.1
CVSSv2
CVE-2019-2446
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
2.1
CVSSv2
CVE-2019-2505
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
2.1
CVSSv2
CVE-2019-2448
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
2.1
CVSSv2
CVE-2019-2450
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
2.1
CVSSv2
CVE-2019-2451
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.24 and before 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox 6.0.0
Oracle Vm Virtualbox
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »