Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
virtualization vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2015-2581
Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5.1 and 5.2 allows remote malicious users to affect confidentiality and availability via unknown vectors related to JServer.
Oracle Virtualization 5.1
Oracle Virtualization 5.2
4.3
CVSSv2
CVE-2013-3782
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization 4.6 before 4.63 and 4.7 before 4.71 allows remote malicious users to affect integrity via unknown vectors related to Web UI.
Oracle Virtualization 4.6
Oracle Virtualization 4.7
5
CVSSv2
CVE-2015-5201
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x prior to 7-7.2-20151119.0 and 6-6.x prior to 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization prior to 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended a...
Redhat Enterprise Virtualization Hypervisor
Redhat Enterprise Virtualization
5.1
CVSSv2
CVE-2014-0419
Unspecified vulnerability in the Oracle Secure Global Desktop (SGD) component in Oracle Virtualization SGD prior to 4.63 with December 2013 PSU, 4.71, 5.0 with December 2013 PSU, and 5.10 allows remote malicious users to affect confidentiality, integrity, and availability via unk...
Oracle Virtualization Secure Global Desktop 5.10
Oracle Virtualization Secure Global Desktop 4.63
Oracle Virtualization Secure Global Desktop 4.71
Oracle Virtualization Secure Global Desktop 5.0
2.7
CVSSv2
CVE-2013-0167
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Virtualization 3.2
7.8
CVSSv2
CVE-2015-2121
HP Network Virtualization for LoadRunner and Performance Center 8.61 and 11.52 allows remote malicious users to read arbitrary files via a crafted filename in a URL to the (1) HttpServlet or (2) NetworkEditorController component, aka ZDI-CAN-2569.
Hp Network Virtualization 8.61
Hp Network Virtualization 11.52
7.2
CVSSv2
CVE-2013-2151
Unquoted Windows search path vulnerability in Red Hat Enterprise Virtualization (RHEV) 3 and 3.2 allows local users to gain privileges via a crafted application in an unspecified folder.
Redhat Enterprise Virtualization 3.2
Redhat Enterprise Virtualization 3.0
9
CVSSv2
CVE-2018-5428
The version control adapters component of TIBCO Data Virtualization (formerly known as Cisco Information Server) contains vulnerabilities that may allow for arbitrary command execution. Affected releases are TIBCO Data Virtualization: 7.0.5; 7.0.6.
Tibco Data Virtualization 7.0.5
Tibco Data Virtualization 7.0.6
6.8
CVSSv2
CVE-2010-2793
Race condition in the SPICE (aka spice-activex) plug-in for Internet Explorer in Red Hat Enterprise Virtualization (RHEV) Manager prior to 2.2.4 allows local users to create a certain named pipe, and consequently gain privileges, via vectors involving knowledge of the name of thi...
Redhat Enterprise Virtualization Manager 2.2
Redhat Enterprise Virtualization Manager 2.1
Redhat Spice-activex -
Redhat Enterprise Virtualization Manager
7.5
CVSSv2
CVE-2013-3779
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 before 4.71 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
Oracle Vm Virtualbox 4.61
Oracle Vm Virtualbox 4.62
Oracle Virtualization 4.7
Oracle Vm Virtualbox 4.6
Oracle Virtualization 4.62
Oracle Virtualization 4.63
Oracle Virtualization 4.6
Oracle Virtualization 4.61
Oracle Vm Virtualbox 4.63
Oracle Vm Virtualbox 4.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »