Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vm virtualbox vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2013-3779
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 before 4.71 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
Oracle Vm Virtualbox 4.61
Oracle Vm Virtualbox 4.62
Oracle Virtualization 4.7
Oracle Vm Virtualbox 4.6
Oracle Virtualization 4.62
Oracle Virtualization 4.63
Oracle Virtualization 4.6
Oracle Virtualization 4.61
Oracle Vm Virtualbox 4.63
Oracle Vm Virtualbox 4.7
2.4
CVSSv2
CVE-2013-0420
Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has n...
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Oracle Virtualization 4.0
Oracle Vm Virtualbox 4.0
Oracle Vm Virtualbox 4.1.0
Oracle Virtualization 4.1
Oracle Virtualization 4.2
Oracle Vm Virtualbox 4.2.0
2.1
CVSSv2
CVE-2019-2574
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.28 and before 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracl...
Oracle Vm Virtualbox
4.4
CVSSv2
CVE-2018-2685
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
4.4
CVSSv2
CVE-2018-2686
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
4.4
CVSSv2
CVE-2018-2687
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
4.4
CVSSv2
CVE-2018-2688
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
4.4
CVSSv2
CVE-2018-2689
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
4.4
CVSSv2
CVE-2018-2690
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
4.1
CVSSv2
CVE-2018-2693
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Guest Additions). Supported versions that are affected are before 5.1.32 and before 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure ...
Oracle Vm Virtualbox
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »