Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
horizon vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2012-3542
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote malicious users to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier wa...
Openstack Essex 2012.1
Openstack Horizon Folsom-3
3.6
CVSSv2
CVE-2020-3986
VMware Workstation (15.x) and Horizon Client for Windows (5.x prior to 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMF Parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial...
Vmware Horizon Client
Vmware Workstation Player
Vmware Workstation Pro
2.1
CVSSv2
CVE-2020-3989
VMware Workstation (15.x) and Horizon Client for Windows (5.x prior to 5.4.4) contain a denial of service vulnerability due to an out-of-bounds write issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue ...
Vmware Horizon Client
Vmware Workstation Player
Vmware Workstation Pro
3.6
CVSSv2
CVE-2020-3987
VMware Workstation (15.x) and Horizon Client for Windows (5.x prior to 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMR STRETCHDIBITS parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to cr...
Vmware Horizon Client
Vmware Workstation Player
Vmware Workstation Pro
3.6
CVSSv2
CVE-2020-3988
VMware Workstation (15.x) and Horizon Client for Windows (5.x prior to 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (JPEG2000 parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a pa...
Vmware Horizon Client
Vmware Workstation Player
Vmware Workstation Pro
2.1
CVSSv2
CVE-2020-3990
VMware Workstation (15.x) and Horizon Client for Windows (5.x prior to 5.4.4) contain an information disclosure vulnerability due to an integer overflow issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this iss...
Vmware Horizon Client
Vmware Workstation Player
Vmware Workstation Pro
5
CVSSv2
CVE-2014-8124
OpenStack Dashboard (Horizon) prior to 2014.1.3 and 2014.2.x prior to 2014.2.1 does not properly handle session records when using a db or memcached session engine, which allows remote malicious users to cause a denial of service via a large number of requests to the login page.
Openstack Horizon
Fedoraproject Fedora 21
Opensuse Opensuse 13.1
Oracle Solaris 11.2
7.2
CVSSv2
CVE-2017-4946
The VMware V4H and V4PA desktop agents (6.x prior to 6.5.1) contain a privilege escalation vulnerability. Successful exploitation of this issue could result in a low privileged windows user escalating their privileges to SYSTEM.
Vmware Vrealize Operations For Published Applications
Vmware Vrealize Operations For Horizon
4.9
CVSSv2
CVE-2012-3426
OpenStack Keystone prior to 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chai...
Openstack Essex
Openstack Keystone 2012.1.1
Openstack Keystone 2012.1
Openstack Horizon Folsom-1
2.1
CVSSv2
CVE-2012-5476
Within the RHOS Essex Preview (2012.2) of the OpenStack dashboard package, the file /etc/quantum/quantum.conf is world readable which exposes the admin password and token value.
Openstack Horizon 2012.2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »