Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse leap 15.0 vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2019-2863
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
7.5
CVSSv3
CVE-2019-2865
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where O...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
8.2
CVSSv3
CVE-2019-2866
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Ora...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
3.3
CVSSv3
CVE-2019-2873
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
3.3
CVSSv3
CVE-2019-2874
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
3.3
CVSSv3
CVE-2019-2875
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
3.3
CVSSv3
CVE-2019-2876
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
5.5
CVSSv3
CVE-2019-2877
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
7.5
CVSSv3
CVE-2019-2864
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where O...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
8.2
CVSSv3
CVE-2019-2867
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Ora...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »