Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse leap 15.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-2865
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where O...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
8.8
CVSSv3
CVE-2019-2859
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
7.5
CVSSv3
CVE-2019-2864
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where O...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
8.2
CVSSv3
CVE-2019-2867
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Ora...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
3.3
CVSSv3
CVE-2019-2874
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
3.3
CVSSv3
CVE-2019-2876
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.2.32 and before 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
Opensuse Leap 15.0
Opensuse Leap 15.1
6.4
CVSSv3
CVE-2020-0305
In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-15346...
Google Android 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
5.3
CVSSv3
CVE-2020-14695
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
5.3
CVSSv3
CVE-2020-14700
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
6
CVSSv3
CVE-2020-14703
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »