Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
leap vulnerabilities and exploits
(subscribe to this query)
4.7
CVSSv2
CVE-2020-14648
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14649
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.7
CVSSv2
CVE-2020-14650
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.7
CVSSv2
CVE-2020-14673
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14674
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14675
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14676
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14677
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.7
CVSSv2
CVE-2020-14694
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.7
CVSSv2
CVE-2020-14695
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »