Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
leap vulnerabilities and exploits
(subscribe to this query)
4.7
CVSSv2
CVE-2020-14698
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14699
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.7
CVSSv2
CVE-2020-14700
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.9
CVSSv2
CVE-2020-14703
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.9
CVSSv2
CVE-2020-14704
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
1.9
CVSSv2
CVE-2020-14707
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure ...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
1.9
CVSSv2
CVE-2020-14712
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure ...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
4.4
CVSSv2
CVE-2020-14713
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructu...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
2.1
CVSSv2
CVE-2020-14714
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
2.1
CVSSv2
CVE-2020-14715
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 5.2.44, before 6.0.24 and before 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure...
Oracle Vm Virtualbox
Opensuse Leap 15.1
Opensuse Leap 15.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »