Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat virtualization 3.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-0167
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Virtualization 3.2
NA
CVE-2013-2151
Unquoted Windows search path vulnerability in Red Hat Enterprise Virtualization (RHEV) 3 and 3.2 allows local users to gain privileges via a crafted application in an unspecified folder.
Redhat Enterprise Virtualization 3.2
Redhat Enterprise Virtualization 3.0
NA
CVE-2012-6115
The domain management tool (rhevm-manage-domains) in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and previous versions, when the validate action is enabled, logs the administrative password to a world-readable log file, which allows local users to obtain sensitive info...
Redhat Enterprise Virtualization Manager 2.1
Redhat Enterprise Virtualization Manager
Redhat Enterprise Virtualization Manager 2.2.3
Redhat Enterprise Virtualization Manager 2.2
Redhat Enterprise Virtualization Manager 3.0
NA
CVE-2013-2144
Red Hat Enterprise Virtualization Manager (RHEVM) prior to 3.2 does not properly check permissions for the target storage domain, which allows malicious users to cause a denial of service (disk space consumption) by cloning a VM from a snapshot.
Redhat Enterprise Virtualization Manager 2.2
Redhat Enterprise Virtualization Manager 2.1
Redhat Enterprise Virtualization Manager
Redhat Enterprise Virtualization Manager 3.0
Redhat Enterprise Virtualization Manager 2.2.3
NA
CVE-2013-0168
The MoveDisk command in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and previous versions does not properly check permissions on storage domains, which allows remote authenticated storage admins to cause a denial of service (free space consumption of other storage doma...
Redhat Enterprise Virtualization Manager 3.0
Redhat Enterprise Virtualization Manager 2.2.3
Redhat Enterprise Virtualization Manager
Redhat Enterprise Virtualization Manager 2.2
Redhat Enterprise Virtualization Manager 2.1
6.5
CVSSv3
CVE-2015-1780
oVirt users with MANIPULATE_STORAGE_DOMAIN permissions can attach a storage domain to any data-center
Redhat Ovirt-engine -
Redhat Virtualization 3.0
6.1
CVSSv3
CVE-2013-0186
Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Redhat Cloudforms 3.0
Redhat Manageiq Enterprise Virtualization Manager -
5.9
CVSSv3
CVE-2014-8167
vdsm and vdsclient does not validate certficate hostname from another vdsm which could facilitate a man-in-the-middle attack
Redhat Enterprise Virtualization 3.0
Redhat Vdsclient -
Redhat Virtual Desktop Server Manager -
7.5
CVSSv3
CVE-2017-7539
An assertion-failure flaw was found in Qemu prior to 2.10.1, in the Network Block Device (NBD) server's initial connection negotiation, where the I/O coroutine was undefined. This could crash the qemu-nbd server if a client sent unexpected data during connection negotiation....
Qemu Qemu
Redhat Openstack 7.0
Redhat Openstack 6.0
Redhat Virtualization 4.0
Redhat Openstack 10
Redhat Openstack 9
Redhat Openstack 8
Redhat Openstack 11
Redhat Virtualization 3.0
9.8
CVSSv3
CVE-2013-1591
Stack-based buffer overflow in libpixman, as used in Pale Moon prior to 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pi...
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Linux 6.0
Palemoon Pale Moon
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »