Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vm virtualbox vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-3779
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 before 4.71 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
Oracle Vm Virtualbox 4.61
Oracle Vm Virtualbox 4.62
Oracle Virtualization 4.7
Oracle Vm Virtualbox 4.6
Oracle Virtualization 4.62
Oracle Virtualization 4.63
Oracle Virtualization 4.6
Oracle Virtualization 4.61
Oracle Vm Virtualbox 4.63
Oracle Vm Virtualbox 4.7
NA
CVE-2013-0420
Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has n...
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Oracle Virtualization 4.0
Oracle Vm Virtualbox 4.0
Oracle Vm Virtualbox 4.1.0
Oracle Virtualization 4.1
Oracle Virtualization 4.2
Oracle Vm Virtualbox 4.2.0
7.8
CVSSv3
CVE-2016-5501
Unspecified vulnerability in the Oracle VM VirtualBox component prior to 5.0.28 and 5.1.x prior to 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5538.
Oracle Vm Virtualbox
4.4
CVSSv3
CVE-2021-35542
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.28. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox exec...
Oracle Vm Virtualbox
8.1
CVSSv3
CVE-2022-39426
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are before 6.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox...
Oracle Vm Virtualbox
8.5
CVSSv3
CVE-2017-3558
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.0.38 and before 5.1.20. Easily "exploitable" vulnerability allows unauthenticated attacker with logon to the infrastructu...
Oracle Vm Virtualbox
1 EDB exploit
2 Github repositories
8.8
CVSSv3
CVE-2017-3561
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.0.38 and before 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructur...
Oracle Vm Virtualbox
1 EDB exploit
8.8
CVSSv3
CVE-2017-3563
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.0.38 and before 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructur...
Oracle Vm Virtualbox
1 EDB exploit
4.4
CVSSv3
CVE-2021-2073
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox exec...
Oracle Vm Virtualbox
8.2
CVSSv3
CVE-2021-2074
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox exec...
Oracle Vm Virtualbox
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »