Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vm virtualbox vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-3779
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 before 4.71 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
Oracle Vm Virtualbox 4.61
Oracle Vm Virtualbox 4.62
Oracle Virtualization 4.7
Oracle Vm Virtualbox 4.6
Oracle Virtualization 4.62
Oracle Virtualization 4.63
Oracle Virtualization 4.6
Oracle Virtualization 4.61
Oracle Vm Virtualbox 4.63
Oracle Vm Virtualbox 4.7
NA
CVE-2013-0420
Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has n...
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Oracle Virtualization 4.0
Oracle Vm Virtualbox 4.0
Oracle Vm Virtualbox 4.1.0
Oracle Virtualization 4.1
Oracle Virtualization 4.2
Oracle Vm Virtualbox 4.2.0
8.2
CVSSv3
CVE-2021-2409
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox exec...
Oracle Vm Virtualbox
8.8
CVSSv3
CVE-2018-2842
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.36 and before 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Orac...
Oracle Vm Virtualbox
8.4
CVSSv3
CVE-2017-3587
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are before 5.0.38 and before 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infr...
Oracle Vm Virtualbox
1 EDB exploit
7.3
CVSSv3
CVE-2017-10408
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is before 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...
Oracle Vm Virtualbox
5
CVSSv3
CVE-2017-10428
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is before 5.1.30. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualB...
Oracle Vm Virtualbox
7.1
CVSSv3
CVE-2021-2286
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox exec...
Oracle Vm Virtualbox
7.1
CVSSv3
CVE-2021-2287
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox exec...
Oracle Vm Virtualbox
5.3
CVSSv3
CVE-2021-2296
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is before 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox ex...
Oracle Vm Virtualbox
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »