Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown

CVE-2016-6341

Disclosure Date: April 20, 2017 (last updated November 26, 2024)
oVirt Engine before 4.0.3 does not include DWH_DB_PASSWORD in the list of keys to hide in log files, which allows local users to obtain sensitive password information by reading engine log files.
0
Attacker Value
Unknown

CVE-2014-0151

Disclosure Date: February 13, 2015 (last updated October 05, 2023)
Cross-site request forgery (CSRF) vulnerability in oVirt Engine before 3.5.0 beta2 allows remote attackers to hijack the authentication of users for requests that perform unspecified actions via a REST API request.
0
Attacker Value
Unknown

CVE-2014-0154

Disclosure Date: February 13, 2015 (last updated October 05, 2023)
oVirt Engine before 3.5.0 does not include the HTTPOnly flag in a Set-Cookie header for the session IDs, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
0
Attacker Value
Unknown

CVE-2014-0153

Disclosure Date: September 08, 2014 (last updated October 05, 2023)
The REST API in oVirt 3.4.0 and earlier stores session IDs in HTML5 local storage, which allows remote attackers to obtain sensitive information via a crafted web page.
0
Attacker Value
Unknown

CVE-2014-0152

Disclosure Date: September 08, 2014 (last updated October 05, 2023)
Session fixation vulnerability in the web admin interface in oVirt 3.4.0 and earlier allows remote attackers to hijack web sessions via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-0036

Disclosure Date: April 17, 2014 (last updated October 05, 2023)
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-3533

Disclosure Date: August 31, 2012 (last updated October 05, 2023)
The python SDK before 3.1.0.6 and CLI before 3.1.0.8 for oVirt 3.1 does not check the server SSL certificate against the client keys, which allows remote attackers to spoof a server via a man-in-the-middle (MITM) attack.
0