Show filters
59 Total Results
Displaying 51-59 of 59
Sort by:
Attacker Value
Unknown
CVE-2013-2176
Disclosure Date: August 28, 2013 (last updated October 05, 2023)
Unquoted Windows search path vulnerability in the Red Hat Enterprise Virtualization Application Provisioning Tool (RHEV-APT) in the rhev-guest-tools-iso package 3.2 allows local users to gain privileges via a Trojan horse application.
0
Attacker Value
Unknown
CVE-2013-4236
Disclosure Date: August 19, 2013 (last updated November 08, 2023)
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via invalid XML characters in a guest agent response. NOTE: this issue is due to an incomplete fix for CVE-2013-0167.
0
Attacker Value
Unknown
CVE-2013-0167
Disclosure Date: August 19, 2013 (last updated October 05, 2023)
VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields."
0
Attacker Value
Unknown
CVE-2013-2144
Disclosure Date: July 03, 2013 (last updated October 05, 2023)
Red Hat Enterprise Virtualization Manager (RHEVM) before 3.2 does not properly check permissions for the target storage domain, which allows attackers to cause a denial of service (disk space consumption) by cloning a VM from a snapshot.
0
Attacker Value
Unknown
CVE-2012-6115
Disclosure Date: March 12, 2013 (last updated October 05, 2023)
The domain management tool (rhevm-manage-domains) in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier, when the validate action is enabled, logs the administrative password to a world-readable log file, which allows local users to obtain sensitive information by reading this file.
0
Attacker Value
Unknown
CVE-2013-0168
Disclosure Date: March 12, 2013 (last updated October 05, 2023)
The MoveDisk command in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier does not properly check permissions on storage domains, which allows remote authenticated storage admins to cause a denial of service (free space consumption of other storage domains) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2012-6075
Disclosure Date: February 13, 2013 (last updated October 05, 2023)
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
0
Attacker Value
Unknown
CVE-2013-1591
Disclosure Date: January 31, 2013 (last updated February 16, 2024)
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
0
Attacker Value
Unknown
CVE-2012-3515
Disclosure Date: November 23, 2012 (last updated October 05, 2023)
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
0