CVE-2009-3552
- EPSS 0.19%
- Veröffentlicht 09.11.2019 03:15:10
- Zuletzt bearbeitet 21.11.2024 01:07:38
In RHEV-M VDC 2.2.0, it was found that the SSL certificate was not verified when using the client-side Red Hat Enterprise Virtualization Manager interface (a Windows Presentation Foundation (WPF) XAML browser application) to connect to the Red Hat En...
CVE-2018-8897
- EPSS 23.21%
- Veröffentlicht 08.05.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:14:33
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that ...
CVE-2012-5516
- EPSS 0.07%
- Veröffentlicht 04.01.2013 22:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when moving disks between storage domains, does not properly wipe-after-delete, which prevents disks from being securely deleted and might allow local users to obtain sensitive informatio...
CVE-2012-0860
- EPSS 0.05%
- Veröffentlicht 04.01.2013 22:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /t...
CVE-2010-2793
- EPSS 0.23%
- Veröffentlicht 08.12.2010 18:00:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Race condition in the SPICE (aka spice-activex) plug-in for Internet Explorer in Red Hat Enterprise Virtualization (RHEV) Manager before 2.2.4 allows local users to create a certain named pipe, and consequently gain privileges, via vectors involving ...
CVE-2010-2224
- EPSS 0.07%
- Veröffentlicht 24.06.2010 17:30:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
The snapshot merging functionality in Red Hat Enterprise Virtualization Manager (aka RHEV-M) before 2.2 does not properly pass the postzero parameter during operations on deleted volumes, which allows guest OS users to obtain sensitive information by...