CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “ovirt”

37 vulnerabilities found for “ovirt”

Page 1 of 2

CVE-2022-2806
MEDIUM5.5

It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev

sos_project / sos+1
Local
Published Sep 1, 2022
Page 1 of 2
CVE-2022-0207
MEDIUM4.7

A race condition was found in vdsm. Functionality to obfuscate sensitive values in log files that may lead to values being stored in clear text.

ovirt / vdsm+3
Local
Published Aug 26, 2022
CVE-2022-0330
HIGH7.8

A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.

linux / linux_kernel+65
Local
Published Mar 25, 2022
CVE-2022-0435
HIGH8.8

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.

linux / linux_kernel+51
Network
Published Mar 25, 2022
CVE-2021-45417
HIGH7.8

AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.

advanced_intrusion_detection_environment_project / advanced_intrusion_detection_environment+15
Local
Published Jan 20, 2022
CVE-2019-14514
CRITICAL9.8

An issue was discovered in Microvirt MEmu all versions prior to 7.0.2. A guest Android operating system inside the MEmu emulator contains a /system/bin/systemd binary that is run with root privileges on startup (this is unrelated to Red Hat's systemd init program, and is a closed-source proprietary tool that seems to be developed by Microvirt). This program opens TCP port 21509, presumably to receive installation-related commands from the host OS. Because everything after the installer:uninstall command is concatenated directly into a system() call, it is possible to execute arbitrary commands by supplying shell metacharacters.

microvirt / memu
Network
Published Feb 11, 2020
CVE-2014-0161
MEDIUM5.9

ovirt-engine-sdk-python before 3.4.0.7 and 3.5.0.4 does not verify that the hostname of the remote endpoint matches the Common Name (CN) or subjectAltName as specified by its x.509 certificate in a TLS/SSL session. This could allow man-in-the-middle attackers to spoof remote endpoints via an arbitrary valid certificate.

ovirt-engine-sdk-python_project / ovirt-engine-sdk-python+1
Network
Published Jan 2, 2020
CVE-2013-0293
HIGH7.8

oVirt Node: Lock screen accepts F2 to drop to shell causing privilege escalation

ovirt / node
Local
Published Dec 10, 2019
CVE-2012-4480
HIGH7.8

mom creates world-writable pid files in /var/run

ovirt / mom+2
Local
Published Dec 2, 2019
CVE-2012-5518
HIGH7.5

vdsm: certificate generation upon node creation allowing vdsm to start and serve requests from anyone who has a matching key (and certificate)

ovirt / vdsm
Network
Published Nov 25, 2019
CVE-2019-10194
MEDIUM5.5

Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts.

ovirt / ovirt+1
Local
Published Jul 11, 2019
CVE-2019-3831
MEDIUM6.7

A vulnerability was discovered in vdsm, version 4.19 through 4.30.3 and 4.30.5 through 4.30.8. The systemd_run function exposed to the vdsm system user could be abused to execute arbitrary commands as root.

ovirt / vdsm+2
Local
Published Mar 25, 2019
CVE-2019-3879
HIGH8.1

It was discovered that in the ovirt's REST API before version 4.3.2.1, RemoveDiskCommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. A user with low privileges (eg Basic Operations) could exploit this flaw to delete disks attached to guests.

ovirt / ovirt+1
Network
Published Mar 25, 2019
CVE-2018-20621
HIGH7.8

An issue was discovered in Microvirt MEmu 6.0.6. The MemuService.exe service binary is vulnerable to local privilege escalation through binary planting due to insecure permissions set at install time. This allows code to be run as NT AUTHORITY/SYSTEM.

microvirt / memu
Local
Published Mar 13, 2019
CVE-2018-10908
MEDIUM6.5

It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host.

ovirt / vdsm+1
Network
Published Aug 9, 2018
CVE-2017-15113
HIGH7.2

ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.

ovirt / ovirt+1
Local
Published Jul 27, 2018
CVE-2018-1072
MEDIUM5.0

ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.

ovirt / ovirt+1
Local
Published Jun 26, 2018
CVE-2018-1075
MEDIUM5.0

ovirt-engine up to version 4.2.3 is vulnerable to an unfiltered password when choosing manual db provisioning. When engine-setup was run and one chooses to provision the database manually or connect to a remote database, the password input was logged in cleartext during the verification step. Sharing the provisioning log might inadvertently leak database passwords.

ovirt / ovirt
Local
Published Jun 12, 2018
CVE-2018-1074
HIGH7.7

ovirt-engine API and administration web portal before versions 4.2.2.5, 4.1.11.2 is vulnerable to an exposure of Power Management credentials, including cleartext passwords to Host Administrators. A Host Administrator could use this flaw to gain access to the power management systems of hosts they control.

ovirt / ovirt+1
Network
Published Apr 26, 2018
CVE-2018-1000018
HIGH7.8

An information disclosure in ovirt-hosted-engine-setup prior to 2.2.7 reveals the root user's password in the log file.

ovirt / ovirt-hosted-engine-setup
Local
Published Jan 24, 2018