CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

redhat

virtualization_manager

12 known vulnerabilities · sorted by CVSS score

CVE-2018-17963
CRITICAL9.8

qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

qemu / qemu+15
Network
Published Oct 9, 2018
CVE-2017-7481
CRITICAL9.8

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.

redhat / openshift_container_platform+14
Network
Published Jul 19, 2018
CVE-2019-10744
CRITICAL9.1

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

f5 / big-ip_application_acceleration_manager+80
Network
Published Jul 26, 2019
CVE-2018-17958
HIGH7.5

Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.

qemu / qemu+8
Network
Published Oct 9, 2018
CVE-2018-16881
HIGH7.5

A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.

rsyslog / rsyslog+11
Network
Published Jan 25, 2019
CVE-2019-11135
MEDIUM6.5

TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

intel / xeon_4210_firmware+179
Local
Published Nov 14, 2019
CVE-2018-1059
MEDIUM6.1

The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.

canonical / ubuntu_linux+14
Adjacent
Published Apr 24, 2018
CVE-2019-8331
MEDIUM6.1

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.

f5 / big-ip_policy_enforcement_manager+55
Network
Published Feb 20, 2019
CVE-2019-11358
MEDIUM6.1

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

jquery / jquery+217
Network
Published Apr 20, 2019
CVE-2019-10194
MEDIUM5.5

Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts.

ovirt / ovirt+1
Local
Published Jul 11, 2019
CVE-2018-3639
MEDIUM5.5

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

intel / atom_c+625
Local
Published May 22, 2018
CVE-2021-3620
MEDIUM5.5

A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

redhat / ansible_automation_platform_early_access+9
Local
Published Mar 3, 2022