Vulnerabilities (CVE)

Filtered by vendor Ovirt Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-35497 2 Ovirt, Redhat 2 Ovirt-engine, Virtualization 2020-12-22 4.0 MEDIUM 6.5 MEDIUM
A flaw was found in ovirt-engine 4.4.3 and earlier allowing an authenticated user to read other users' personal information, including name, email and public SSH key.
CVE-2020-14333 1 Ovirt 1 Ovirt-engine 2020-12-08 4.3 MEDIUM 6.1 MEDIUM
A flaw was found in Ovirt Engine's web interface in ovirt 4.4 and earlier, where it did not filter user-controllable parameters completely, resulting in a reflected cross-site scripting attack. This flaw allows an attacker to leverage a phishing attack, steal an unsuspecting user's cookies or other confidential information, or impersonate them within the application's context.
CVE-2018-1073 2 Ovirt, Redhat 4 Ovirt-engine, Enterprise Linux, Virtualization and 1 more 2020-12-08 5.0 MEDIUM 5.3 MEDIUM
The web console login form in ovirt-engine before version 4.2.3 returned different errors for non-existent users and invalid passwords, allowing an attacker to discover the names of valid user accounts.
CVE-2019-3831 2 Ovirt, Redhat 2 Vdsm, Gluster Storage 2020-10-19 9.0 HIGH 6.7 MEDIUM
A vulnerability was discovered in vdsm, version 4.19 through 4.30.3 and 4.30.5 through 4.30.8. The systemd_run function exposed to the vdsm system user could be abused to execute arbitrary commands as root.
CVE-2019-10194 1 Ovirt 1 Ovirt 2020-10-15 2.1 LOW 5.5 MEDIUM
Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts.
CVE-2019-19336 2 Ovirt, Redhat 2 Ovirt-engine, Virtualization 2020-03-23 4.3 MEDIUM 6.1 MEDIUM
A cross-site scripting vulnerability was reported in the oVirt-engine's OAuth authorization endpoint before version 4.3.8. URL parameters were included in the HTML response without escaping. This flaw would allow an attacker to craft malicious HTML pages that can run scripts in the context of the user's oVirt session.
CVE-2018-10908 2 Ovirt, Redhat 2 Vdsm, Virtualization 2019-10-09 7.1 HIGH 6.3 MEDIUM
It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host.
CVE-2017-15113 2 Ovirt, Redhat 2 Ovirt, Virtualization 2019-10-09 3.5 LOW 6.6 MEDIUM
ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
CVE-2016-6341 1 Ovirt 1 Ovirt 2017-04-25 2.1 LOW 5.5 MEDIUM
oVirt Engine before 4.0.3 does not include DWH_DB_PASSWORD in the list of keys to hide in log files, which allows local users to obtain sensitive password information by reading engine log files.