Total vulnerabilities in the database
Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /tmp/.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_virtualization_manager | 2.2 | 2.2.x |
redhat / enterprise_virtualization_manager | - | 3.0.x |
redhat / enterprise_virtualization_manager | 2.2.3 | 2.2.3.x |
redhat / enterprise_virtualization_manager | 2.1 | 2.1.x |