Red Hat Enterprise Virtualization Manager Postzero Parameter Information Disclosure Vulnerability

No specific exploit is required. An attacker would only need local interactive access to the guest operating system.


 

Privacy Statement
Copyright 2010, SecurityFocus