Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qemu qemu 2.1.2 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2014-3471
Use-after-free vulnerability in hw/pci/pcie.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU instance crash) via hotplug and hotunplug operations of Virtio block devices.
Qemu Qemu
Qemu Qemu 2.1.2
4.9
CVSSv2
CVE-2014-9718
The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 up to and including 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and sys...
Debian Debian Linux 8.0
Qemu Qemu 1.0
Qemu Qemu 2.0.0
Qemu Qemu 2.0.2
Qemu Qemu 1.1
Qemu Qemu 2.1.3
Qemu Qemu 2.1.0
Qemu Qemu 1.6.0
Qemu Qemu 1.5.0
Qemu Qemu 1.5.3
Qemu Qemu 1.5.1
Qemu Qemu 2.1.1
Qemu Qemu 1.5.2
Qemu Qemu 1.0.1
Qemu Qemu 1.7.1
Qemu Qemu 1.4.1
Qemu Qemu 1.4.2
Qemu Qemu 1.6.2
Qemu Qemu 1.6.1
Qemu Qemu 2.1.2
7.2
CVSSv2
CVE-2016-3710
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Debian Debian Linux 8.0
Hp Helion Openstack 2.0.0
Hp Helion Openstack 2.1.0
Hp Helion Openstack 2.1.2
Hp Helion Openstack 2.1.4
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 12.04
Qemu Qemu
Qemu Qemu 2.6.0
Oracle Vm Server 3.2
Oracle Vm Server 3.3
Oracle Vm Server 3.4
Oracle Linux 5
Oracle Linux 6
Oracle Linux 7
Citrix Xenserver
Redhat Openstack 5.0
Redhat Openstack 6.0
Redhat Openstack 7.0
Redhat Openstack 8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started