Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qemu qemu 2.1.2 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2014-3471
Use-after-free vulnerability in hw/pci/pcie.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU instance crash) via hotplug and hotunplug operations of Virtio block devices.
Qemu Qemu
Qemu Qemu 2.1.2
NA
CVE-2014-9718
The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 up to and including 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and sys...
Debian Debian Linux 8.0
Qemu Qemu 1.0
Qemu Qemu 2.0.0
Qemu Qemu 2.0.2
Qemu Qemu 1.1
Qemu Qemu 2.1.3
Qemu Qemu 2.1.0
Qemu Qemu 1.6.0
Qemu Qemu 1.5.0
Qemu Qemu 1.5.3
Qemu Qemu 1.5.1
Qemu Qemu 2.1.1
Qemu Qemu 1.5.2
Qemu Qemu 1.0.1
Qemu Qemu 1.7.1
Qemu Qemu 1.4.1
Qemu Qemu 1.4.2
Qemu Qemu 1.6.2
Qemu Qemu 1.6.1
Qemu Qemu 2.1.2
8.8
CVSSv3
CVE-2016-3710
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Debian Debian Linux 8.0
Hp Helion Openstack 2.0.0
Hp Helion Openstack 2.1.0
Hp Helion Openstack 2.1.2
Hp Helion Openstack 2.1.4
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 12.04
Qemu Qemu
Qemu Qemu 2.6.0
Oracle Vm Server 3.2
Oracle Vm Server 3.3
Oracle Vm Server 3.4
Oracle Linux 5
Oracle Linux 6
Oracle Linux 7
Citrix Xenserver
Redhat Openstack 5.0
Redhat Openstack 6.0
Redhat Openstack 7.0
Redhat Openstack 8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started