Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
alibaba vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2015-8504
Qemu, when built with VNC display driver support, allows remote malicious users to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
Qemu Qemu
Qemu Qemu 2.5.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
3.6
CVSSv2
CVE-2015-8743
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes...
Qemu Qemu
Debian Debian Linux 7.0
Debian Debian Linux 8.0
1 Github repository
2.1
CVSSv2
CVE-2016-1922
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null ...
Qemu Qemu
Debian Debian Linux 7.0
Debian Debian Linux 8.0
6.8
CVSSv2
CVE-2015-8567
Memory leak in net/vmxnet3.c in QEMU allows remote malicious users to cause a denial of service (memory consumption).
Qemu Qemu
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Debian Debian Linux 8.0
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Software Development Kit 12
Fedoraproject Fedora 23
Fedoraproject Fedora 22
4.7
CVSSv2
CVE-2015-8568
Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
Qemu Qemu
Debian Debian Linux 8.0
1.9
CVSSv2
CVE-2015-8613
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
Qemu Qemu
Debian Debian Linux 8.0
5
CVSSv2
CVE-2015-8619
The Human Monitor Interface support in QEMU allows remote malicious users to cause a denial of service (out-of-bounds write and application crash).
Qemu Qemu
Debian Debian Linux 8.0
2.1
CVSSv2
CVE-2015-8745
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulti...
Qemu Qemu
Debian Debian Linux 8.0
2.1
CVSSv2
CVE-2015-8744
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance...
Qemu Qemu
Debian Debian Linux 8.0
2.1
CVSSv2
CVE-2015-7549
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
Qemu Qemu
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »