Show filters
128 Total Results
Displaying 101-110 of 128
Sort by:
Attacker Value
Unknown
CVE-2017-9214
Disclosure Date: May 23, 2017 (last updated November 26, 2024)
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
0
Attacker Value
Unknown
CVE-2017-8309
Disclosure Date: May 23, 2017 (last updated November 26, 2024)
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
0
Attacker Value
Unknown
CVE-2017-8379
Disclosure Date: May 23, 2017 (last updated November 26, 2024)
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
0
Attacker Value
Unknown
CVE-2017-5973
Disclosure Date: March 27, 2017 (last updated November 08, 2023)
The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.
0
Attacker Value
Unknown
CVE-2015-7976
Disclosure Date: January 30, 2017 (last updated November 25, 2024)
The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
0
Attacker Value
Unknown
CVE-2016-9911
Disclosure Date: December 23, 2016 (last updated November 25, 2024)
Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
0
Attacker Value
Unknown
CVE-2016-9907
Disclosure Date: December 23, 2016 (last updated November 25, 2024)
Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
0
Attacker Value
Unknown
CVE-2016-9921
Disclosure Date: December 23, 2016 (last updated November 25, 2024)
Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
0
Attacker Value
Unknown
CVE-2016-7422
Disclosure Date: December 10, 2016 (last updated November 25, 2024)
The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.
0
Attacker Value
Unknown
CVE-2016-6888
Disclosure Date: December 10, 2016 (last updated November 08, 2023)
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
0