Show filters
59 Total Results
Displaying 31-40 of 59
Sort by:
Attacker Value
Unknown

CVE-2015-7512

Disclosure Date: January 08, 2016 (last updated November 25, 2024)
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
Attacker Value
Unknown

CVE-2015-1841

Disclosure Date: September 08, 2015 (last updated October 05, 2023)
The Web Admin interface in Red Hat Enterprise Virtualization Manager (RHEV-M) allows local users to bypass the timeout function by selecting a VM in the VM grid view.
0
Attacker Value
Unknown

CVE-2015-3214

Disclosure Date: August 31, 2015 (last updated October 05, 2023)
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
0
Attacker Value
Unknown

CVE-2015-5165

Disclosure Date: August 12, 2015 (last updated October 05, 2023)
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
0
Attacker Value
Unknown

CVE-2015-3209

Disclosure Date: June 15, 2015 (last updated October 05, 2023)
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
0
Attacker Value
Unknown

CVE-2015-3456

Disclosure Date: May 13, 2015 (last updated October 05, 2023)
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
0
Attacker Value
Unknown

CVE-2014-7840

Disclosure Date: December 12, 2014 (last updated October 05, 2023)
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
0
Attacker Value
Unknown

CVE-2014-7815

Disclosure Date: November 14, 2014 (last updated October 05, 2023)
The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
0
Attacker Value
Unknown

CVE-2014-3615

Disclosure Date: November 01, 2014 (last updated October 05, 2023)
The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
0
Attacker Value
Unknown

CVE-2014-7169

Disclosure Date: September 25, 2014 (last updated July 25, 2024)
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.