Lucene search

K

CVE-2015-5166

🗓️ 12 Aug 2015 14:25:59Reported by Debian Security Bug TrackerType 
debiancve
 debiancve
🔗 security-tracker.debian.org👁 27 Views

QEMU Use-after-free vulnerability allows local guest to gain privilege

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Packages
ReporterTitlePublishedViews
Family
Xen Project
Use after free in QEMU/Xen block unplug protocol
3 Aug 201512:00
xen
F5 Networks
K75269595 : QEMU vulnerability CVE-2015-5166
5 Feb 201900:00
f5
CVE
CVE-2015-5166
12 Aug 201514:59
cve
FreeBSD
qemu, xen-tools -- use-after-free in QEMU/Xen block unplug protocol
3 Aug 201500:00
freebsd
UbuntuCve
CVE-2015-5166
12 Aug 201500:00
ubuntucve
NVD
CVE-2015-5166
12 Aug 201514:59
nvd
OSV
CVE-2015-5166
12 Aug 201514:59
osv
OSV
SUSE-SU-2015:1384-1 security update for xen
11 Aug 201508:27
osv
OSV
SUSE-SU-2015:1404-1 security update for xen
11 Aug 201508:37
osv
OSV
USN-2724-1 qemu, qemu-kvm vulnerabilities
27 Aug 201512:00
osv
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
Debian12allqemu1:2.4+dfsg-1aqemu_1:2.4+dfsg-1a_all.deb
Debian11allqemu1:2.4+dfsg-1aqemu_1:2.4+dfsg-1a_all.deb
Debian999allqemu1:2.4+dfsg-1aqemu_1:2.4+dfsg-1a_all.deb
Debian13allqemu1:2.4+dfsg-1aqemu_1:2.4+dfsg-1a_all.deb
Debian12allxen4.4.0-1xen_4.4.0-1_all.deb
Debian11allxen4.4.0-1xen_4.4.0-1_all.deb
Debian999allxen4.4.0-1xen_4.4.0-1_all.deb
Debian13allxen4.4.0-1xen_4.4.0-1_all.deb

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
12 Aug 2015 14:59Current
6.5Medium risk
Vulners AI Score6.5
CVSS27.2
EPSS0.00136
27
.json
Report