A heap-based buffer overflow in QEMU 5.0.0 allows guest users to crash the host QEMU process or potentially execute arbitrary code
Reporter | Title | Published | Views | Family All 60 |
---|---|---|---|---|
![]() | Denial Of Service (DoS) | 6 Dec 202002:41 | – | veracode |
![]() | CVE-2020-17380 | 30 Jan 202106:15 | – | cve |
![]() | CVE-2021-3409 | 23 Mar 202121:15 | – | cve |
![]() | CVE-2020-17380 | 30 Jan 202105:38 | – | cvelist |
![]() | CVE-2021-3409 | 23 Mar 202120:20 | – | cvelist |
![]() | CVE-2020-17380 | 11 Aug 202018:13 | – | redhatcve |
![]() | CVE-2021-3409 | 12 Feb 202114:03 | – | redhatcve |
![]() | Heap overflow | 30 Jan 202106:15 | – | prion |
![]() | Out-of-bounds | 23 Mar 202121:15 | – | prion |
![]() | CVE-2020-17380 | 30 Jan 202106:15 | – | nvd |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | qemu | any | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo