Количество 10
Количество 10
GHSA-rwhm-5hjg-54j9
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

CVE-2012-3515
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

CVE-2012-3515
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

CVE-2012-3515
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
CVE-2012-3515
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ...
ELSA-2012-1236
ELSA-2012-1236: xen security update (IMPORTANT)
ELSA-2012-1235
ELSA-2012-1235: kvm security update (IMPORTANT)
ELSA-2012-1234
ELSA-2012-1234: qemu-kvm security update (IMPORTANT)

SUSE-SU-2015:0943-1
Security update for KVM

SUSE-SU-2015:0929-1
Security update for kvm
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-rwhm-5hjg-54j9 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." | 0% Низкий | больше 3 лет назад | ||
![]() | CVE-2012-3515 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." | CVSS2: 7.2 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2012-3515 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." | CVSS2: 7.4 | 0% Низкий | почти 13 лет назад |
![]() | CVE-2012-3515 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." | CVSS2: 7.2 | 0% Низкий | больше 12 лет назад |
CVE-2012-3515 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ... | CVSS2: 7.2 | 0% Низкий | больше 12 лет назад | |
ELSA-2012-1236 ELSA-2012-1236: xen security update (IMPORTANT) | почти 13 лет назад | |||
ELSA-2012-1235 ELSA-2012-1235: kvm security update (IMPORTANT) | почти 13 лет назад | |||
ELSA-2012-1234 ELSA-2012-1234: qemu-kvm security update (IMPORTANT) | почти 13 лет назад | |||
![]() | SUSE-SU-2015:0943-1 Security update for KVM | около 12 лет назад | ||
![]() | SUSE-SU-2015:0929-1 Security update for kvm | почти 13 лет назад |
Уязвимостей на страницу