CVE-2016-2371
- EPSS 3.52%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An out-of-bounds write vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could cause memory corruption resulting in code execution.
CVE-2016-2372
- EPSS 1.22%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid ...
CVE-2016-2373
- EPSS 1.95%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A denial of service vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious server or user can send an invalid mood to trigger...
CVE-2016-2374
- EPSS 2.78%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An exploitable memory corruption vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT MultiMX message sent via the server can result in an out-of-bounds write leading to memory disclosure and code execution.
CVE-2016-2375
- EPSS 0.48%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure.
CVE-2016-2376
- EPSS 6.85%
- Veröffentlicht 06.01.2017 21:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A buffer overflow vulnerability exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent from the server could potentially result in arbitrary code execution. A malicious server or an attacker who intercepts the network...
CVE-2015-8743
- EPSS 0.06%
- Veröffentlicht 29.12.2016 22:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corru...
CVE-2015-8744
- EPSS 0.07%
- Veröffentlicht 29.12.2016 22:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to c...
CVE-2015-8745
- EPSS 0.07%
- Veröffentlicht 29.12.2016 22:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the...
CVE-2016-1922
- EPSS 0.08%
- Veröffentlicht 29.12.2016 22:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, whic...