A vulnerability, which was classified as problematic, has been found in QEMU up to 6.1.x. This issue affects the function mirror_wait_on_conflicts of the component Block Mirror Layer. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2021-4145. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in QEMU up to 6.2.0. Affected by this vulnerability is an unknown functionality of the component vhost-vsock Device. The manipulation leads to missing release of resource.
This vulnerability is known as CVE-2022-26354. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in QEMU. Affected is an unknown function of the component virtio-fs Shared File System Daemon. The manipulation leads to improper check for dropped privileges.
This vulnerability is traded as CVE-2022-0358. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in QEMU 6.2.0. Affected is an unknown function of the component virtio-net Device. The manipulation leads to missing release of resource.
This vulnerability is traded as CVE-2022-26353. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in QEMU. It has been rated as critical. Affected by this issue is the function cursor_alloc of the component QXL Display Device Emulation. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2021-4206. Access to the local network is required for this attack. There is no exploit available.
A vulnerability was found in QEMU. It has been rated as problematic. This issue affects the function lsi_do_msgout of the component LSI53C895A SCSI Host Bus Adapter Emulation. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2022-0216. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in QEMU and classified as critical. This vulnerability affects unknown code of the component lsi53c895a Device. The manipulation leads to use after free.
This vulnerability was named CVE-2023-0330. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as critical was found in QEMU. Affected by this vulnerability is the function openat_dir of the file hw/9pfs/9p-util.h of the component 9pfs. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2023-2861. Access to the local network is required for this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in QEMU up to 8.0.x and classified as problematic. This vulnerability affects unknown code of the component Hot-Unplug Handler. The manipulation leads to race condition.
This vulnerability was named CVE-2023-3301. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in QEMU. This issue affects the function inflate_buffer of the file ui/vnc-clipboard.c of the component VNC. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2023-3255. The attack needs to be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in SourceCodeHero Clothes Recommendation System 1.0. Affected is an unknown function of the file /admin/home.php?con=add. The manipulation of the argument cat/subcat/ t1/t2/text leads to sql injection.
This vulnerability is traded as CVE-2024-10337. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in code-projects Hospital Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/add-doctor.php. The manipulation of the argument docname leads to sql injection.
This vulnerability was named CVE-2024-10350. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Wear Sync 1.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Firmware Update Handler. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-48546. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in DreamCatcher Life 1.8.7. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Firmware Update Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-48547. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Sylvania Smart Home 3.0.3. This affects an unknown part of the component Firmware Update Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-48544. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability has been found in IVY Smart 4.5.0 and classified as problematic. This vulnerability affects unknown code of the component Firmware Update Handler. The manipulation leads to information disclosure.
This vulnerability was named CVE-2024-48545. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Cloud Smart Lock 2.0.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is handled as CVE-2024-48548. It is possible to launch the attack on the physical device. There is no exploit available.