Bug | Description |
---|
CVE-2020-14355 | Multiple buffer overflow vulnerabilities were found in the QUIC image ... |
CVE-2019-3813 | Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-boun ... |
CVE-2018-10873 | A vulnerability was discovered in SPICE before version 0.14.1 where th ... |
CVE-2017-7506 | A vulnerability was discovered in spice server's protocol handling. An ... |
CVE-2016-9578 | A vulnerability was discovered in SPICE before 0.13.90 in the server's ... |
CVE-2016-9577 | A vulnerability was discovered in SPICE before 0.13.90 in the server's ... |
CVE-2016-2150 | A memory access flaw was found in the way spice handled certain guests ... |
CVE-2016-0749 | A memory allocation flaw, leading to a heap-based buffer overflow, was ... |
CVE-2015-5261 | A heap-based buffer overflow flaw was found in the way SPICE handled c ... |
CVE-2015-5260 | A heap-based buffer overflow flaw was found in the way spice handled c ... |
CVE-2015-3247 | A race condition flaw, leading to a heap-based memory corruption, was ... |
CVE-2013-4282 | CVE-2013-4282 spice: stack buffer overflow in reds_handle_ticket() fun ... |
CVE-2013-4130 | CVE-2013-4130 spice: unsafe clients ring access abort ... |
CVE-2010-0430 | CVE-2010-0430 libspice: Insufficient guest provided memory mappings bo ... |
CVE-2010-0429 | CVE-2010-0429 libspice: Relying on guest provided data structures to i ... |
CVE-2010-0428 | CVE-2010-0428 libspice: Insufficient guest provided pointers validatio ... |