This might be proprietary software.
|2020-04-22||CVE-2020-1983||A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.||Fedora, Libslirp, Leap||N/A|
|2020-02-06||CVE-2020-8608||In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.||Libslirp||N/A|
|2020-01-16||CVE-2020-7039||tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.||Libslirp, Qemu||N/A|
|2020-01-21||CVE-2020-7211||tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows.||Libslirp, Qemu||N/A|
|2019-09-06||CVE-2019-15890||libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.||Libslirp, Qemu||N/A|
|2019-07-29||CVE-2019-14378||ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.||Libslirp||8.8|