### [CVE-2015-7504](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Live-Hack-CVE/CVE-2015-7504 - https://github.com/Resery/Learning_Note - https://github.com/Resery/Learning_Record - https://github.com/SplendidSky/vm_escape - https://github.com/WinMin/awesome-vm-exploit - https://github.com/ashishdas009/dynamic-syscall-filtering-for-qemu - https://github.com/jiayy/android_vuln_poc-exp - https://github.com/mtalbi/vm_escape - https://github.com/ray-cp/Vuln_Analysis