device: 0.730 files: 0.677 vnc: 0.657 graphic: 0.588 ppc: 0.573 mistranslation: 0.531 permissions: 0.492 socket: 0.470 register: 0.465 semantic: 0.438 network: 0.423 PID: 0.397 TCG: 0.388 risc-v: 0.365 VMM: 0.362 architecture: 0.348 boot: 0.305 arm: 0.297 debug: 0.286 i386: 0.191 performance: 0.136 kernel: 0.131 virtual: 0.127 x86: 0.126 assembly: 0.114 user-level: 0.095 peripherals: 0.079 KVM: 0.078 hypervisor: 0.042 In windows host, tftp arbitrary file read vulnerability https://github.com/qemu/qemu/blob/master/slirp/tftp.c#L343 if (!strncmp(req_fname, "../", 3) || req_fname[strlen(req_fname) - 1] == '/' || strstr(req_fname, "/../")) { tftp_send_error(spt, 2, "Access violation", tp); return; } There are file path check for not allowing escape tftp directory. But, in windows, file path is separated by "\" backslash. So, guest can read arbitrary file in Windows host. This is fixed upstream by https://gitlab.freedesktop.org/slirp/libslirp/commit/14ec36e107a8c9af7d0a80c3571fe39b291ff1d4