Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xensource inc xen vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2007-6207
Xen 3.x, possibly prior to 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains.
Xensource Inc Xen
4.3
CVSSv2
CVE-2008-1619
The ssm_i emulation in Xen 5.1 on IA64 architectures allows malicious users to cause a denial of service (dom0 panic) via certain traffic, as demonstrated using an FTP stress test tool.
Xensource Inc Xen 5.1
4.7
CVSSv2
CVE-2007-5906
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
Xensource Inc Xen 3.1.1
4.7
CVSSv2
CVE-2007-5907
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
Xensource Inc Xen 3.1.1
6.9
CVSSv2
CVE-2007-4993
pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
Xensource Inc Xen 3.0.3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started