Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.6.0 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2017-12855
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances...
Xen Xen 4.6.0
Xen Xen 4.7.0
Xen Xen 4.5.5
Xen Xen 4.6.6
Xen Xen 4.6.4
Xen Xen 4.6.3
Xen Xen 4.7.1
Xen Xen 4.5.2
Xen Xen 4.6.1
Xen Xen 4.8.0
Xen Xen 4.5.3
Xen Xen 4.9.0
Xen Xen 4.8.1
Xen Xen 4.7.3
Xen Xen 4.5.1
Xen Xen 4.5.0
Xen Xen 4.6.5
Xen Xen 4.7.2
436
VMScore
CVE-2017-15591
An issue exists in Xen 4.5.x up to and including 4.9.x allowing attackers (who control a stub domain kernel or tool stack) to cause a denial of service (host OS crash) because of a missing comparison (of range start to range end) within the DMOP map/unmap implementation.
Xen Xen 4.6.0
Xen Xen 4.7.0
Xen Xen 4.5.5
Xen Xen 4.6.6
Xen Xen 4.6.4
Xen Xen 4.6.3
Xen Xen 4.7.1
Xen Xen 4.5.2
Xen Xen 4.6.1
Xen Xen 4.8.0
Xen Xen 4.5.3
Xen Xen 4.9.0
Xen Xen 4.8.1
Xen Xen 4.7.3
Xen Xen 4.5.1
Xen Xen 4.5.0
Xen Xen 4.6.5
Xen Xen 4.7.2
436
VMScore
CVE-2017-14318
An issue exists in Xen 4.5.x up to and including 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table i...
Xen Xen 4.6.0
Xen Xen 4.7.0
Xen Xen 4.5.5
Xen Xen 4.6.6
Xen Xen 4.6.4
Xen Xen 4.6.3
Xen Xen 4.7.1
Xen Xen 4.5.2
Xen Xen 4.6.1
Xen Xen 4.8.0
Xen Xen 4.5.3
Xen Xen 4.9.0
Xen Xen 4.8.1
Xen Xen 4.7.3
Xen Xen 4.5.1
Xen Xen 4.5.0
Xen Xen 4.6.5
Xen Xen 4.7.2
605
VMScore
CVE-2016-4962
The libxl device-handling in Xen 4.6.x and previous versions allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
Oracle Vm Server 3.4
Oracle Vm Server 3.3
Xen Xen 4.3.2
Xen Xen 4.6.0
Xen Xen 4.3.3
Xen Xen 4.3.0
Xen Xen 4.5.2
Xen Xen 4.4.2
Xen Xen 4.4.4
Xen Xen 4.4.3
Xen Xen 4.4.0
Xen Xen 4.6.1
Xen Xen 4.5.3
Xen Xen 4.3.4
Xen Xen 4.5.1
Xen Xen 4.4.1
Xen Xen 4.3.1
Xen Xen 4.5.0
436
VMScore
CVE-2016-6259
Xen 4.5.x up to and including 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Xen Xen 4.6.0
Xen Xen 4.7.0
Xen Xen 4.6.3
Xen Xen 4.5.2
Xen Xen 4.6.1
Xen Xen 4.5.3
Xen Xen 4.5.1
Xen Xen 4.5.0
Citrix Xenserver 6.5.0
Citrix Xenserver 7.0
Citrix Xenserver 6.0.2
Citrix Xenserver 6.0
Citrix Xenserver 6.2.0
Citrix Xenserver 6.1
436
VMScore
CVE-2015-7969
Multiple memory leaks in Xen 4.0 up to and including 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the ...
Xen Xen 4.3.2
Xen Xen 4.6.0
Xen Xen 4.1.5
Xen Xen 4.2.2
Xen Xen 4.2.3
Xen Xen 4.3.0
Xen Xen 4.0.4
Xen Xen 4.0.2
Xen Xen 4.1.2
Xen Xen 4.0.0
Xen Xen 4.1.1
Xen Xen 4.2.0
Xen Xen 4.1.0
Xen Xen 4.4.1
Xen Xen 4.1.3
Xen Xen 4.1.6.1
Xen Xen 4.3.4
Xen Xen 4.5.1
Xen Xen 4.1.4
Xen Xen 4.3.1
Xen Xen 4.2.1
Xen Xen 4.5.0
436
VMScore
CVE-2017-15596
An issue exists in Xen 4.4.x up to and including 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
Xen Xen 4.6.0
Xen Xen 4.7.0
Xen Xen 4.5.5
Xen Xen 4.6.6
Xen Xen 4.6.4
Xen Xen 4.6.3
Xen Xen 4.7.1
Xen Xen 4.5.2
Xen Xen 4.4.2
Xen Xen 4.4.4
Xen Xen 4.4.3
Xen Xen 4.4.0
Xen Xen 4.6.1
Xen Xen 4.8.0
Xen Xen 4.5.3
Xen Xen 4.6.2
Xen Xen 4.9.0
Xen Xen 4.8.1
Xen Xen 4.7.3
Xen Xen 4.5.1
Xen Xen 4.4.1
Xen Xen 4.5.0
694
VMScore
CVE-2015-8341
The libxl toolstack library in Xen 4.1.x up to and including 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows malicious users to cause a denial of service (memory and disk consu...
Xen Xen 4.3.2
Xen Xen 4.6.0
Xen Xen 4.1.5
Xen Xen 4.2.2
Xen Xen 4.2.3
Xen Xen 4.3.3
Xen Xen 4.3.0
Xen Xen 4.1.2
Xen Xen 4.5.2
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.1.1
Xen Xen 4.2.0
Xen Xen 4.1.0
Xen Xen 4.1.6
Xen Xen 4.2.5
Xen Xen 4.1.3
Xen Xen 4.1.6.1
Xen Xen 4.3.4
Xen Xen 4.5.1
Xen Xen 4.2.4
Xen Xen 4.1.4
614
VMScore
CVE-2016-1570
The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x up to and including 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the...
Xen Xen 4.3.2
Xen Xen 4.6.0
Xen Xen 4.1.5
Xen Xen 4.2.2
Xen Xen 4.2.3
Xen Xen 4.3.3
Xen Xen 3.4.0
Xen Xen 4.3.0
Xen Xen 4.1.2
Xen Xen 4.5.2
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.0
Xen Xen 4.1.1
Xen Xen 4.2.0
Xen Xen 4.1.0
Xen Xen 4.1.6
Xen Xen 4.2.5
Xen Xen 4.1.3
Xen Xen 4.1.6.1
Xen Xen 4.3.4
Xen Xen 4.5.1
641
VMScore
CVE-2015-7835
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 up to and including 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
Xen Xen 4.3.2
Xen Xen 4.6.0
Xen Xen 4.1.5
Xen Xen 4.2.2
Xen Xen 4.2.3
Xen Xen 3.4.0
Xen Xen 4.3.0
Xen Xen 4.0.4
Xen Xen 4.0.2
Xen Xen 4.1.2
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.1.1
Xen Xen 4.2.0
Xen Xen 4.1.0
Xen Xen 3.4.3
Xen Xen 4.4.1
Xen Xen 4.1.3
Xen Xen 4.1.6.1
Xen Xen 4.3.4
Xen Xen 4.5.1
Xen Xen 3.4.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »