Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.8.1 vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2016-10024
Xen up to and including 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
Xen Xen
Citrix Xenserver 6.5
Citrix Xenserver 6.2.0
Citrix Xenserver 6.0.2
Citrix Xenserver 7.0
4.6
CVSSv2
CVE-2016-10013
Xen up to and including 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
Xen Xen
2.1
CVSSv2
CVE-2017-12855
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances...
Xen Xen 4.8.0
Xen Xen 4.7.0
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.7.2
Xen Xen 4.7.3
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.7.1
Xen Xen 4.6.6
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.5.0
Xen Xen 4.9.0
Xen Xen 4.8.1
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.6.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2