Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 3.1.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4238
The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these d...
Citrix Xen 3.1.2
NA
CVE-2009-1758
The hypervisor_callback function in Xen, possibly prior to 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "c...
Xen Xen
Xen Xen 2.0
Xen Xen 3.0.2
Xen Xen 3.0.3
Xen Xen 3.0.4
Xen Xen 3.1.2
Xen Xen 3.1.3
Xen Xen 3.1.4
Xen Xen 3.2
Xen Xen 3.2.0
Xen Xen 3.2.1
Xen Xen 3.2.2
Xen Xen 3.2.3
Xen Xen 3.3.0
NA
CVE-2008-1943
Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 up to and including 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.
Xensource Xen 3.0
Xensource Xen 3.0.2
Xensource Xen 3.0.3
Xensource Xen 3.0.4
Xensource Xen 3.1.2
NA
CVE-2007-6416
The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and previous versions, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.
Xen Xen 3.1.2
NA
CVE-2007-6207
Xen 3.x, possibly prior to 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains.
Xensource Inc Xen
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3