Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.1.0 vulnerabilities and exploits
(subscribe to this query)
418
VMScore
CVE-2013-0153
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.1.4
Xen Xen 4.1.2
Xen Xen 4.1.3
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 3.3.0
418
VMScore
CVE-2013-1919
Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
Xen Xen 4.1.5
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.1.3
Xen Xen 4.1.2
Xen Xen 4.1.4
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.2.2
659
VMScore
CVE-2013-1432
Xen 4.1.x and 4.2.x, when the XSA-45 patch is in place, does not properly maintain references on pages stored for deferred cleanup, which allows local PV guest kernels to cause a denial of service (premature page free and hypervisor crash) or possibly gain privileges via unspecif...
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.2.2
Xen Xen 4.1.4
Xen Xen 4.1.5
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 4.1.2
Xen Xen 4.1.3
418
VMScore
CVE-2013-1918
Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and previous versions are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.1.3
Xen Xen 4.1.2
Xen Xen 4.1.4
Xen Xen 4.1.5
Xen Xen 4.2.1
Xen Xen 4.2.2
Xen Xen 4.2.0
187
VMScore
CVE-2012-4539
Xen 4.0 up to and including 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infin...
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.0.1
Xen Xen 4.0.0
Xen Xen 4.1.2
Xen Xen 4.0.4
Xen Xen 4.2.0
Xen Xen 4.1.3
Xen Xen 4.0.3
Xen Xen 4.0.2
418
VMScore
CVE-2012-5510
Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
Xen Xen 4.1.2
Xen Xen 4.0.4
Xen Xen 4.2.0
Xen Xen 4.1.3
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.0.1
Xen Xen 4.0.0
418
VMScore
CVE-2012-5511
Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 up to and including 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
Xen Xen 3.4.0
Xen Xen 4.0.3
Xen Xen 4.0.4
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 4.1.0
Xen Xen 3.4.4
Xen Xen 4.0.0
169
VMScore
CVE-2012-3432
The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash...
Xen Xen 3.3.0
Xen Xen 4.1.1
Xen Xen 4.0.2
Xen Xen 4.0.1
Xen Xen 4.1.3
Xen Xen 4.1.2
Xen Xen 4.1.0
Xen Xen 4.2.0
Xen Xen 4.0.0
Xen Xen 4.0.4
Xen Xen 4.0.3
614
VMScore
CVE-2013-1964
Xen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possibly have other impacts via unspecified vectors.
Xen Xen 4.0.0
Xen Xen 4.1.1
Xen Xen 4.0.2
Xen Xen 4.0.1
Xen Xen 4.1.5
Xen Xen 4.0.4
Xen Xen 4.0.3
Xen Xen 4.1.2
Xen Xen 4.1.4
Xen Xen 4.1.0
Xen Xen 4.1.3
418
VMScore
CVE-2012-6333
Multiple HVM control operations in Xen 3.4 up to and including 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input.
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 4.1.0
Xen Xen 4.2.0
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 4.0.3
Xen Xen 4.0.4
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.0.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »