Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.2.1 vulnerabilities and exploits
(subscribe to this query)
436
VMScore
CVE-2014-2599
The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x up to and including 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input.
Xen Xen 4.3.2
Xen Xen 4.4.0
Xen Xen 4.1.6.1
Xen Xen 4.2.0
Xen Xen 4.1.4
Xen Xen 4.1.3
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 4.2.1
Xen Xen 4.2.2
Xen Xen 4.1.2
Xen Xen 4.1.5
Xen Xen 4.2.3
Xen Xen 4.3.0
Xen Xen 4.3.1
418
VMScore
CVE-2016-1571
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x up to and including 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID...
Citrix Xenserver
Xen Xen 3.4.1
Xen Xen 3.4.0
Xen Xen 4.5.0
Xen Xen 4.4.3
Xen Xen 4.3.3
Xen Xen 4.3.2
Xen Xen 4.2.0
Xen Xen 4.1.6.1
Xen Xen 4.1.0
Xen Xen 3.4.4
Xen Xen 3.4.3
Xen Xen 3.4.2
Xen Xen 4.5.2
Xen Xen 4.5.1
Xen Xen 4.3.4
Xen Xen 4.2.3
Xen Xen 4.2.2
Xen Xen 4.2.1
Xen Xen 4.1.2
Xen Xen 4.1.1
Xen Xen 3.3.2
418
VMScore
CVE-2015-8339
The memory_exchange function in common/memory.c in Xen 3.2.x up to and including 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.2.2
Xen Xen 3.2.3
Xen Xen 4.1.4
Xen Xen 4.1.5
Xen Xen 4.2.5
Xen Xen 4.3.0
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.2.1
Xen Xen 3.2.0
Xen Xen 4.1.6
Xen Xen 4.1.6.1
Xen Xen 4.3.1
Xen Xen 4.3.2
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.0.3
Xen Xen 4.0.4
418
VMScore
CVE-2015-8340
The memory_exchange function in common/memory.c in Xen 3.2.x up to and including 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handli...
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.2.1
Xen Xen 3.2.0
Xen Xen 4.1.6
Xen Xen 4.1.6.1
Xen Xen 4.2.2
Xen Xen 4.3.1
Xen Xen 4.3.2
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.0.3
Xen Xen 4.0.4
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 4.1.2
Xen Xen 4.1.3
Xen Xen 4.2.3
Xen Xen 4.2.4
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 3.4.0
418
VMScore
CVE-2014-8866
The compatibility mode hypercall argument translation in Xen 3.3.x up to and including 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit ...
Debian Debian Linux 7.0
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 4.0.3
Xen Xen 4.0.4
Xen Xen 4.1.6.1
Xen Xen 4.2.0
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 4.1.4
Xen Xen 4.1.5
Xen Xen 4.3.1
Xen Xen 4.4.0
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 4.2.1
Xen Xen 4.2.2
418
VMScore
CVE-2014-5146
Certain MMU virtualization operations in Xen 4.2.x up to and including 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, whic...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Xen Xen 4.3.0
Xen Xen 4.2.3
Xen Xen 4.3.1
Xen Xen 4.4.0
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.2.2
418
VMScore
CVE-2014-5149
Certain MMU virtualization operations in Xen 4.2.x up to and including 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest...
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Xen Xen 4.2.2
Xen Xen 4.3.1
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.4.0
Xen Xen 4.3.0
Xen Xen 4.2.3
418
VMScore
CVE-2013-3495
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x up to and including 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Xen Xen 4.3.0
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.1.3
Xen Xen 4.1.4
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 4.0.4
Xen Xen 4.1.0
Xen Xen 4.2.1
Xen Xen 4.2.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.1.1
Xen Xen 4.1.2
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 4.0.2
1 Article
418
VMScore
CVE-2013-2078
Xen 4.0.2 up to and including 4.0.4, 4.1.x, and 4.2.x allows local PV guest users to cause a denial of service (hypervisor crash) via certain bit combinations to the XSETBV instruction.
Xen Xen 4.2.0
Xen Xen 4.1.5
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 4.2.2
Xen Xen 4.1.4
Xen Xen 4.1.3
Xen Xen 4.2.1
Xen Xen 4.1.0
Xen Xen 4.0.4
Xen Xen 4.1.2
Xen Xen 4.1.1
418
VMScore
CVE-2013-1919
Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
Xen Xen 4.1.5
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.1.3
Xen Xen 4.1.2
Xen Xen 4.1.4
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »