Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 3.3.2 vulnerabilities and exploits
(subscribe to this query)
0.008
EPSS
CVE-2014-7156
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x up to and including 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) v...
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 4.1.2
Xen Xen 4.1.3
Xen Xen 4.1.4
Xen Xen 4.1.5
Xen Xen 4.1.6.1
Xen Xen 4.2.0
Xen Xen 4.2.1
0.001
EPSS
CVE-2011-1166
Xen, possibly prior to 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
Xen Xen
Xen Xen 3.0.2
Xen Xen 3.0.3
Xen Xen 3.0.4
Xen Xen 3.1.3
Xen Xen 3.1.4
Xen Xen 3.2.0
Xen Xen 3.2.1
Xen Xen 3.2.2
Xen Xen 3.2.3
Xen Xen 3.3.0
Xen Xen 3.3.1
0.004
EPSS
CVE-2014-1892
Xen 3.3 up to and including 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 4.0.3
0.004
EPSS
CVE-2010-3699
The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, ...
Citrix Xen 3.0.2
Citrix Xen 3.0.3
Citrix Xen 3.0.4
Citrix Xen 3.1.3
Citrix Xen 3.1.4
Citrix Xen 3.2.0
Citrix Xen 3.2.1
Citrix Xen 3.2.2
Citrix Xen 3.2.3
Citrix Xen 3.3.0
Citrix Xen 3.3.1
Citrix Xen 3.3.2
0.004
EPSS
CVE-2014-1893
Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and previous versions, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a diffe...
Xen Xen
Xen Xen 3.2.0
Xen Xen 3.2.1
Xen Xen 3.2.2
Xen Xen 3.2.3
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
0.001
EPSS
CVE-2013-4361
The fbld instruction emulation in Xen 3.3.x up to and including 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 4.0.3
0.001
EPSS
CVE-2013-2212
The vmx_set_uc_mode function in Xen 3.3 up to and including 4.3, when disabling caches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 4.0.3
0.004
EPSS
CVE-2014-1891
Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and previous versions, when XSM is enabled, allow local users to cause a denial of service ...
Xen Xen
Xen Xen 3.2.0
Xen Xen 3.2.1
Xen Xen 3.2.2
Xen Xen 3.2.3
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
0.008
EPSS
CVE-2010-4255
The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and previous versions on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial ...
Citrix Xen
Citrix Xen 3.0.2
Citrix Xen 3.0.3
Citrix Xen 3.0.4
Citrix Xen 3.1.2
Citrix Xen 3.1.3
Citrix Xen 3.1.4
Citrix Xen 3.2.0
Citrix Xen 3.2.1
Citrix Xen 3.2.2
Citrix Xen 3.2.3
Citrix Xen 3.3.0
0.000
EPSS
CVE-2013-3495
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x up to and including 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.0.1
1 Article
Preferred Score:
EPSS
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-48132
man-in-the-middle
CVE-2024-47893
CVE-2025-4664
CVE-2025-4795
CVE-2025-4476
server-side request forgery
javier revilla
curcy
app cheap
csv mass importer
wireless
CVE-2024-46982
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »