Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.0.0 vulnerabilities and exploits
(subscribe to this query)
0.001
EPSS
CVE-2012-2934
Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonica...
Xen Xen 4.0.0
Xen Xen 4.1.0
0.000
EPSS
CVE-2012-3433
Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
Xen Xen 4.0.0
Xen Xen 4.1.0
0.000
EPSS
CVE-2012-4538
The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
0.000
EPSS
CVE-2012-4411
The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor. NOTE: this might be a duplicate of CVE-2007-0998.
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
0.000
EPSS
CVE-2012-6032
Multiple integer overflows in the (1) tmh_copy_from_client and (2) tmh_copy_to_client functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (memory corruption and host crash) via unspecified vectors. NOTE: thi...
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
0.001
EPSS
CVE-2012-6034
The (1) tmemc_save_get_next_page and (2) tmemc_save_get_next_inv functions and the (3) TMEMC_SAVE_GET_POOL_UUID sub-operation in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 "do not check incoming guest output buffer pointers," which allows local guest OS use...
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
0.000
EPSS
CVE-2012-6035
The do_tmem_destroy_pool function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly validate pool ids, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors. N...
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
0.000
EPSS
CVE-2012-0218
Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest ...
Xen Xen 3.4.0
Xen Xen 4.0.0
Xen Xen 4.1.0
0.000
EPSS
CVE-2012-3497
(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruptio...
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
0.000
EPSS
CVE-2012-6030
The do_tmem_op function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (host crash) and possibly have other unspecified impacts via unspecified vectors related to "broken locking checks" in an "err...
Xen Xen 4.0.0
Xen Xen 4.1.0
Xen Xen 4.2.0
Preferred Score:
EPSS
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
physical
privilege
CVE-2025-26475
cozystay - hotel booking wordpress theme
CVE-2025-1316
CVE-2024-27564
CVE-2025-29137
dell
CVE-2025-25589
hcl software
loftocean
inject
CVE-2025-30140
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »