Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.4.4 vulnerabilities and exploits
(subscribe to this query)
5.6
CVSSv3
CVE-2016-5242
The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x up to and including 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them,...
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.6.0
Xen Xen 4.6.1
8.6
CVSSv3
CVE-2015-8555
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and previous versions do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vect...
Citrix Xenserver 6.0
Xen Xen 4.3.0
Xen Xen 4.3.1
Xen Xen 4.3.2
Xen Xen 4.3.3
Xen Xen 4.3.4
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
Xen Xen 4.5.0
6.7
CVSSv3
CVE-2016-4962
The libxl device-handling in Xen 4.6.x and previous versions allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
Oracle Vm Server 3.3
Oracle Vm Server 3.4
Xen Xen 4.3.0
Xen Xen 4.3.1
Xen Xen 4.3.2
Xen Xen 4.3.3
Xen Xen 4.3.4
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
6
CVSSv3
CVE-2017-15596
An issue exists in Xen 4.4.x up to and including 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.4
Xen Xen 4.5.5
Xen Xen 4.6.0
4.7
CVSSv3
CVE-2016-4963
The libxl device-handling in Xen up to and including 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 4.0.3
Xen Xen 4.0.4
Xen Xen 4.1.0
Xen Xen 4.1.1
Xen Xen 4.1.2
Xen Xen 4.1.3
Xen Xen 4.1.4
Xen Xen 4.1.5
Xen Xen 4.1.6
5.5
CVSSv3
CVE-2017-14431
Memory leak in Xen 3.3 up to and including 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.3.2
Xen Xen 3.4.0
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 4.0.0
Xen Xen 4.0.1
Xen Xen 4.0.2
Xen Xen 4.0.3
6.5
CVSSv3
CVE-2020-26145
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary netwo...
Samsung Galaxy I9305 Firmware 4.4.4
Siemens 6gk5763-1al00-7da0 Firmware
Siemens 6gk5766-1ge00-7da0 Firmware
Siemens 6gk5766-1ge00-7db0 Firmware
Siemens 6gk5766-1je00-7da0 Firmware
Siemens 6gk5766-1ge00-7ta0 Firmware
Siemens 6gk5766-1ge00-7tb0 Firmware
Siemens 6gk5766-1je00-7ta0 Firmware
Siemens 6gk5763-1al00-3aa0 Firmware
Siemens 6gk5763-1al00-3da0 Firmware
Siemens 6gk5766-1ge00-3da0 Firmware
Siemens 6gk5766-1ge00-3db0 Firmware
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
type confusion
CVE-2025-25205
pihome-shc
CVE-2025-26356
progress® telerik® document processing libraries
CVE-2025-24472
race condition
code-projects
CVE-2025-1100
unauthorized
CVE-2025-0556
CVE-2024-46982
telerik ui for winui
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started