Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.6.1 vulnerabilities and exploits
(subscribe to this query)
0.000
EPSS
CVE-2016-2271
VMX in Xen 4.6.x and previous versions, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
Xen Xen 4.6.0
Xen Xen 4.6.1
0.000
EPSS
CVE-2017-8905
Xen up to and including 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.2
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
1 Github repository
0.007
EPSS
CVE-2017-10923
Xen up to and including 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.2
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.7.1
Xen Xen 4.8.0
Xen Xen 4.8.1
0.001
EPSS
CVE-2016-5242
The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x up to and including 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them,...
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.6.0
Xen Xen 4.6.1
0.001
EPSS
CVE-2016-10025
VMFUNC emulation in Xen 4.6.x up to and including 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.7.0
Xen Xen 4.7.1
Xen Xen 4.8.0
Citrix Xenserver 6.0.2
Citrix Xenserver 6.2.0
Citrix Xenserver 6.5
Citrix Xenserver 7.0
0.003
EPSS
CVE-2017-10916
The vCPU context-switch implementation in Xen up to and including 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.2
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.7.1
Xen Xen 4.8.0
0.007
EPSS
CVE-2015-8555
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and previous versions do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vect...
Citrix Xenserver 6.0
Xen Xen 4.3.0
Xen Xen 4.3.1
Xen Xen 4.3.2
Xen Xen 4.3.3
Xen Xen 4.3.4
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
Xen Xen 4.5.0
0.000
EPSS
CVE-2016-6259
Xen 4.5.x up to and including 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.7.0
Citrix Xenserver 6.0
Citrix Xenserver 6.0.2
Citrix Xenserver 6.1
Citrix Xenserver 6.2.0
0.000
EPSS
CVE-2017-14318
An issue exists in Xen 4.5.x up to and including 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table i...
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.6.6
Xen Xen 4.7.0
0.000
EPSS
CVE-2017-12855
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances...
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.6.6
Xen Xen 4.7.0
Preferred Score:
EPSS
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
physical
privilege
CVE-2025-26475
cozystay - hotel booking wordpress theme
CVE-2025-1316
CVE-2024-27564
CVE-2025-29137
dell
CVE-2025-25589
hcl software
loftocean
inject
CVE-2025-30140
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »