Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 4.9.0 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2017-15588
An issue exists in Xen up to and including 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
Xen Xen 4.9.0
6.5
CVSSv3
CVE-2017-15589
An issue exists in Xen up to and including 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
Xen Xen 4.9.0
8.8
CVSSv3
CVE-2017-15590
An issue exists in Xen up to and including 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.
Xen Xen 4.9.0
6.5
CVSSv3
CVE-2017-14318
An issue exists in Xen 4.5.x up to and including 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table i...
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.6.6
Xen Xen 4.7.0
6.5
CVSSv3
CVE-2017-15591
An issue exists in Xen 4.5.x up to and including 4.9.x allowing attackers (who control a stub domain kernel or tool stack) to cause a denial of service (host OS crash) because of a missing comparison (of range start to range end) within the DMOP map/unmap implementation.
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.6.6
Xen Xen 4.7.0
6.5
CVSSv3
CVE-2017-12855
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances...
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.5
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.6.6
Xen Xen 4.7.0
7.8
CVSSv3
CVE-2017-12136
Race condition in the grant table code in Xen 4.6.x up to and including 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.
Xen Xen 4.6.0
Xen Xen 4.6.1
Xen Xen 4.6.3
Xen Xen 4.6.4
Xen Xen 4.6.5
Xen Xen 4.6.6
Xen Xen 4.7.0
Xen Xen 4.7.1
Xen Xen 4.7.2
Xen Xen 4.7.3
Xen Xen 4.8.0
Xen Xen 4.8.1
6
CVSSv3
CVE-2017-15596
An issue exists in Xen 4.4.x up to and including 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
Xen Xen 4.4.0
Xen Xen 4.4.1
Xen Xen 4.4.2
Xen Xen 4.4.3
Xen Xen 4.4.4
Xen Xen 4.5.0
Xen Xen 4.5.1
Xen Xen 4.5.2
Xen Xen 4.5.3
Xen Xen 4.5.4
Xen Xen 4.5.5
Xen Xen 4.6.0
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-21317
CVE-2025-23940
buffer overflow
CVE-2025-21335
CVE-2025-23860
CVE-2024-57704
SSTI
wireless
CVE-2019-3309
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started