Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xenserver vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2021-28688
The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of clean...
Linux Linux Kernel
Debian Debian Linux 9.0
4.9
CVSSv2
CVE-2021-28038
An issue exists in the Linux kernel up to and including 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of se...
Linux Linux Kernel 5.12
Linux Linux Kernel
Debian Debian Linux 9.0
Netapp Cloud Backup -
Netapp Solidfire Baseboard Management Controller Firmware -
7.8
CVSSv2
CVE-2020-35498
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest...
Openvswitch Openvswitch
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 33
1 Github repository
4.6
CVSSv2
CVE-2012-4606
Citrix XenServer 4.1, 6.0, 5.6 SP2, 5.6 Feature Pack 1, 5.6 Common Criteria, 5.6, 5.5, 5.0, and 5.0 Update 3 contains a Local Privilege Escalation Vulnerability which could allow local users with access to a guest operating system to gain elevated privileges.
Citrix Xenserver 4.1
Citrix Xenserver 5.0
Citrix Xenserver 5.5
Citrix Xenserver 5.6
Citrix Xenserver 6.0
6.1
CVSSv2
CVE-2014-3798
The Windows Guest Tools in Citrix XenServer 6.2 SP1 and previous versions allows remote malicious users to cause a denial of service (guest OS crash) via a crafted Ethernet frame.
Citrix Xenserver 6.2.0
Citrix Xenserver 6.0
Citrix Xenserver 6.0.2
Citrix Xenserver 6.1.0
6.9
CVSSv2
CVE-2018-19961
An issue exists in Xen up to and including 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
Xen Xen
Debian Debian Linux 9.0
Citrix Xenserver 7.0
Citrix Xenserver 7.5
Citrix Xenserver 7.6
Citrix Xenserver 7.1
6.9
CVSSv2
CVE-2018-19962
An issue exists in Xen up to and including 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
Xen Xen
Debian Debian Linux 9.0
Citrix Xenserver 7.0
Citrix Xenserver 7.5
Citrix Xenserver 7.6
Citrix Xenserver 7.1
4.7
CVSSv2
CVE-2018-19965
An issue exists in Xen up to and including 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-575...
Xen Xen
Citrix Xenserver 7.0
Citrix Xenserver 7.5
Citrix Xenserver 7.6
Citrix Xenserver 7.1
Debian Debian Linux 9.0
2 Github repositories
4.9
CVSSv2
CVE-2018-19967
An issue exists in Xen up to and including 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
Xen Xen
Debian Debian Linux 9.0
7.2
CVSSv2
CVE-2018-18883
An issue exists in Xen 4.9.x up to and including 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
Xen Xen
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »