Vulnerabilities > Xensource INC
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-04-02 | CVE-2008-1619 | Denial of Service vulnerability in Xensource INC XEN 5.1 The ssm_i emulation in Xen 5.1 on IA64 architectures allows attackers to cause a denial of service (dom0 panic) via certain traffic, as demonstrated using an FTP stress test tool. network xensource-inc | 4.3 |
2007-12-04 | CVE-2007-6207 | Improper Input Validation vulnerability in Xensource INC XEN Xen 3.x, possibly before 3.1.2, when running on IA64 systems, does not check the RID value for mov_to_rr, which allows a VTi domain to read memory of other domains. | 2.1 |
2007-11-09 | CVE-2007-5907 | Permissions, Privileges, and Access Controls vulnerability in Xensource INC XEN 3.1.1 Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash). | 4.7 |
2007-11-09 | CVE-2007-5906 | Local Denial of Service vulnerability in Xensource INC XEN 3.1.1 Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints. local xensource-inc | 4.7 |
2007-10-28 | CVE-2007-3919 | Link Following vulnerability in Xensource INC XEN 3.0.301/3.0.303 (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm. | 6.0 |
2007-09-27 | CVE-2007-4993 | Improper Input Validation vulnerability in Xensource INC XEN 3.0.3 pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements. | 6.9 |