Show filters
134 Total Results
Displaying 1-10 of 134
Sort by:
Attacker Value
Unknown

CVE-2020-25494

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
Attacker Value
Unknown

CVE-2024-5661

Disclosure Date: June 13, 2024 (last updated February 26, 2025)
An issue has been identified in both XenServer 8 and Citrix Hypervisor 8.2 CU1 LTSR which may allow a malicious administrator of a guest VM to cause the host to become slow and/or unresponsive.
Attacker Value
Unknown

CVE-2020-25495

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
A reflected Cross-site scripting (XSS) vulnerability in Xinuo (formerly SCO) Openserver version 5 and 6 allows remote attackers to inject arbitrary web script or HTML tag via the parameter 'section'.
Attacker Value
Unknown

CVE-2012-4606

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Citrix XenServer 4.1, 6.0, 5.6 SP2, 5.6 Feature Pack 1, 5.6 Common Criteria, 5.6, 5.5, 5.0, and 5.0 Update 3 contains a Local Privilege Escalation Vulnerability which could allow local users with access to a guest operating system to gain elevated privileges.
Attacker Value
Unknown

CVE-2014-3798

Disclosure Date: July 11, 2019 (last updated November 27, 2024)
The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame.
0
Attacker Value
Unknown

CVE-2018-19962

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
0
Attacker Value
Unknown

CVE-2018-19961

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
0
Attacker Value
Unknown

CVE-2018-19965

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
0
Attacker Value
Unknown

CVE-2018-14007

Disclosure Date: August 15, 2018 (last updated November 27, 2024)
Citrix XenServer 7.1 and newer allows Directory Traversal.
0
Attacker Value
Unknown

CVE-2016-9603

Disclosure Date: July 27, 2018 (last updated November 08, 2023)
A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
0