Show filters
134 Total Results
Displaying 31-40 of 134
Sort by:
Attacker Value
Unknown
CVE-2016-9379
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
0
Attacker Value
Unknown
CVE-2016-9382
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
0
Attacker Value
Unknown
CVE-2016-9385
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
0
Attacker Value
Unknown
CVE-2016-6258
Disclosure Date: August 02, 2016 (last updated November 25, 2024)
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
0
Attacker Value
Unknown
CVE-2016-6259
Disclosure Date: August 02, 2016 (last updated November 25, 2024)
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
0
Attacker Value
Unknown
CVE-2016-5302
Disclosure Date: June 13, 2016 (last updated November 25, 2024)
Citrix XenServer 7.0 before Hotfix XS70E003, when a deployment has been upgraded from an earlier release, might allow remote attackers on the management network to "compromise" a host by leveraging credentials for an Active Directory account.
0
Attacker Value
Unknown
CVE-2016-3712
Disclosure Date: May 11, 2016 (last updated November 25, 2024)
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
0
Attacker Value
Unknown
CVE-2016-3710
Disclosure Date: May 11, 2016 (last updated November 25, 2024)
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
0
Attacker Value
Unknown
CVE-2015-8555
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
0
Attacker Value
Unknown
CVE-2016-1571
Disclosure Date: January 22, 2016 (last updated November 25, 2024)
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
0