Show filters
555 Total Results
Displaying 401-410 of 555
Sort by:
Attacker Value
Unknown
CVE-2014-5148
Disclosure Date: October 26, 2014 (last updated October 05, 2023)
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
0
Attacker Value
Unknown
CVE-2014-7156
Disclosure Date: October 02, 2014 (last updated October 05, 2023)
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-7154
Disclosure Date: October 02, 2014 (last updated October 05, 2023)
Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-7155
Disclosure Date: October 02, 2014 (last updated October 05, 2023)
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
0
Attacker Value
Unknown
CVE-2014-7188
Disclosure Date: October 02, 2014 (last updated October 05, 2023)
The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-5147
Disclosure Date: August 29, 2014 (last updated October 05, 2023)
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
0
Attacker Value
Unknown
CVE-2014-5149
Disclosure Date: August 22, 2014 (last updated October 05, 2023)
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
0
Attacker Value
Unknown
CVE-2014-5146
Disclosure Date: August 22, 2014 (last updated October 05, 2023)
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
0
Attacker Value
Unknown
CVE-2014-4022
Disclosure Date: July 09, 2014 (last updated October 05, 2023)
The alloc_domain_struct function in arch/arm/domain.c in Xen 4.4.x, when running on an ARM platform, does not properly initialize the structure containing the grant table pages for a domain, which allows local guest administrators to obtain sensitive information via the GNTTABOP_setup_table subhypercall.
0
Attacker Value
Unknown
CVE-2014-4602
Disclosure Date: July 01, 2014 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in xencarousel-admin.js.php in the XEN Carousel plugin 0.12.2 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) path or (2) ajaxpath parameter.
0