Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2018-19962
Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
0
Attacker Value
Unknown
CVE-2018-19961
Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
0
Attacker Value
Unknown
CVE-2018-19965
Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
0
Attacker Value
Unknown
CVE-2015-7704
Disclosure Date: August 07, 2017 (last updated November 26, 2024)
The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
0
Attacker Value
Unknown
CVE-2016-3712
Disclosure Date: May 11, 2016 (last updated November 25, 2024)
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
0
Attacker Value
Unknown
CVE-2016-3710
Disclosure Date: May 11, 2016 (last updated November 25, 2024)
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
0