Vulnerability Database

With exploit

xen / xen

Title Severity Exploit Date Affected Version
CVE-2013-4361 Low Oct 1, 2013 == 4.1.5
== 4.2.2
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.1.3
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 3.3.0
== 4.2.1
== 4.0.1
== 4.0.3
CVE-2011-2901 Medium Oct 1, 2013 == 3.2.0
== 3.2.1
== 3.0.4
<= 3.3.0
== 3.2.2
== 3.0.3
== 3.2.3
== 3.0.2
== 3.1.4
== 3.1.3
CVE-2013-1442 Low Sep 30, 2013 == 4.1.5
== 4.2.2
== 4.2.3
== 4.3.0
== 4.0.4
== 4.0.2
== 4.1.2
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.1
== 4.0.1
== 4.0.3
CVE-2013-4329 Medium Sep 12, 2013 == 4.1.5
== 4.2.2
== 4.2.3
== 4.0.4
== 4.0.2
== 4.1.2
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.1
== 4.0.1
== 4.0.3
CVE-2013-1432 High Aug 28, 2013 == 4.2.2
== 4.2.0
== 4.2.1
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
CVE-2013-2072 High Aug 28, 2013 == 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.2
== 4.2.0
== 4.2.1
== 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
CVE-2013-2076 Low Aug 28, 2013 == 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
== 4.2.2
== 4.2.0
== 4.2.1
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
CVE-2013-2077 Medium Aug 28, 2013 == 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.2
== 4.2.0
== 4.2.1
CVE-2013-2211 High Aug 28, 2013 == 4.2.2
== 4.2.0
== 4.2.1
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
CVE-2013-2212 Medium Aug 28, 2013 == 4.1.5
== 4.2.2
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.1.3
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 3.3.0
== 4.2.1
== 4.0.1
== 4.0.3