Vulnerability Database

With exploit

xen / xen

Title Severity Exploit Date Affected Version
CVE-2015-4164 Low Jun 15, 2015 == 3.2.0
== 4.1.5
== 3.2.1
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.2.2
== 3.4.4
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 3.2.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 3.1.4
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 3.1.3
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-4103 Low Jun 3, 2015 == 4.3.2
== 4.1.5
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-4104 High Jun 3, 2015 == 4.3.2
== 4.1.5
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-4105 Low Jun 3, 2015 == 4.3.2
== 4.1.5
== 4.2.2
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-3456 High May 13, 2015 == 4.5.0
CVE-2015-3340 Low Apr 28, 2015 == 4.3.2
== 4.2.2
== 4.2.3
== 4.3.3
== 4.3.0
== 4.4.2
== 4.2.0
== 4.2.5
== 4.3.4
== 4.2.4
== 4.4.1
== 4.3.1
== 4.2.1
== 4.5.0
== 4.4.0
CVE-2015-0777 Low Apr 5, 2015 == 3.4.0
== 3.4.1
== 3.4.2
== 3.4.3
== 3.4.4
CVE-2015-2751 High Apr 1, 2015 == 4.3.2
== 4.3.0
== 4.4.0-rc1
== 4.4.1
== 4.3.1
== 4.5.0
== 4.4.0
CVE-2015-2752 Low Apr 1, 2015 == 4.3.2
== 4.3.0
== 4.4.1
== 4.3.1
== 4.5.0
== 4.4.0
CVE-2015-2756 Low Apr 1, 2015 == 4.3.2
== 4.3.0
== 4.4.1
== 4.3.1
== 4.5.0
== 4.4.0