Vulnerability Database

With exploit

xen / xen

Title Severity Exploit Date Affected Version
CVE-2015-2152 Low Mar 18, 2015 <= 4.5.0
CVE-2015-2044 Low Mar 12, 2015 == 3.2.0
== 4.1.5
== 3.2.1
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.2.2
== 3.4.4
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 3.2.3
== 4.1.6.1
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-2045 Low Mar 12, 2015 == 3.2.0
== 4.1.5
== 3.2.1
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.2.2
== 3.4.4
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 3.2.3
== 4.1.6.1
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-2150 Low Mar 12, 2015 == 4.1.5
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-2151 High Mar 12, 2015 == 3.2.0
== 4.1.5
== 3.2.1
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.2.2
== 3.4.4
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 3.2.3
== 4.1.6.1
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2015-0268 Low Feb 16, 2015 == 4.5.0
CVE-2015-1563 Low Feb 9, 2015 == 4.1.5
== 4.2.2
== 4.2.3
== 4.3.0
== 4.0.4
== 4.0.2
== 4.1.2
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 4.1.3
== 4.1.6.1
== 4.1.4
== 4.4.1
== 4.3.1
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
CVE-2014-6268 Low Jan 12, 2015 == 4.4.0-rc1
== 4.4.1
== 4.4.0
CVE-2015-0361 High Jan 7, 2015 == 4.3.2
== 4.2.2
== 4.2.3
== 4.3.3
== 4.3.0
== 4.2.0
== 4.2.5
== 4.2.4
== 4.4.1
== 4.3.1
== 4.2.1
== 4.4.0
CVE-2014-9065 Low Dec 10, 2014 <= 4.4.1