Vulnerability Database

With exploit

xen / xen

Title Severity Exploit Date Affected Version
CVE-2013-2072 High Aug 28, 2013 == 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.2
== 4.2.0
== 4.2.1
== 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
CVE-2013-2076 Low Aug 28, 2013 == 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
== 4.2.2
== 4.2.0
== 4.2.1
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
CVE-2013-2077 Medium Aug 28, 2013 == 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.2
== 4.2.0
== 4.2.1
CVE-2013-2211 High Aug 28, 2013 == 4.2.2
== 4.2.0
== 4.2.1
== 4.1.5
== 4.1.2
== 4.1.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.0.4
== 4.0.2
== 4.0.0
== 4.0.1
== 4.0.3
CVE-2013-2212 Medium Aug 28, 2013 == 4.1.5
== 4.2.2
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.1.3
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 3.3.0
== 4.2.1
== 4.0.1
== 4.0.3
CVE-2013-3495 Low Aug 28, 2013 == 4.1.5
== 4.2.2
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.1.3
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 3.3.0
== 4.2.1
== 4.0.1
== 4.0.3
CVE-2013-2194 Medium Aug 23, 2013 == 4.2.0
<= 4.2.2
== 4.2.1
CVE-2013-2195 Medium Aug 23, 2013 == 4.2.0
<= 4.2.2
== 4.2.1
CVE-2013-2196 Medium Aug 23, 2013 == 4.2.0
<= 4.2.2
== 4.2.1
CVE-2013-2078 Low Aug 14, 2013 == 4.1.5
== 4.2.2
== 4.0.4
== 4.0.2
== 4.1.2
== 4.1.1
== 4.2.0
== 4.1.0
== 4.1.3
== 4.1.4
== 4.2.1
== 4.0.3