Known Vulnerabilities for Xen-unstable by Xen

Listed below are 1 of the newest known vulnerabilities associated with the software "Xen-unstable" by "Xen".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-22180 An Improper Check for Unusual or Exceptional Conditions vulnerability in the processing of specific IPv6 packets on certain E... 7.5 - HIGH 2022-01-19 2022-01-19
CVE-2021-24818 The WP Limits WordPress plugin through 1.0 does not have CSRF check when saving its settings, allowing attacker to make a log... 7.5 - HIGH 2021-12-13 2021-12-13
CVE-2012-2625 The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized gu... 2.7 - LOW 2012-10-31 2018-04-13

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
XenXen-unstable25589\60f09d1ab1feAllAll
Operating
System
XenXen-unstable25588\42f76d536b11AllAll
Operating
System
XenXen-unstable25587\2cffb7bf6e57AllAll
Operating
System
XenXen-unstable25586\1b3198c8f140AllAll
Operating
System
XenXen-unstable25585\46b201f42bf8AllAll
Operating
System
XenXen-unstable25584\481d7293aa53AllAll
Operating
System
XenXen-unstable25583\5d432081deddAllAll
Operating
System
XenXen-unstable25582\9faae502bb9eAllAll
Operating
System
XenXen-unstable25581\1b7c5fbfbcdfAllAll
Operating
System
XenXen-unstable25580\126681c08a62AllAll
Operating
System
XenXen-unstable25579\94984e45e189AllAll
Operating
System
XenXen-unstable25578\a9d004e63315AllAll
Operating
System
XenXen-unstable25577\d3dd28a6cdd0AllAll
Operating
System
XenXen-unstable25576\47a289c3b8f5AllAll
Operating
System
XenXen-unstable25575\2903a2dc7749AllAll
Operating
System
XenXen-unstable25574\6a89e6f4eadcAllAll
Operating
System
XenXen-unstable25573\51ad440f9efdAllAll
Operating
System
XenXen-unstable25572\f4e7fd47613cAllAll
Operating
System
XenXen-unstable25571\a37ff29c027bAllAll
Operating
System
XenXen-unstable25570\52942b34a170AllAll

Popular searches for Xen-unstable

xen-unstable.hg: log

xenbits.xensource.com/xen-unstable.hg

xen-unstable.hg: log

X86 Mercurial Log file Xen Paging Direct memory access Windows 10 Idle (CPU) Computer file List of DOS commands Changeset Go (programming language) Programming tool Central processing unit Data logger Erratum Workaround Bit Tag (metadata) Linux

xen-command-line

xenbits.xen.org/docs/unstable/misc/xen-command-line.html

en-command-line This document covers the command line options which the Hypervisor. An integer parameter will default to decimal and may be prefixed with a - for negative numbers. Providing acpi=force will cause Xen b ` ^ to ignore the blacklist and attempt to use all ACPI features. 1.2.3 acpi pstate strict x86 .

Xen Advanced Configuration and Power Interface Command-line interface X86 Parameter (computer programming) Hypervisor Boolean data type Central processing unit Computer hardware Integer Default (computer science) Booting Integer (computer science) Decimal Parameter Advanced Programmable Interrupt Controller Negative number Debugging CPUID Value (computer science)

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report