xen
CVE Severity Distribution (All Time)
Timeline Overview
Products
View allRecent CVEs
View allA cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary…
PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied…
The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there …
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can…
When multiple devices share resources and one of them is to be passed through to a guest, security of the entire system and of respective guests indi…
Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or …