Vulnerability in Xen TMEMC_SAVE_GET_CLIENT_WEIGHT, TMEMC_SAVE_GET_CLIENT_CAP, TMEMC_SAVE_GET_CLIENT_FLAGS, and TMEMC_SAVE_END
Reporter | Title | Published | Views | Family All 87 |
---|---|---|---|---|
![]() | CVE-2012-3497 | 23 Nov 201200:00 | – | ubuntucve |
![]() | Null pointer dereference | 23 Nov 201220:55 | – | prion |
![]() | Stack overflow | 23 Nov 201220:55 | – | prion |
![]() | Memory corruption | 23 Nov 201220:55 | – | prion |
![]() | Design/Logic Flaw | 23 Nov 201220:55 | – | prion |
![]() | Design/Logic Flaw | 23 Nov 201220:55 | – | prion |
![]() | Memory corruption | 23 Nov 201220:55 | – | prion |
![]() | Memory corruption | 23 Nov 201220:55 | – | prion |
![]() | Integer overflow | 23 Nov 201220:55 | – | prion |
![]() | CVE-2012-3497 | 23 Nov 201220:55 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | xen | 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 11 | all | xen | 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 999 | all | xen | 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 13 | all | xen | 4.1.4-1 | xen_4.1.4-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo