{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:10:14.780","vulnerabilities":[{"cve":{"id":"CVE-2015-0361","sourceIdentifier":"cve@mitre.org","published":"2015-01-07T19:59:05.107","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Xen 4.2.x, 4.3.x, and 4.4.x allows remote domains to cause a denial of service (system crash) via a crafted hypercall during HVM guest teardown."},{"lang":"es","value":"Vulnerabilidad de uso después de liberación en Xen 4.2.x, 4.3.x, y 4.4.x permite a dominios remotos causar una denegación de servicio (caída del sistema) a través de una hiperllamada manipulada durante el apagado del modulo HVM de la maquina virtual."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","matchCriteriaId":"8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"47640819-FC43-49ED-8A77-728C3D7255B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","matchCriteriaId":"2448537F-87AD-45C1-9FB0-7A49CA31BD76"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","matchCriteriaId":"E36B2265-70E1-413B-A7CF-79D39E9ADCFB"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","matchCriteriaId":"37148A72-BE20-45C5-8589-2309ED84D08C"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","matchCriteriaId":"FB736B4C-325A-4B27-8C8A-15E60B8A8C82"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"BF948E6A-07BE-4C7D-8A98-002E89D35F4D"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"C0E23B94-1726-4F63-84BB-8D83FAB156D7"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C76124AB-4E3D-4BE0-AAEA-7FC05868E2FB"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","matchCriteriaId":"F30B5EF5-0AE8-420B-A103-B1B25A372F09"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"1044792C-D544-457C-9391-4F3B5BAB978D"},{"vulnerable":true,"criteria":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBD9AD01-50B7-4951-8A73-A6CF4801A487"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","matchCriteriaId":"A10BC294-9196-425F-9FB0-B1625465B47F"},{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","matchCriteriaId":"03117DF1-3BEC-4B8D-AD63-DBBDB2126081"}]}]}],"references":[{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148103.html","source":"cve@mitre.org"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148241.html","source":"cve@mitre.org"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/71882","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id/1031498","source":"cve@mitre.org"},{"url":"http://xenbits.xen.org/xsa/advisory-116.html","source":"cve@mitre.org","tags":["Mitigation","Patch","Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201504-04","source":"cve@mitre.org"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148103.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148241.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/71882","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1031498","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xenbits.xen.org/xsa/advisory-116.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Patch","Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201504-04","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>"}}]}