Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
xenserver Vendor: citrix

About This Product

xenserver is a software product offered by citrix. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 51 known vulnerabilities affecting citrix xenserver. This includes 3 critical-severity issues and 21 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2008 to 2024, indicating a sustained research interest and ongoing security attention. 24 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-3253 2008-07-22 2025-04-09 - 4.3 Likely
CVE-2010-0633 2010-02-12 2025-04-11 - 4.6 Unknown
CVE-2010-2619 2010-07-02 2025-04-11 - 1.9 Unknown
CVE-2012-0217 2012-06-12 2025-04-11 - 7.2 Unknown
CVE-2012-3494 2012-11-23 2025-04-11 - 2.1 Unknown
CVE-2012-3495 2012-11-23 2025-04-11 - 6.1 Unknown
CVE-2012-3496 2012-11-23 2025-04-11 - 4.7 Unknown
CVE-2012-3498 2012-11-23 2025-04-11 - 5.6 Unknown
CVE-2012-3516 2012-11-23 2025-04-11 - 6.9 Unknown
CVE-2012-5512 2012-12-13 2025-04-11 - 3.2 Unknown
CVE-2014-4947 2014-07-22 2025-04-12 - 10.0 Likely
CVE-2014-4948 2014-07-22 2025-04-12 - 6.4 Likely
CVE-2015-4106 2015-06-03 2025-04-12 - 4.6 Unknown
CVE-2016-1571 2016-01-22 2025-04-12 6.3 4.7 Unknown
CVE-2015-8555 2016-04-13 2025-04-12 8.6 5.0 Likely
CVE-2016-3710 2016-05-11 2025-04-12 8.8 7.2 Unknown
CVE-2016-3712 2016-05-11 2025-04-12 5.5 2.1 Unknown
CVE-2016-5302 2016-06-13 2025-04-12 9.8 7.5 Likely
CVE-2016-6258 2016-08-02 2025-04-12 8.8 7.2 Unknown
CVE-2016-6259 2016-08-02 2025-04-12 6.2 4.9 Unknown
CVE-2016-9379 2017-01-23 2025-04-20 7.9 4.6 Unknown
CVE-2016-9380 2017-01-23 2025-04-20 7.5 4.6 Unknown
CVE-2016-9381 2017-01-23 2025-04-20 7.5 6.9 Unknown
CVE-2016-9382 2017-01-23 2025-04-20 7.8 4.6 Unknown
CVE-2016-9383 2017-01-23 2025-04-20 8.8 7.2 Unknown
CVE-2016-9385 2017-01-23 2025-04-20 6.0 4.9 Unknown
CVE-2016-9386 2017-01-23 2025-04-20 7.8 4.6 Unknown
CVE-2016-10024 2017-01-26 2025-04-20 6.0 4.9 Unknown
CVE-2016-10025 2017-01-26 2025-04-20 5.5 2.1 Unknown
CVE-2017-5572 2017-01-30 2025-04-20 6.5 5.5 Likely
CVE-2017-5573 2017-01-30 2025-04-20 4.9 4.0 Likely
CVE-2016-9637 2017-02-17 2025-04-20 7.5 3.7 Unknown
CVE-2015-7704 2017-08-07 2025-04-20 7.5 5.0 Likely
CVE-2015-7705 2017-08-07 2025-04-20 9.8 7.5 Likely
CVE-2017-12134 2017-08-24 2025-04-20 8.8 7.2 Unknown
CVE-2017-12135 2017-08-24 2025-04-20 8.8 4.6 Unknown
CVE-2017-12136 2017-08-24 2025-04-20 7.8 6.9 Unknown
CVE-2017-12137 2017-08-24 2025-04-20 8.8 7.2 Unknown
CVE-2018-8897 2018-05-08 2024-11-21 7.8 7.2 Unknown
CVE-2018-3665 2018-06-21 2024-11-21 5.6 4.7 Unknown
CVE-2018-11053 2018-06-26 2024-11-21 6.5 4.0 Likely
CVE-2017-2615 2018-07-03 2024-11-21 5.5 9.0 Likely
CVE-2017-2620 2018-07-27 2024-11-21 5.5 9.0 Likely
CVE-2016-9603 2018-07-27 2024-11-21 5.5 9.0 Likely
CVE-2018-14007 2018-08-15 2024-11-21 9.8 10.0 Likely
CVE-2018-19961 2018-12-08 2024-11-21 7.8 6.9 Unknown
CVE-2018-19962 2018-12-08 2024-11-21 7.8 6.9 Unknown
CVE-2018-19965 2018-12-08 2024-11-21 5.6 4.7 Unknown
CVE-2014-3798 2019-07-11 2024-11-21 6.5 6.1 Unknown
CVE-2012-4606 2020-01-23 2024-11-21 7.8 4.6 Unknown
CVE-2024-5661 2024-06-13 2024-11-21 6.0 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for citrix xenserver by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.