cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-7258,https://securityvulnerability.io/vulnerability/CVE-2023-7258,Gvisor Sandbox Under Attack: Root Access Required for Panic,"A denial of service exists in Gvisor Sandbox where a bug in reference counting code in mount point tracking could lead to a panic, making it possible for an attacker running as root and with permission to mount volumes to kill the sandbox. We recommend upgrading past commit 6a112c60a257dadac59962e0bc9e9b5aee70b5b6",Google,Gvisor,4.8,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-15T16:29:08.574Z,0 CVE-2018-20168,https://securityvulnerability.io/vulnerability/CVE-2018-20168,,"Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service (""physical address not valid"" panic) via a crafted application.",Google,Gvisor,5.5,MEDIUM,0.0005099999834783375,false,false,false,false,,false,false,2018-12-17T05:00:00.000Z,0 CVE-2018-19333,https://securityvulnerability.io/vulnerability/CVE-2018-19333,,"pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.",Google,Gvisor,9.8,CRITICAL,0.0036700000055134296,false,false,false,false,,false,false,2018-11-17T17:00:00.000Z,0 CVE-2018-16359,https://securityvulnerability.io/vulnerability/CVE-2018-16359,,"Google gVisor before 2018-08-23, within the seccomp sandbox, permits access to the renameat system call, which allows attackers to rename files on the host OS.",Google,Gvisor,6.8,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2018-09-02T22:00:00.000Z,0