cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-10603,https://securityvulnerability.io/vulnerability/CVE-2024-10603,Weakness in TCP/UDP Source Port Generation in Google's gVisor,"Google's gVisor has a vulnerability related to the generation of TCP and UDP source ports, where these values can be predicted by an external attacker under certain conditions. This weakness could enable attackers to exploit the affected systems, raising concerns about the security posture of applications utilizing gVisor for container isolation. Addressing this flaw is essential to ensuring the integrity and confidentiality of network communications.",Google,Gvisor,6.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-30T19:14:38.619Z,0 CVE-2024-10026,https://securityvulnerability.io/vulnerability/CVE-2024-10026,Weak Hashing Algorithm in Google gVisor Exposes Device Tracking Risks,"A vulnerability in Google's gVisor arises from the use of a weak hashing algorithm combined with small sizes of seeds and secrets. This flaw allows remote attackers to potentially calculate a local IP address and generate a per-boot identifier, which can be exploited to track devices under specific conditions. As a result, the integrity and privacy of user sessions may be compromised, highlighting the need for enhanced security measures in gVisor's design.",Google,Gvisor,6.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-30T19:12:27.994Z,0 CVE-2023-7258,https://securityvulnerability.io/vulnerability/CVE-2023-7258,Gvisor Sandbox Under Attack: Root Access Required for Panic,"A denial of service exists in Gvisor Sandbox where a bug in reference counting code in mount point tracking could lead to a panic, making it possible for an attacker running as root and with permission to mount volumes to kill the sandbox. We recommend upgrading past commit 6a112c60a257dadac59962e0bc9e9b5aee70b5b6",Google,Gvisor,4.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-15T16:29:08.574Z,0 CVE-2018-20168,https://securityvulnerability.io/vulnerability/CVE-2018-20168,,"Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service (""physical address not valid"" panic) via a crafted application.",Google,Gvisor,5.5,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2018-12-17T05:00:00.000Z,0 CVE-2018-19333,https://securityvulnerability.io/vulnerability/CVE-2018-19333,,"pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.",Google,Gvisor,9.8,CRITICAL,0.0036700000055134296,false,,false,false,false,,,false,false,,2018-11-17T17:00:00.000Z,0 CVE-2018-16359,https://securityvulnerability.io/vulnerability/CVE-2018-16359,,"Google gVisor before 2018-08-23, within the seccomp sandbox, permits access to the renameat system call, which allows attackers to rename files on the host OS.",Google,Gvisor,6.8,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2018-09-02T22:00:00.000Z,0