cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-27561,https://securityvulnerability.io/vulnerability/CVE-2023-27561,Privilege Escalation Vulnerability in runc from OpenContainers,"The runc container runtime, specifically versions up to 1.1.4, exhibits a vulnerability characterized by incorrect access control that can potentially allow an attacker to escalate privileges. This issue arises when an attacker can create two containers with custom volume-mount configurations alongside the ability to execute custom images. The vulnerability also stems from a regression related to CVE-2019-19921, highlighting the need for careful configuration management in containerized environments.",Linux,Runc,7,HIGH,0.000539999979082495,false,,false,false,false,,,false,false,,2023-03-03T00:00:00.000Z,0 CVE-2021-30465,https://securityvulnerability.io/vulnerability/CVE-2021-30465,,"runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.",Linux,Runc,8.5,HIGH,0.0021699999924749136,false,,false,false,false,,,false,false,,2021-05-27T00:00:00.000Z,0 CVE-2019-19921,https://securityvulnerability.io/vulnerability/CVE-2019-19921,,"runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)",Linux,Runc,7,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2020-02-12T00:00:00.000Z,0 CVE-2019-16884,https://securityvulnerability.io/vulnerability/CVE-2019-16884,,"runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.",Linux,Runc,7.5,HIGH,0.00267999991774559,false,,false,false,false,,,false,false,,2019-09-25T00:00:00.000Z,0