cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2009-3940,https://securityvulnerability.io/vulnerability/CVE-2009-3940,,"Unspecified vulnerability in Guest Additions in Sun xVM VirtualBox 1.6.x and 2.0.x before 2.0.12, 2.1.x, and 2.2.x, and Sun VirtualBox before 3.0.10, allows guest OS users to cause a denial of service (memory consumption) on the guest OS via unknown vectors.",Oracle,"Virtualbox,Xvm Virtualbox",,,0.0005499999970197678,false,false,false,false,,false,false,2009-11-16T19:00:00.000Z,0 CVE-2009-0876,https://securityvulnerability.io/vulnerability/CVE-2009-0876,,"Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN.",Oracle,Xvm Virtualbox,,,0.0004299999854993075,false,false,false,false,,false,false,2009-03-12T15:00:00.000Z,0 CVE-2008-3431,https://securityvulnerability.io/vulnerability/CVE-2008-3431,,"The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.",Oracle,Xvm Virtualbox,8.8,HIGH,0.005189999938011169,true,false,false,true,,false,false,2008-08-05T19:20:00.000Z,0