Bypassing VirtualBox Process Hardening on Windows, protecting processes from users,specifically administrators with Debug privilege, by Oracle’s VirtualBox Process Hardening, enlists kernel support to protect its processes from user compromise
Reporter | Title | Published | Views | Family All 50 |
---|---|---|---|---|
UbuntuCve | CVE-2017-10204 | 8 Aug 201700:00 | – | ubuntucve |
UbuntuCve | CVE-2017-10129 | 8 Aug 201700:00 | – | ubuntucve |
UbuntuCve | CVE-2017-3563 | 24 Apr 201700:00 | – | ubuntucve |
Prion | Buffer overflow | 8 Aug 201715:29 | – | prion |
Prion | Buffer overflow | 8 Aug 201715:29 | – | prion |
Prion | Buffer overflow | 24 Apr 201719:59 | – | prion |
Exploit DB | VirtualBox 6.0.4 r128413 - COM RPC Interface Code Injection Host Privilege Escalation | 24 Apr 201900:00 | – | exploitdb |
CVE | CVE-2017-10129 | 8 Aug 201715:29 | – | cve |
CVE | CVE-2017-10204 | 8 Aug 201715:29 | – | cve |
CVE | CVE-2017-3563 | 24 Apr 201719:59 | – | cve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo