Логотип exploitDog
bind:CVE-2024-41928
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-41928

Количество 2

Количество 2

nvd логотип

CVE-2024-41928

больше 1 года назад

Malicious software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-c77x-v69r-5vpg

больше 1 года назад

Malicious software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-41928

Malicious software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

CVSS3: 8.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-c77x-v69r-5vpg

Malicious software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

CVSS3: 8.4
0%
Низкий
больше 1 года назад

Уязвимостей на страницу