Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-rb61-s8yy-6fh1
SummaryVulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
Aliases
0
alias CVE-2017-10129
Fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
3
url pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.8-dfsg-1%3Fdistro=sid
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10129
reference_id
reference_type
scores
0
value 0.00273
scoring_system epss
scoring_elements 0.50731
published_at 2026-05-14T12:55:00Z
1
value 0.00273
scoring_system epss
scoring_elements 0.50687
published_at 2026-04-02T12:55:00Z
2
value 0.00273
scoring_system epss
scoring_elements 0.50638
published_at 2026-05-07T12:55:00Z
3
value 0.00273
scoring_system epss
scoring_elements 0.50623
published_at 2026-05-11T12:55:00Z
4
value 0.00273
scoring_system epss
scoring_elements 0.50654
published_at 2026-05-12T12:55:00Z
5
value 0.00273
scoring_system epss
scoring_elements 0.50633
published_at 2026-04-01T12:55:00Z
6
value 0.00273
scoring_system epss
scoring_elements 0.50713
published_at 2026-04-04T12:55:00Z
7
value 0.00273
scoring_system epss
scoring_elements 0.50669
published_at 2026-05-09T12:55:00Z
8
value 0.00273
scoring_system epss
scoring_elements 0.50724
published_at 2026-04-13T12:55:00Z
9
value 0.00273
scoring_system epss
scoring_elements 0.5072
published_at 2026-04-09T12:55:00Z
10
value 0.00273
scoring_system epss
scoring_elements 0.50763
published_at 2026-04-11T12:55:00Z
11
value 0.00273
scoring_system epss
scoring_elements 0.50739
published_at 2026-04-12T12:55:00Z
12
value 0.00273
scoring_system epss
scoring_elements 0.50764
published_at 2026-04-16T12:55:00Z
13
value 0.00273
scoring_system epss
scoring_elements 0.5077
published_at 2026-04-18T12:55:00Z
14
value 0.00273
scoring_system epss
scoring_elements 0.5075
published_at 2026-04-21T12:55:00Z
15
value 0.00273
scoring_system epss
scoring_elements 0.50699
published_at 2026-04-24T12:55:00Z
16
value 0.00273
scoring_system epss
scoring_elements 0.50708
published_at 2026-04-26T12:55:00Z
17
value 0.00273
scoring_system epss
scoring_elements 0.50663
published_at 2026-04-29T12:55:00Z
18
value 0.00273
scoring_system epss
scoring_elements 0.50584
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10129
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:23Z/
url http://www.securitytracker.com/id/1038929
2
reference_url https://www.exploit-db.com/exploits/42426/
reference_id 42426
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:23Z/
url https://www.exploit-db.com/exploits/42426/
3
reference_url http://www.securityfocus.com/bid/99638
reference_id 99638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:23Z/
url http://www.securityfocus.com/bid/99638
4
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1296
reference_id CVE-2017-10129
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1296
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42426.txt
reference_id CVE-2017-10129
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42426.txt
Weaknesses
Exploits
0
date_added 2017-08-03
description VirtualBox 5.1.22 - Windows Process DLL UNC Path Signature Bypass Privilege Escalation
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2017-08-03
exploit_type local
platform windows
source_date_updated 2017-08-03
data_source Exploit-DB
source_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1296
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-rb61-s8yy-6fh1