Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 24 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Session VNC may be accessed by other sessions on the same host in stardust | |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Fri, 20 Dec 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stardust is a platform for streaming isolated desktop containers. With this exploit, inter container communication (ICC) is not disabled. This would allow users within a container to access another containers agent, therefore compromising access.The problem has been patched in any Stardust build past 12/20/24. Users are advised to upgrade. Users may also manually disable ICC if they are unable to upgrade. | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-20T20:01:48.624Z
Updated: 2024-12-24T16:34:13.485Z
Reserved: 2024-12-19T18:34:22.765Z
Link: CVE-2024-56330
Updated: 2024-12-24T16:34:09.332Z
Status : Received
Published: 2024-12-20T20:15:24.167
Modified: 2024-12-20T20:15:24.167
Link: CVE-2024-56330
No data.
ReportizFlow