For example, it may be possible to inject code into a vulnerable application via specially crafted DLL files or malicious websites. This may result in Remote Code Execution as well as Information Disclosure issues. Memory Corruption vulnerabilities may also be leveraged to bypass application whitelisting or sandboxing techniques. This may result in privilege escalation and information disclosure issues. CVE-2017-7302 — V-Ray 3.0.0.837 — Medium CVE-2017-7303 — V-Ray 3.0.0.837 — Medium CVE-2017-7304 — V-Ray 3.0.0.837 — Medium CVE-2017-7305 — V-Ray 3.0.0.837 — Medium CVE-2017-7306 — V-Ray 3.0.0.837 — Medium CVE-2017-7307 — V-Ray 3.0.0.837 — Medium CVE-2017-7308 — V-Ray 3.0.0.837 — Medium CVE-2017-7309 — V-Ray 3.0.0.837 — Medium CVE-2017-7310 — V-Ray 3.0.0.837 — Medium CVE-2017-7311 — V-Ray 3.0.0.837 — Medium CVE-2017-7312 — V-Ray 3.0.0.837 — Medium CVE-2017-7313 — V-Ray 3.

V-Ray 3.0.1 — Medium

V-Ray 3.0.1 is a patch for V-Ray 3.0 to address these medium-severity vulnerabilities. V-Ray 3.0.1 resolves the following issues:

* CVE-2017-7309 — Memory Corruption vulnerability that may allow Remote Code Execution
* CVE-2017-7310 — Memory Corruption vulnerability that may allow Remote Code Execution
* CVE-2017-7311 — Memory Corruption vulnerability that may allow Remote Code Execution
* CVE-2017-7312 — Memory Corruption vulnerability that may allow Remote Code Execution
* CVE-2017-7313 — Memory Corruption vulnerability that may allow Remote Code Execution

Timeline

Published on: 10/07/2022 18:15:00 UTC
Last modified on: 10/11/2022 17:08:00 UTC

References