{"vulnerability": "CVE-2018-2676", "sightings": [{"uuid": "5c2c70b7-f9af-43a1-b5c0-16e7923a0307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-2676", "type": "seen", "source": "https://t.me/itsecalert/87", "content": "\u26a0  Desktop Virtualization platform VirtualBox from Oracle just patched ten vulnerabilities which allow attackers to break \nout of guest operating systems and attack the host operating system\n\nThe vulnerabilities are collectively published as CVE-2018-2676, \nCVE-2018-2685, CVE-2018-2686, CVE-2018-2687, CVE-2018-2688, \nCVE-2018-2689, CVE-2018-2690, CVE-2018-2693, CVE-2018-2694, and \nCVE-2018-2698. While they all share the same resultant effect, the \nmethod involved\u2014and subsequently the ease with which attackers can \nleverage the vulnerability\u2014varies.\n\nIf you use Virtualbox, please look into patching it.\n(Severity: \ud83d\udd38 high) \nMore Info: https://goo.gl/ytfqmF\n#alert #severityhigh #virtualbox\n\nThis alert is brought to you by @rtyu1120 from @itsectalk \ud83d\udc4d\ud83c\udffc\n(and we're hoping you don't use VirtualBox in a production environment) \ud83d\ude4c\ud83c\udffc", "creation_timestamp": "2018-01-28T18:28:38.000000Z"}]}