
CVE-2022-3075 – Google Chromium Mojo Insufficient Data Validation Vulnerability
https://notcve.org/view.php?id=CVE-2022-3075
26 Sep 2022 — Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. ... Google Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html • CWE-20: Improper Input Validation •

CVE-2022-40635 – Improper Control of Dynamically-Managed Code Resources in Crafter Studio
https://notcve.org/view.php?id=CVE-2022-40635
13 Sep 2022 — Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. Una vulnerabilidad de Control Inapropiado de los Recursos de Código Administrados Dinámicamente en Crafter Studio de Crafter CMS permite a desarrolladores autenticados ejecutar comandos del Sistema Operativo por medio de Groovy Sandbox Bypass • https://github.com/mbadanoiu/CVE-2022-40635 • CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVE-2022-36067 – vm2 vulnerable to Sandbox Escape before v3.9.11
https://notcve.org/view.php?id=CVE-2022-36067
06 Sep 2022 — vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds. vm2 es un sandbox que puede ejecutar código no confiable con los módulos incorporados de Node en la lista blanca. En versiones anteriores a 3.9.11, un actor de la a... • https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067 • CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVE-2022-35978 – Lua sandbox escape from mod in Minetest
https://notcve.org/view.php?id=CVE-2022-35978
15 Aug 2022 — Minetest is a free open-source voxel game engine with easy modding and game creation. In **single player**, a mod can set a global setting that controls the Lua script loaded to display the main menu. The script is then loaded as soon as the game session is exited. The Lua environment the menu runs in is not sandboxed and can directly interfere with the user's system. There are currently no known workarounds. • https://github.com/CanVo/CVE-2022-35978-POC • CWE-693: Protection Mechanism Failure •

CVE-2022-26696 – Apple macOS LaunchServices Sandbox Escape Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-26696
15 Aug 2022 — This issue was addressed with improved environment sanitization. This issue is fixed in macOS Monterey 12.4. A sandboxed process may be able to circumvent sandbox restrictions. Se abordó este problema con un saneo del entorno mejorado. Este problema es corregido en macOS Monterey versión 12.4. • https://support.apple.com/en-us/HT213257 •

CVE-2022-20302
https://notcve.org/view.php?id=CVE-2022-20302
11 Aug 2022 — In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. • https://source.android.com/security/bulletin/android-13 •

CVE-2021-41556
https://notcve.org/view.php?id=CVE-2021-41556
28 Jul 2022 — sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an out-of-bounds read (in the core interpreter) that can lead to Code Execution. If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality such as File System functions has been disabled. An attacker might abuse this bug to target (for example) Cloud services that allow customization via SquirrelScripts, or distribute malware thro... • https://blog.sonarsource.com/squirrel-vm-sandbox-escape • CWE-125: Out-of-bounds Read •

CVE-2019-10761 – Sandbox Bypass
https://notcve.org/view.php?id=CVE-2019-10761
13 Jul 2022 — This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code. Esto afecta al paquete vm2 versiones anteriores a 3.6.11. Es posible desencadenar una excepción RangeError desde el host y no desde el co... • https://github.com/ossf-cve-benchmark/CVE-2019-10761 • CWE-674: Uncontrolled Recursion •

CVE-2022-2010 – Gentoo Linux Security Advisory 202208-25
https://notcve.org/view.php?id=CVE-2022-2010
28 Jun 2022 — Out of bounds read in compositing in Google Chrome prior to 102.0.5005.115 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • https://packetstorm.news/files/id/167719 • CWE-125: Out-of-bounds Read •

CVE-2022-20125
https://notcve.org/view.php?id=CVE-2022-20125
15 Jun 2022 — In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape. • https://source.android.com/security/bulletin/2022-06-01 •