Page 10 of 1051 results (0.035 seconds)

CVSS: 8.6EPSS: 0%CPEs: 8EXPL: 0

08 Mar 2024 — An app may be able to break out of its sandbox. ... Es posible que una aplicación pueda salir de su zona de pruebas. macOS Sonoma 14.4 addresses buffer overflow, bypass, code execution, out of bounds read, out of bounds write, and spoofing vulnerabilities. • http://seclists.org/fulldisclosure/2024/Mar/21 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 88%CPEs: 2EXPL: 2

09 Feb 2024 — Execution can further bypass the Java sandbox configured by Solr, ultimately causing arbitrary command execution. • https://packetstorm.news/files/id/178255 • CWE-434: Unrestricted Upload of File with Dangerous Type CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVSS: 10.0EPSS: 0%CPEs: 40EXPL: 0

24 Jan 2024 — An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. ... An attacker could possibly use this issue to bypass Java sandbox restrictions. • https://www.oracle.com/security-alerts/cpujan2024.html • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 36EXPL: 0

24 Jan 2024 — ., code that comes from the internet) and rely on the Java sandbox for security. ... This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. ... An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions... • https://www.oracle.com/security-alerts/cpujan2024.html • CWE-20: Improper Input Validation CWE-276: Incorrect Default Permissions •

CVSS: 5.1EPSS: 0%CPEs: 36EXPL: 0

24 Jan 2024 — ., code that comes from the internet) and rely on the Java sandbox for security. ... Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. ... An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restriction... • https://www.oracle.com/security-alerts/cpujan2024.html • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.3EPSS: 0%CPEs: 2EXPL: 0

23 Jan 2024 — An access issue was addressed with additional sandbox restrictions. ... Se solucionó un problema de acceso con restricciones adicionales de la sandbox. ... Es posible que una aplicación pueda leer archivos arbitrarios. macOS Ventura 13.6.4 addresses bypass and code execution vulnerabilities. • http://seclists.org/fulldisclosure/2024/Jan/37 •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 2

19 Jan 2024 — Artemis Java Test Sandbox versions before 1.11.2 are vulnerable to a sandbox escape when an attacker loads untrusted libraries using System.load or System.loadLibrary. ... Las versiones de Artemis Java Test Sandbox anteriores a 1.11.2 son vulnerables a un escape de la sandbox cuando un atacante carga librerías que no son de confianza utilizando System.load o System.loadLibrary. • https://github.com/advisories/GHSA-98hq-4wmw-98w9 • CWE-284: Improper Access Control •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 2

19 Jan 2024 — Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. ... Las versiones de Artemis Java Test Sandbox inferiores a 1.7.6 son vulnerables a un escape de la sandbox cuando un atacante crea una subclase especial de InvocationTargetException. • https://github.com/advisories/GHSA-883x-6fch-6wjx •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 2

19 Jan 2024 — Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. ... Las versiones de Artemis Java Test Sandbox anteriores a 1.8.0 son vulnerables a un escape de la sandbox cuando un atacante incluye archivos de clase en un paquete en el que Ares confía. • https://github.com/advisories/GHSA-227w-wv4j-67h4 • CWE-501: Trust Boundary Violation CWE-653: Improper Isolation or Compartmentalization •

CVSS: 7.4EPSS: 0%CPEs: 19EXPL: 0

16 Jan 2024 — ., code that comes from the internet) and rely on the Java sandbox for security. ... Nota: Esta vulnerabilidad se aplica a implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o subprogramas de Java en sandbox, que cargan y ejecutan código que no es de confianza (por ejemplo, código que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. ... Note: This vulnerability applies to Java deployments, typically in cl... • https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html • CWE-284: Improper Access Control CWE-385: Covert Timing Channel CWE-416: Use After Free •