
CVE-2022-3309 – Debian Security Advisory 5244-1
https://notcve.org/view.php?id=CVE-2022-3309
28 Sep 2022 — Use after free in assistant in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: Medium) Use-after-free en el asistente de Google Chrome en ChromeOS anterior a la versión 106.0.5249.62 permitía a un atacante remoto convencer a un usuario de realizar gestos de interfaz de usuario específicos para potencialmente real... • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html • CWE-416: Use After Free •

CVE-2022-3314 – Debian Security Advisory 5244-1
https://notcve.org/view.php?id=CVE-2022-3314
28 Sep 2022 — Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) Use-after-free para iniciar sesión en Google Chrome antes de la versión 106.0.5249.62 permitía a un atacante remoto que había comprometido un proceso de WebUI realizar potencialmente un escape de la sandbox a través de una página HTML manipulada. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html • CWE-416: Use After Free •

CVE-2022-3075 – Google Chromium Mojo Insufficient Data Validation Vulnerability
https://notcve.org/view.php?id=CVE-2022-3075
26 Sep 2022 — Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Una comprobación insuficiente de datos en Mojo en Google Chrome versiones anteriores a 105.0.5195.102, permitía a un atacante remoto que hubiera comprometido el proceso de renderización llevar a cabo un filtrado de sandbox por medio de una página HTML diseñada. ... Google C... • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html • CWE-20: Improper Input Validation •

CVE-2022-40635 – Improper Control of Dynamically-Managed Code Resources in Crafter Studio
https://notcve.org/view.php?id=CVE-2022-40635
13 Sep 2022 — Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. Una vulnerabilidad de Control Inapropiado de los Recursos de Código Administrados Dinámicamente en Crafter Studio de Crafter CMS permite a desarrolladores autenticados ejecutar comandos del Sistema Operativo por medio de Groovy Sandbox Bypass • https://github.com/mbadanoiu/CVE-2022-40635 • CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVE-2022-36067 – vm2 vulnerable to Sandbox Escape before v3.9.11
https://notcve.org/view.php?id=CVE-2022-36067
06 Sep 2022 — vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. ... En versiones anteriores a 3.9.11, un actor de la amenaza puede omitir las protecciones del sandbox para conseguir derechos de ejecución de código remoto en el host que ejecuta el sandbox. ... A flaw was found in the vm2

CVE-2022-35978 – Lua sandbox escape from mod in Minetest
https://notcve.org/view.php?id=CVE-2022-35978
15 Aug 2022 — Minetest is a free open-source voxel game engine with easy modding and game creation. In **single player**, a mod can set a global setting that controls the Lua script loaded to display the main menu. The script is then loaded as soon as the game session is exited. The Lua environment the menu runs in is not sandboxed and can directly interfere with the user's system. There are currently no known workarounds. • https://github.com/CanVo/CVE-2022-35978-POC • CWE-693: Protection Mechanism Failure •

CVE-2022-26696 – Apple macOS LaunchServices Sandbox Escape Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-26696
15 Aug 2022 — A sandboxed process may be able to circumvent sandbox restrictions. ... Un proceso en sandbox puede ser capaz de omitir las restricciones del sandbox This vulnerability allows remote attackers to escape the sandbox on affected installations of Apple macOS. • https://support.apple.com/en-us/HT213257 •

CVE-2022-20302
https://notcve.org/view.php?id=CVE-2022-20302
11 Aug 2022 — In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457 En Settings, se presenta una posible forma de omitir las protecciones de restablecimiento de fábrica debido a un escape de sand... • https://source.android.com/security/bulletin/android-13 •

CVE-2021-41556
https://notcve.org/view.php?id=CVE-2021-41556
28 Jul 2022 — If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality such as File System functions has been disabled. ... Si una víctima ejecuta un script de Squirrel controlado por un atacante, es posible que el atacante salga del sandbox del script de Squirrel incluso si toda la funcionalidad peligrosa, como las funciones del sistema de archivos, ha sido deshabilitada. • https://blog.sonarsource.com/squirrel-vm-sandbox-escape • CWE-125: Out-of-bounds Read •

CVE-2022-32834 – Apple Security Advisory 2022-07-20-4
https://notcve.org/view.php?id=CVE-2022-32834
22 Jul 2022 — An access issue was addressed with improvements to the sandbox. ... Se abordó un problema de acceso con el sandbox mejorado. ... Una aplicación podría acceder a información confidencial del usuario. macOS Monterey 12.5 addresses bypass, code execution, information leakage, null pointer, out of bounds read, out of bounds write, and spoofing vulnerabilities. • https://support.apple.com/en-us/HT213343 •