Page 21 of 489 results (0.088 seconds)

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

Use after free in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially perform a sandbox escape via a crafted HTML page. Un uso de memoria previamente liberada en Cast UI en Google Chrome versiones anteriores a 99.0.4844.51, permitía a un atacante remoto que convenciera a un usuario de participar en una interacción específica con el usuario llevar a cabo potencialmente un filtrado del sandbox por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html https://crbug.com/1274077 https://security.gentoo.org/glsa/202208-25 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true. En fenom versiones 2.12.1 y anteriores, se presenta una forma en el archivo fenom/src/Fenom/Template.php de omitir el sandbox para ejecutar código PHP arbitrario cuando disable_native_funcs es true • https://github.com/fenom-template/fenom/issues/331 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass all permission checks and execute arbitrary shell code. • https://github.com/denoland/deno/security/advisories/GHSA-838h-jqp6-cf2f • CWE-269: Improper Privilege Management CWE-863: Incorrect Authorization •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 2

It is vulnerable to Sandbox Escape leading to Prototype pollution. ... Es vulnerable a un Escape del Sandbox conllevando a una contaminación del Prototipo. • https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587 https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 3

Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. Un uso de memoria previamente liberada en el recolector de basura y en el finalizador de lgc.c en el intérprete de Lua versiones 5.4.0~5.4.3, permite a atacantes llevar a cabo un Escape del Sandbox por medio de un archivo de script diseñado A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape. • http://lua-users.org/lists/lua-l/2021-11/msg00186.html http://lua-users.org/lists/lua-l/2021-12/msg00007.html http://lua-users.org/lists/lua-l/2021-12/msg00015.html http://lua-users.org/lists/lua-l/2021-12/msg00030.html https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability https://access.redhat.com/security/cve/CVE-2021-44964 https://bugzilla.redhat.com/show_bug.cgi? • CWE-416: Use After Free •