CVE-2021-38834
https://notcve.org/view.php?id=CVE-2021-38834
easy-mock v1.5.0-v1.6.0 allows remote attackers to bypass the vm2 sandbox and execute arbitrary system commands through special js code. easy-mock versiones v1.5.0-v1.6.0, permite a atacantes remotos omitir el sandbox de vm2 y ejecutar comandos arbitrarios del sistema mediante código js especial • https://www.exploit-db.com/exploits/50194 •
CVE-2022-0790
https://notcve.org/view.php?id=CVE-2022-0790
Use after free in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially perform a sandbox escape via a crafted HTML page. Un uso de memoria previamente liberada en Cast UI en Google Chrome versiones anteriores a 99.0.4844.51, permitía a un atacante remoto que convenciera a un usuario de participar en una interacción específica con el usuario llevar a cabo potencialmente un filtrado del sandbox por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html https://crbug.com/1274077 https://security.gentoo.org/glsa/202208-25 • CWE-416: Use After Free •
CVE-2021-46433
https://notcve.org/view.php?id=CVE-2021-46433
In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true. En fenom versiones 2.12.1 y anteriores, se presenta una forma en el archivo fenom/src/Fenom/Template.php de omitir el sandbox para ejecutar código PHP arbitrario cuando disable_native_funcs es true • https://github.com/fenom-template/fenom/issues/331 •
CVE-2022-24783 – Sandbox bypass leading to arbitrary code execution in Deno
https://notcve.org/view.php?id=CVE-2022-24783
The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass all permission checks and execute arbitrary shell code. • https://github.com/denoland/deno/security/advisories/GHSA-838h-jqp6-cf2f • CWE-269: Improper Privilege Management CWE-863: Incorrect Authorization •
CVE-2021-23771 – Sandbox Bypass
https://notcve.org/view.php?id=CVE-2021-23771
It is vulnerable to Sandbox Escape leading to Prototype pollution. ... Es vulnerable a un Escape del Sandbox conllevando a una contaminación del Prototipo. • https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587 https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •