Page 5 of 609 results (0.026 seconds)

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

25 Jul 2024 — An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. • https://github.com/snapcore/snapd/pull/13682 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 0

25 Jul 2024 — An attacker who could convince a user to install a malicious snap could use this vulnerability to escape the snap sandbox. • https://github.com/snapcore/snapd/commit/b66fee81606a1c05f965a876ccbaf44174194063 • CWE-20: Improper Input Validation •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

25 Jul 2024 — In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. ... An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by th... • https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2024 — Insufficient data validation in Permission Prompts in Google Chrome prior to 117.0.5938.62 allowed an attacker who convinced a user to install a malicious app to potentially perform a sandbox escape via a malicious file. • https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html • CWE-20: Improper Input Validation CWE-138: Improper Neutralization of Special Elements •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2024 — Inappropriate implementation in Skia in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html • CWE-303: Incorrect Implementation of Authentication Algorithm •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2024 — Inappropriate implementation in iframe in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop.html •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2024 — Out of bounds memory access in V8 in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html • CWE-125: Out-of-bounds Read •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

28 Jun 2024 — Nix is a package manager for Linux and other Unix systems that makes package management reliable and reproducible. A build process has access to and can change the permissions of the build directory. After creating a setuid binary in a globally accessible location, a malicious local user can assume the permissions of a Nix daemon worker and hijack all future builds. This issue was patched in version(s) 2.23.1, 2.22.2, 2.21.3, 2.20.7, 2.19.5 and 2.18.4. Nix es un administrador de paquetes para Linux y otros ... • https://github.com/NixOS/nix/pull/10501 • CWE-278: Insecure Preserved Inherited Permissions •

CVSS: 10.0EPSS: 33%CPEs: 2EXPL: 3

20 Jun 2024 — CVE-2024-28397 is a sandbox escape in js2py versions 0.74 and below. js2py is a popular python package that can evaluate javascript code inside a python interpreter. The vulnerability allows for an attacker to obtain a reference to a python object in the js2py environment enabling them to escape the sandbox, bypass pyimport restrictions and execute arbitrary commands on the host. • https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.3EPSS: 21%CPEs: 25EXPL: 2

16 May 2024 — Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device. Artifex Ghostscript anterior a 10.03.1 permite la corrupción de la memoria y una omisión MÁS SEGURA de la sandbox mediante la inyección de cadena de formato con un dispositivo uniprint. • https://packetstorm.news/files/id/179645 • CWE-20: Improper Input Validation CWE-693: Protection Mechanism Failure •