
CVE-2023-43656 – Sandbox escape for instances that have enabled transformation functions in matrix-hookshot
https://notcve.org/view.php?id=CVE-2023-43656
27 Sep 2023 — Instances that have enabled transformation functions (those that have `generic.allowJsTransformationFunctions` in their config), may be vulnerable to an attack where it is possible to break out of the `vm2` sandbox and as a result Hookshot will be vulnerable to this. ... Version 4.5.0 and above of hookshot include a new sandbox library which should better protect users. ... La versión 4.5.0 y superiores de hookshot incluyen una nueva biblioteca sandbox que debería proteger mejor a los u... • https://github.com/matrix-org/matrix-hookshot/commit/dc126afa6af86d66aefcd23a825326f405bcc894 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2023-5170 – Gentoo Linux Security Advisory 202401-10
https://notcve.org/view.php?id=CVE-2023-5170
27 Sep 2023 — This memory leak could be used to effect a sandbox escape if the correct data was leaked. ... Esta pérdida de memoria podría usarse para efectuar un escape de la sandbox si se filtraron los datos correctos. • https://bugzilla.mozilla.org/show_bug.cgi?id=1846686 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2023-41880 – Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86_64
https://notcve.org/view.php?id=CVE-2023-41880
15 Sep 2023 — This issue is not an escape from the WebAssembly sandbox. ... Este problema no es un escape del entorno limitado de WebAssembly. • https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.wasm_simd • CWE-193: Off-by-one Error •

CVE-2023-4576 – Gentoo Linux Security Advisory 202402-25
https://notcve.org/view.php?id=CVE-2023-4576
11 Sep 2023 — On Windows, an integer overflow could occur in `RecordedSourceSurfaceCreation` which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape. *This bug only affects Firefox on Windows. ... En Windows, podría ocurrir un desbordamiento de enteros en `RecordedSourceSurfaceCreation`, lo que resultó en un desbordamiento del búfer que podría filtrar datos confidenciales que podrían haber llevado a un escape de la sandbox. ... On Windows, a... • https://bugzilla.mozilla.org/show_bug.cgi?id=1846694 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-41039 – Sandbox escape via various forms of "format" in RestrictedPython
https://notcve.org/view.php?id=CVE-2023-41039
30 Aug 2023 — RestrictedPython is a restricted execution environment for Python to run untrusted code. Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its instances) and ... • https://github.com/zopefoundation/RestrictedPython/commit/4134aedcff17c977da7717693ed89ce56d54c120 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2023-3494 – bhyve privileged guest escape via fwctl
https://notcve.org/view.php?id=CVE-2023-3494
01 Aug 2023 — Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process. • https://security.FreeBSD.org/advisories/FreeBSD-SA-23:07.bhyve.asc • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2023-4050 – Mozilla: Stack buffer overflow in StorageManager
https://notcve.org/view.php?id=CVE-2023-4050
01 Aug 2023 — This resulted in a potentially exploitable crash which could have led to a sandbox escape. ... This resulted in a potentially exploitable crash which could have led to a sandbox escape. • https://bugzilla.mozilla.org/show_bug.cgi?id=1843038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-4924
https://notcve.org/view.php?id=CVE-2022-4924
28 Jul 2023 — Use after free in WebRTC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html • CWE-416: Use After Free •

CVE-2022-4920
https://notcve.org/view.php?id=CVE-2022-4920
28 Jul 2023 — Heap buffer overflow in Blink in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html • CWE-787: Out-of-bounds Write •

CVE-2023-32364 – Apple Security Advisory 2023-07-24-4
https://notcve.org/view.php?id=CVE-2023-32364
26 Jul 2023 — A sandboxed process may be able to circumvent sandbox restrictions. macOS Ventura 13.5 addresses bypass, code execution, out of bounds read, and use-after-free vulnerabilities. • https://github.com/gergelykalman/CVE-2023-32364-macos-app-sandbox-escape •