
CVE-2024-49360 – Path traversal in Sandboxie
https://notcve.org/view.php?id=CVE-2024-49360
29 Nov 2024 — Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. An authenticated user (**UserA**) with no privileges is authorized to read all files created in sandbox belonging to other users in the sandbox folders `C:\Sandbox\UserB\xxx`. An authenticated attacker who can use `explorer.exe` or `cmd.exe` outside any sandbox can read other users' files in `C:\Sandbox\xxx`. By default in Windows 7+, the `C:\Users\UserA` folder is not readable by **UserB**. All files e... • https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-4chj-3c28-gvmp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-28067
https://notcve.org/view.php?id=CVE-2022-28067
04 May 2022 — An incorrect access control issue in Sandboxie Classic v5.55.13 allows attackers to cause a Denial of Service (DoS) in the Sandbox via a crafted executable. Un problema de control de acceso incorrecto en Sandboxie Classic versión v5.55.13, permite a atacantes causar una denegación de servicio (DoS) en el Sandbox por medio de un ejecutable diseñado • https://github.com/sandboxie-plus/Sandboxie/issues/1714 •

CVE-2018-18748
https://notcve.org/view.php?id=CVE-2018-18748
28 Oct 2018 — Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality ** EN DISPUTA ** Sandboxie 5.26 permite el escape del sandbox mediante una instrucción "import os", seguida por os.system("cmd") u os.system("powershell"), en un archivo .py. NOTA: el fabricante disputa este problema debido a que el comportamie... • https://github.com/sandboxescape/Sandboxie-5.26-Sandbox-Escape-Exploit •

CVE-2017-12480
https://notcve.org/view.php?id=CVE-2017-12480
06 Aug 2017 — Sandboxie installer 5071703 has a DLL Hijacking or Unsafe DLL Loading Vulnerability via a Trojan horse dwmapi.dll or profapi.dll file in an AppData\Local\Temp directory. El instalador de Sandboxie 5071703 tiene una vulnerabilidad de secuestro de DLL o carga insegura de DLL mediante un archivo troyano dwmapi.dll o profapi.dll en un directorio AppData\Local\Temp. • https://medium.com/%40BaYinMin/cve-2017-12480-sandboxie-installer-dll-hijacking-or-unsafe-dll-loading-vulnerability-41ad0562f41 • CWE-426: Untrusted Search Path •