Vulnerability in Vm2 Project vm2, a sandbox for running untrusted code securely, is susceptible to uncontrolled recursion exploits. It provides full control over console output, limits access to process methods, and can require both built-in and external modules, with the ability to restrict access to certain modules. It uses the internal VM module, proxies, and overrides the built-in require method to prevent escaping the sandbox
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | Remote Code Execution (RCE) | 9 Dec 201908:28 | – | veracode |
![]() | CVE-2019-10761 Sandbox Bypass | 13 Jul 202208:20 | – | cvelist |
![]() | vm2 before 3.6.11 vulnerable to sandbox escape | 14 Jul 202200:00 | – | github |
![]() | Code injection | 13 Jul 202209:15 | – | prion |
![]() | CVE-2019-10761 | 13 Jul 202209:15 | – | cve |
![]() | vm2 before 3.6.11 vulnerable to sandbox escape | 14 Jul 202200:00 | – | osv |
![]() | CVE-2019-10761 | 13 Jul 202209:15 | – | osv |
![]() | CVE-2019-10761 | 13 Jul 202209:15 | – | nvd |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo