Логотип exploitDog
bind:CVE-2022-36067
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-36067

Количество 4

Количество 4

redhat логотип

CVE-2022-36067

больше 3 лет назад

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

CVSS3: 10
EPSS: Высокий
nvd логотип

CVE-2022-36067

больше 3 лет назад

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

CVSS3: 10
EPSS: Высокий
github логотип

GHSA-mrgp-mrhc-5jrq

больше 3 лет назад

vm2 vulnerable to Sandbox Escape resulting in Remote Code Execution on host

CVSS3: 10
EPSS: Высокий
fstec логотип

BDU:2022-05598

больше 3 лет назад

Уязвимость библиотеки vm2 пакетного менеджера NPM, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-36067

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

CVSS3: 10
85%
Высокий
больше 3 лет назад
nvd логотип
CVE-2022-36067

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

CVSS3: 10
85%
Высокий
больше 3 лет назад
github логотип
GHSA-mrgp-mrhc-5jrq

vm2 vulnerable to Sandbox Escape resulting in Remote Code Execution on host

CVSS3: 10
85%
Высокий
больше 3 лет назад
fstec логотип
BDU:2022-05598

Уязвимость библиотеки vm2 пакетного менеджера NPM, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
85%
Высокий
больше 3 лет назад

Уязвимостей на страницу