Логотип exploitDog
bind:CVE-2026-34208
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-34208

Количество 2

Количество 2

nvd логотип

CVE-2026-34208

6 дней назад

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker code can write arbitrary properties into host global objects and persist those mutations across sandbox instances in the same process. This vulnerability is fixed in 0.8.36.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-2gg9-6p7w-6cpj

9 дней назад

SandboxJS: Sandbox integrity escape

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-34208

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker code can write arbitrary properties into host global objects and persist those mutations across sandbox instances in the same process. This vulnerability is fixed in 0.8.36.

CVSS3: 10
0%
Низкий
6 дней назад
github логотип
GHSA-2gg9-6p7w-6cpj

SandboxJS: Sandbox integrity escape

CVSS3: 10
0%
Низкий
9 дней назад

Уязвимостей на страницу