Логотип exploitDog
bind:CVE-2018-18748
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-18748

Количество 2

Количество 2

nvd логотип

CVE-2018-18748

больше 7 лет назад

Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-chm9-whw5-45wx

больше 3 лет назад

** DISPUTED ** Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality.

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-18748

Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality

CVSS3: 10
1%
Низкий
больше 7 лет назад
github логотип
GHSA-chm9-whw5-45wx

** DISPUTED ** Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality.

CVSS3: 10
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу