Логотип exploitDog
bind:CVE-2023-26122
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26122

Количество 2

Количество 2

nvd логотип

CVE-2023-26122

почти 3 года назад

All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-79xf-67r4-q2jj

почти 3 года назад

safe-eval vulnerable to Sandbox Bypass due to improper input sanitization

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26122

All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().

CVSS3: 8.8
3%
Низкий
почти 3 года назад
github логотип
GHSA-79xf-67r4-q2jj

safe-eval vulnerable to Sandbox Bypass due to improper input sanitization

CVSS3: 10
3%
Низкий
почти 3 года назад

Уязвимостей на страницу