Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sandbox sandbox 1.4.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-5694
PHP remote file inclusion vulnerability in lib/jpgraph/jpgraph_errhandler.inc.php in Sandbox 1.4.1 might allow remote malicious users to execute arbitrary PHP code via unspecified vectors. NOTE: the issue, if any, may be located in Aditus JpGraph rather than Sandbox. If so, then ...
Sandbox Sandbox 1.4.1
7.5
CVSSv2
CVE-2015-1427
The Groovy scripting engine in Elasticsearch prior to 1.3.8 and 1.4.x prior to 1.4.3 allows remote malicious users to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Elasticsearch Elasticsearch 1.4.0
Elasticsearch Elasticsearch 1.4.1
Elasticsearch Elasticsearch 1.4.2
Elasticsearch Elasticsearch
2 EDB exploits
2 Nmap scripts
16 Github repositories
2 Articles
2.6
CVSSv2
CVE-2015-0820
Mozilla Firefox prior to 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote malicious users to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mech...
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Firefox 30.0
Mozilla Firefox 3.6.9
Mozilla Firefox 3.6.27
Mozilla Firefox 3.6.26
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.18
Mozilla Firefox 3.6.11
Mozilla Firefox 3.6.10
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.13
Mozilla Firefox 3.5.12
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.17
Mozilla Firefox 3.0.16
Mozilla Firefox 3.0
Mozilla Firefox 29.0.1
Mozilla Firefox 25.0
Mozilla Firefox 24.1.1
7.5
CVSSv2
CVE-2005-3904
Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
Sun Jdk 1.5.0 03
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.4.2
Sun Jre 1.4.2 1
Sun Jre 1.5.0
Sun Jre 1.4.1
Sun Jre 1.4.2 6
Sun Jre 1.4.2 7
Sun Jre 1.4.2 8
Sun Jre 1.4.2 2
Sun Jre 1.4.2 3
Sun Jre 1.4.2 4
Sun Jre 1.4.2 5
7.5
CVSSv2
CVE-2005-3907
Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java a...
Sun Jdk 1.5.0 03
Sun Jre 1.3.0
Sun Jre 1.4.2
Sun Jre 1.4.2 1
Sun Jre 1.4.2 8
Sun Jre 1.5.0
Sun Jre 1.3.1
Sun Jre 1.4.1
Sun Jre 1.4.2 6
Sun Jre 1.4.2 7
Sun Jre 1.4.2 2
Sun Jre 1.4.2 3
Sun Jre 1.4.2 4
Sun Jre 1.4.2 5
9.3
CVSSv2
CVE-2009-0367
The Python AI module in Wesnoth 1.4.x and 1.5 prior to 1.5.11 allows remote malicious users to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the ...
Wesnoth Wesnoth 1.4
Wesnoth Wesnoth 1.4.7
Wesnoth Wesnoth 1.5.0
Wesnoth Wesnoth 1.5.1
Wesnoth Wesnoth 1.5.8
Wesnoth Wesnoth 1.5.9
Wesnoth Wesnoth 1.4.6
Wesnoth Wesnoth 1.4.5
Wesnoth Wesnoth 1.5.2
Wesnoth Wesnoth 1.5.3
Wesnoth Wesnoth 1.5.10
Wesnoth Wesnoth 1.4.4
Wesnoth Wesnoth 1.4.3
Wesnoth Wesnoth 1.5.4
Wesnoth Wesnoth 1.5.5
Wesnoth Wesnoth 1.4.2
Wesnoth Wesnoth 1.4.1
Wesnoth Wesnoth 1.5.6
Wesnoth Wesnoth 1.5.7
1 EDB exploit
7.5
CVSSv2
CVE-2005-3905
Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and previous versions, 1.4.2_08 and previous versions, and JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbit...
Sun Jdk 1.3.0 05
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 06
Sun Jdk 1.3.1 07
Sun Jdk 1.3.1 09
Sun Jdk 1.3.0 02
Sun Jdk 1.3.1 02
Sun Jdk 1.3.1 08
Sun Jdk 1.3.1 11
Sun Jdk 1.3.1 14
Sun Jdk 1.4.0 01
Sun Jdk 1.4.0 02
Sun Jdk 1.4.0 4
Sun Jdk 1.4.1 02
Sun Jdk 1.4.2 01
Sun Jdk 1.4.2 02
Sun Jdk 1.4.2 05
Sun Jdk 1.5.0 03
Sun Jdk 1.3.1 01
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 12
6.8
CVSSv2
CVE-2016-1443
The virtual network stack on Cisco AMP Threat Grid Appliance devices prior to 2.1.1 allows remote malicious users to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample.
Cisco Amp Threat Grid Appliance 1.0
Cisco Amp Threat Grid Appliance 1.1
Cisco Amp Threat Grid Appliance 1.2
Cisco Amp Threat Grid Appliance 1.2.1
Cisco Amp Threat Grid Appliance 1.3
Cisco Amp Threat Grid Appliance 1.4
Cisco Amp Threat Grid Appliance 1.4.1
Cisco Amp Threat Grid Appliance 1.4.2
Cisco Amp Threat Grid Appliance 1.4.3
Cisco Amp Threat Grid Appliance 1.4.4
Cisco Amp Threat Grid Appliance 1.4.5
Cisco Amp Threat Grid Appliance 1.4.6
Cisco Amp Threat Grid Appliance 2.0
Cisco Amp Threat Grid Appliance 2.0.1
Cisco Amp Threat Grid Appliance 2.0.2
Cisco Amp Threat Grid Appliance 2.0.3
Cisco Amp Threat Grid Appliance 2.0.4
Cisco Amp Threat Grid Appliance 2.1
7.5
CVSSv2
CVE-2005-3906
Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and previous versions and JDK and JRE 5.0 Update 3 and previous versions allow remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via u...
Sun Jdk 1.3.1 01
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 07
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 12
Sun Jdk 1.3.1 13
Sun Jdk 1.3.1 15
Sun Jdk 1.3
Sun Jdk 1.4.0 03
Sun Jdk 1.4.1
Sun Jdk 1.4.1 01
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2
Sun Jdk 1.4.2 03
Sun Jdk 1.4.2 04
Sun Jdk 1.4.2 08
Sun Jdk 1.4
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.4.2 5
Sun Jre 1.4.2 6
7.2
CVSSv2
CVE-2011-4212
The sandbox environment in the Google App Engine Python SDK prior to 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference wi...
Google App Engine Python Sdk 1.1.1
Google App Engine Python Sdk 1.1.2
Google App Engine Python Sdk 1.2.0
Google App Engine Python Sdk 1.2.3
Google App Engine Python Sdk 1.3.0
Google App Engine Python Sdk 1.3.1
Google App Engine Python Sdk 1.3.8
Google App Engine Python Sdk 1.4.0
Google App Engine Python Sdk 1.0.2
Google App Engine Python Sdk 1.1.0
Google App Engine Python Sdk 1.1.8
Google App Engine Python Sdk 1.1.9
Google App Engine Python Sdk 1.2.6
Google App Engine Python Sdk 1.2.7
Google App Engine Python Sdk 1.3.6
Google App Engine Python Sdk 1.3.7
Google App Engine Python Sdk 1.5.2
Google App Engine Python Sdk 1.1.3
Google App Engine Python Sdk 1.1.4
Google App Engine Python Sdk 1.1.5
Google App Engine Python Sdk 1.2.1
Google App Engine Python Sdk 1.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »