Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sandbox sandbox 1.4.1 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2008-5694
PHP remote file inclusion vulnerability in lib/jpgraph/jpgraph_errhandler.inc.php in Sandbox 1.4.1 might allow remote malicious users to execute arbitrary PHP code via unspecified vectors. NOTE: the issue, if any, may be located in Aditus JpGraph rather than Sandbox. If so, then ...
Sandbox Sandbox 1.4.1
795
VMScore
CVE-2015-1427
The Groovy scripting engine in Elasticsearch prior to 1.3.8 and 1.4.x prior to 1.4.3 allows remote malicious users to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Elasticsearch Elasticsearch 1.4.0
Elasticsearch Elasticsearch 1.4.1
Elasticsearch Elasticsearch 1.4.2
Elasticsearch Elasticsearch
2 EDB exploits
2 Nmap scripts
16 Github repositories
2 Articles
231
VMScore
CVE-2015-0820
Mozilla Firefox prior to 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote malicious users to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mech...
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Mozilla Firefox 30.0
Mozilla Firefox 3.6.9
Mozilla Firefox 3.6.27
Mozilla Firefox 3.6.26
Mozilla Firefox 3.6.19
Mozilla Firefox 3.6.18
Mozilla Firefox 3.6.11
Mozilla Firefox 3.6.10
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.13
Mozilla Firefox 3.5.12
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.17
Mozilla Firefox 3.0.16
Mozilla Firefox 3.0
Mozilla Firefox 29.0.1
Mozilla Firefox 25.0
Mozilla Firefox 24.1.1
668
VMScore
CVE-2005-3904
Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
Sun Jdk 1.5.0 03
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.4.2
Sun Jre 1.4.2 1
Sun Jre 1.5.0
Sun Jre 1.4.1
Sun Jre 1.4.2 6
Sun Jre 1.4.2 7
Sun Jre 1.4.2 8
Sun Jre 1.4.2 2
Sun Jre 1.4.2 3
Sun Jre 1.4.2 4
Sun Jre 1.4.2 5
668
VMScore
CVE-2005-3907
Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java a...
Sun Jdk 1.5.0 03
Sun Jre 1.3.0
Sun Jre 1.4.2
Sun Jre 1.4.2 1
Sun Jre 1.4.2 8
Sun Jre 1.5.0
Sun Jre 1.3.1
Sun Jre 1.4.1
Sun Jre 1.4.2 6
Sun Jre 1.4.2 7
Sun Jre 1.4.2 2
Sun Jre 1.4.2 3
Sun Jre 1.4.2 4
Sun Jre 1.4.2 5
935
VMScore
CVE-2009-0367
The Python AI module in Wesnoth 1.4.x and 1.5 prior to 1.5.11 allows remote malicious users to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the ...
Wesnoth Wesnoth 1.4
Wesnoth Wesnoth 1.4.7
Wesnoth Wesnoth 1.5.0
Wesnoth Wesnoth 1.5.1
Wesnoth Wesnoth 1.5.8
Wesnoth Wesnoth 1.5.9
Wesnoth Wesnoth 1.4.6
Wesnoth Wesnoth 1.4.5
Wesnoth Wesnoth 1.5.2
Wesnoth Wesnoth 1.5.3
Wesnoth Wesnoth 1.5.10
Wesnoth Wesnoth 1.4.4
Wesnoth Wesnoth 1.4.3
Wesnoth Wesnoth 1.5.4
Wesnoth Wesnoth 1.5.5
Wesnoth Wesnoth 1.4.2
Wesnoth Wesnoth 1.4.1
Wesnoth Wesnoth 1.5.6
Wesnoth Wesnoth 1.5.7
1 EDB exploit
668
VMScore
CVE-2005-3905
Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and previous versions, 1.4.2_08 and previous versions, and JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbit...
Sun Jdk 1.3.0 05
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 06
Sun Jdk 1.3.1 07
Sun Jdk 1.3.1 09
Sun Jdk 1.3.0 02
Sun Jdk 1.3.1 02
Sun Jdk 1.3.1 08
Sun Jdk 1.3.1 11
Sun Jdk 1.3.1 14
Sun Jdk 1.4.0 01
Sun Jdk 1.4.0 02
Sun Jdk 1.4.0 4
Sun Jdk 1.4.1 02
Sun Jdk 1.4.2 01
Sun Jdk 1.4.2 02
Sun Jdk 1.4.2 05
Sun Jdk 1.5.0 03
Sun Jdk 1.3.1 01
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 12
605
VMScore
CVE-2016-1443
The virtual network stack on Cisco AMP Threat Grid Appliance devices prior to 2.1.1 allows remote malicious users to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample.
Cisco Amp Threat Grid Appliance 1.0
Cisco Amp Threat Grid Appliance 1.1
Cisco Amp Threat Grid Appliance 1.2
Cisco Amp Threat Grid Appliance 1.2.1
Cisco Amp Threat Grid Appliance 1.3
Cisco Amp Threat Grid Appliance 1.4
Cisco Amp Threat Grid Appliance 1.4.1
Cisco Amp Threat Grid Appliance 1.4.2
Cisco Amp Threat Grid Appliance 1.4.3
Cisco Amp Threat Grid Appliance 1.4.4
Cisco Amp Threat Grid Appliance 1.4.5
Cisco Amp Threat Grid Appliance 1.4.6
Cisco Amp Threat Grid Appliance 2.0
Cisco Amp Threat Grid Appliance 2.0.1
Cisco Amp Threat Grid Appliance 2.0.2
Cisco Amp Threat Grid Appliance 2.0.3
Cisco Amp Threat Grid Appliance 2.0.4
Cisco Amp Threat Grid Appliance 2.1
668
VMScore
CVE-2005-3906
Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and previous versions and JDK and JRE 5.0 Update 3 and previous versions allow remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via u...
Sun Jdk 1.3.1 01
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 04
Sun Jdk 1.3.1 07
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 12
Sun Jdk 1.3.1 13
Sun Jdk 1.3.1 15
Sun Jdk 1.3
Sun Jdk 1.4.0 03
Sun Jdk 1.4.1
Sun Jdk 1.4.1 01
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2
Sun Jdk 1.4.2 03
Sun Jdk 1.4.2 04
Sun Jdk 1.4.2 08
Sun Jdk 1.4
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.4.2 5
Sun Jre 1.4.2 6
641
VMScore
CVE-2011-4212
The sandbox environment in the Google App Engine Python SDK prior to 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference wi...
Google App Engine Python Sdk 1.1.1
Google App Engine Python Sdk 1.1.2
Google App Engine Python Sdk 1.2.0
Google App Engine Python Sdk 1.2.3
Google App Engine Python Sdk 1.3.0
Google App Engine Python Sdk 1.3.1
Google App Engine Python Sdk 1.3.8
Google App Engine Python Sdk 1.4.0
Google App Engine Python Sdk 1.0.2
Google App Engine Python Sdk 1.1.0
Google App Engine Python Sdk 1.1.8
Google App Engine Python Sdk 1.1.9
Google App Engine Python Sdk 1.2.6
Google App Engine Python Sdk 1.2.7
Google App Engine Python Sdk 1.3.6
Google App Engine Python Sdk 1.3.7
Google App Engine Python Sdk 1.5.2
Google App Engine Python Sdk 1.1.3
Google App Engine Python Sdk 1.1.4
Google App Engine Python Sdk 1.1.5
Google App Engine Python Sdk 1.2.1
Google App Engine Python Sdk 1.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »