Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sandbox sandbox 1.4.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-5694
PHP remote file inclusion vulnerability in lib/jpgraph/jpgraph_errhandler.inc.php in Sandbox 1.4.1 might allow remote malicious users to execute arbitrary PHP code via unspecified vectors. NOTE: the issue, if any, may be located in Aditus JpGraph rather than Sandbox. If so, then ...
Sandbox Sandbox 1.4.1
9.3
CVSSv2
CVE-2009-0367
The Python AI module in Wesnoth 1.4.x and 1.5 prior to 1.5.11 allows remote malicious users to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the ...
Wesnoth Wesnoth 1.5.6
Wesnoth Wesnoth 1.4.6
Wesnoth Wesnoth 1.5.4
Wesnoth Wesnoth 1.5.10
Wesnoth Wesnoth 1.4.5
Wesnoth Wesnoth 1.5.3
Wesnoth Wesnoth 1.4.1
Wesnoth Wesnoth 1.5.7
Wesnoth Wesnoth 1.5.8
Wesnoth Wesnoth 1.5.9
Wesnoth Wesnoth 1.5.0
Wesnoth Wesnoth 1.5.5
Wesnoth Wesnoth 1.4
Wesnoth Wesnoth 1.5.1
Wesnoth Wesnoth 1.4.3
Wesnoth Wesnoth 1.4.2
Wesnoth Wesnoth 1.4.4
Wesnoth Wesnoth 1.4.7
Wesnoth Wesnoth 1.5.2
1 EDB exploit
7.5
CVSSv2
CVE-2015-1427
The Groovy scripting engine in Elasticsearch prior to 1.3.8 and 1.4.x prior to 1.4.3 allows remote malicious users to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Elasticsearch Elasticsearch
Elasticsearch Elasticsearch 1.4.0
Elasticsearch Elasticsearch 1.4.1
Elasticsearch Elasticsearch 1.4.2
2 EDB exploits
2 Nmap scripts
17 Github repositories
2 Articles
7.5
CVSSv2
CVE-2005-3904
Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
Sun Jre 1.4.2 7
Sun Jre 1.3.1
Sun Jre 1.5.0
Sun Jre 1.4.2 4
Sun Jre 1.3.0
Sun Jre 1.4.2 2
Sun Jre 1.4.2 1
Sun Jre 1.4.2 8
Sun Jdk 1.5.0 03
Sun Jre 1.4.2
Sun Jre 1.4.1
Sun Jre 1.4.2 3
Sun Jre 1.4.2 5
Sun Jre 1.4.2 6
7.5
CVSSv2
CVE-2005-3906
Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and previous versions and JDK and JRE 5.0 Update 3 and previous versions allow remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via u...
Sun Jre 1.4.2 7
Sun Jre 1.3.1
Sun Jdk 1.4.0 4
Sun Jdk 1.3.1 06
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2 05
Sun Jdk 1.4.0 02
Sun Jdk 1.4.2 08
Sun Jre 1.5.0
Sun Jdk 1.4.2
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 13
Sun Jdk 1.3.1 02
Sun Jre 1.4.2 4
Sun Jdk 1.3.1 01
Sun Jre 1.3.0
Sun Jdk 1.3.0 05
Sun Jdk 1.4.0 03
Sun Jdk 1.3.0 02
Sun Jdk 1.3.1 03
Sun Jre 1.4.2 2
Sun Jdk 1.4.1 02
7.5
CVSSv2
CVE-2005-3907
Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java a...
Sun Jre 1.4.2 7
Sun Jre 1.3.1
Sun Jre 1.5.0
Sun Jre 1.4.2 4
Sun Jre 1.3.0
Sun Jre 1.4.2 2
Sun Jre 1.4.2 1
Sun Jre 1.4.2 8
Sun Jdk 1.5.0 03
Sun Jre 1.4.2
Sun Jre 1.4.1
Sun Jre 1.4.2 3
Sun Jre 1.4.2 5
Sun Jre 1.4.2 6
7.5
CVSSv2
CVE-2005-3905
Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and previous versions, 1.4.2_08 and previous versions, and JDK and JRE 5.0 Update 3 and previous versions allows remote malicious users to escape the Java sandbox and access arbitrary files or execute arbit...
Sun Jre 1.4.2 7
Sun Jre 1.3.1
Sun Jdk 1.4.0 4
Sun Jdk 1.3.1 06
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2 05
Sun Jdk 1.4.0 02
Sun Jdk 1.4.2 08
Sun Jre 1.5.0
Sun Jdk 1.4.2
Sun Jdk 1.3.1 10
Sun Jdk 1.3.1 13
Sun Jdk 1.3.1 02
Sun Jre 1.4.2 4
Sun Jdk 1.3.1 01
Sun Jre 1.3.0
Sun Jdk 1.3.0 05
Sun Jdk 1.4.0 03
Sun Jdk 1.3.0 02
Sun Jdk 1.3.1 03
Sun Jre 1.4.2 2
Sun Jdk 1.4.1 02
7.2
CVSSv2
CVE-2011-4211
The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK prior to 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS ...
Google App Engine Python Sdk 1.4.3
Google App Engine Python Sdk 1.1.5
Google App Engine Python Sdk 1.3.4
Google App Engine Python Sdk 1.2.6
Google App Engine Python Sdk 1.2.2
Google App Engine Python Sdk 1.2.7
Google App Engine Python Sdk 1.1.7
Google App Engine Python Sdk 1.0.2
Google App Engine Python Sdk 1.1.3
Google App Engine Python Sdk 1.5.2
Google App Engine Python Sdk 1.1.0
Google App Engine Python Sdk 1.3.1
Google App Engine Python Sdk
Google App Engine Python Sdk 1.0.1
Google App Engine Python Sdk 1.4.0
Google App Engine Python Sdk 1.1.2
Google App Engine Python Sdk 1.3.8
Google App Engine Python Sdk 1.3.3
Google App Engine Python Sdk 1.2.5
Google App Engine Python Sdk 1.2.0
Google App Engine Python Sdk 1.1.8
Google App Engine Python Sdk 1.1.9
7.2
CVSSv2
CVE-2011-4212
The sandbox environment in the Google App Engine Python SDK prior to 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference wi...
Google App Engine Python Sdk 1.4.3
Google App Engine Python Sdk 1.1.5
Google App Engine Python Sdk 1.3.4
Google App Engine Python Sdk 1.2.6
Google App Engine Python Sdk 1.2.2
Google App Engine Python Sdk 1.2.7
Google App Engine Python Sdk 1.1.7
Google App Engine Python Sdk 1.0.2
Google App Engine Python Sdk 1.1.3
Google App Engine Python Sdk 1.5.2
Google App Engine Python Sdk 1.1.0
Google App Engine Python Sdk 1.3.1
Google App Engine Python Sdk
Google App Engine Python Sdk 1.0.1
Google App Engine Python Sdk 1.4.0
Google App Engine Python Sdk 1.1.2
Google App Engine Python Sdk 1.3.8
Google App Engine Python Sdk 1.3.3
Google App Engine Python Sdk 1.2.5
Google App Engine Python Sdk 1.2.0
Google App Engine Python Sdk 1.1.8
Google App Engine Python Sdk 1.1.9
6.8
CVSSv2
CVE-2016-1443
The virtual network stack on Cisco AMP Threat Grid Appliance devices prior to 2.1.1 allows remote malicious users to bypass a sandbox protection mechanism, and consequently obtain sensitive interprocess information or modify interprocess data, via a crafted malware sample.
Cisco Amp Threat Grid Appliance 1.4.3
Cisco Amp Threat Grid Appliance 1.4.2
Cisco Amp Threat Grid Appliance 1.4.5
Cisco Amp Threat Grid Appliance 2.0.2
Cisco Amp Threat Grid Appliance 1.4.1
Cisco Amp Threat Grid Appliance 2.0.1
Cisco Amp Threat Grid Appliance 2.0.3
Cisco Amp Threat Grid Appliance 1.4.4
Cisco Amp Threat Grid Appliance 1.4.6
Cisco Amp Threat Grid Appliance 2.0.4
Cisco Amp Threat Grid Appliance 1.2.1
Cisco Amp Threat Grid Appliance 1.0
Cisco Amp Threat Grid Appliance 1.1
Cisco Amp Threat Grid Appliance 1.2
Cisco Amp Threat Grid Appliance 1.3
Cisco Amp Threat Grid Appliance 1.4
Cisco Amp Threat Grid Appliance 2.0
Cisco Amp Threat Grid Appliance 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »