vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Java(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
redeyes0x | https://redeyes0x.github.io/posts/pinkvm | Source redeyes0x 1635509473786707968 | 2023/03/14 |
57h | https://redeyes0x.github.io/posts/pinkvm | Source 57h 1635510384923639809 | 2023/03/14 |
kriwarez | https://twitter.com/kriwarez/status/1647894110613667840/pho... | Source kriwarez 1647894110613667840 | 2023/04/17 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 158 |
cvetrends.com | 50 |
lists.astaro.com | 16 |
security.sios.com | 13 |
thehackernews.com | 7 |
noticiasseguridad.com | 6 |
twitter.com | 3 |
www.oxeye.io | 3 |
tweetedtimes.com | 3 |
www.helpnetsecurity.com | 3 |
User | URL | Info Source |
---|---|---|
redeyes0x | redeyes0x.github.io | Show Tweet |
57h | redeyes0x.github.io | Show Tweet |
kriwarez | twitter.com | Show Tweet |
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |