Show filters
3 Total Results
Displaying 1-3 of 3
Sort by:
Attacker Value
Unknown

CVE-2023-39532

Disclosure Date: August 08, 2023 (last updated October 08, 2023)
SES is a JavaScript environment that allows safe execution of arbitrary programs in Compartments. In version 0.18.0 prior to 0.18.7, 0.17.0 prior to 0.17.1, 0.16.0 prior to 0.16.1, 0.15.0 prior to 0.15.24, 0.14.0 prior to 0.14.5, an 0.13.0 prior to 0.13.5, there is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host. Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`. On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the applicatio…
Attacker Value
Unknown

CVE-2021-23594

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
Attacker Value
Unknown

CVE-2021-23543

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.