{"uuid": "412ea133-2cce-469e-ba80-838b0dc29d5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29017", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3176", "content": "\ud83d\udd25\ud83d\udd25\ud83d\udd25SBX in vm2  ( CVE-2023-29017 )\n\nvm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.\n\n\u26a0\ufe0fA threat actor can bypass the sandbox protections to gain RCE rights on the host running the sandbox.\n\nExploits:- https://system32.ink/news-feed/p/288/", "creation_timestamp": "2023-04-08T13:06:59.000000Z"}