Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hj55-9jmv-9jrj | Sandbox escape in Artemis Java Test Sandbox |
Github GHSA |
GHSA-227w-wv4j-67h4 | Class Loading Vulnerability in Artemis |
Fri, 28 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code. | Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code. |
Fri, 20 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-28T16:28:45.620Z
Reserved: 2024-01-19T17:35:09.984Z
Link: CVE-2024-23682
Updated: 2024-08-01T23:06:25.277Z
Status : Modified
Published: 2024-01-19T21:15:10.273
Modified: 2025-11-28T17:16:07.773
Link: CVE-2024-23682
No data.
OpenCVE Enrichment
No data.
Github GHSA