Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-23rx-79r7-6cpx | Sandbox escape in Artemis Java Test Sandbox |
Github GHSA |
GHSA-883x-6fch-6wjx | Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares |
Fri, 28 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code. | Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code. |
Fri, 20 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-653 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-28T16:29:14.849Z
Reserved: 2024-01-19T17:35:09.984Z
Link: CVE-2024-23683
Updated: 2024-08-01T23:06:25.359Z
Status : Modified
Published: 2024-01-19T21:15:10.340
Modified: 2025-11-28T17:16:07.980
Link: CVE-2024-23683
No data.
OpenCVE Enrichment
No data.
Github GHSA