{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T07:10:25.995","vulnerabilities":[{"cve":{"id":"CVE-2019-10761","sourceIdentifier":"report@snyk.io","published":"2022-07-13T09:15:08.213","lastModified":"2024-11-21T04:19:52.223","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the \"sandboxed\" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code."},{"lang":"es","value":"Esto afecta al paquete vm2 versiones anteriores a 3.6.11. Es posible desencadenar una excepción RangeError desde el host y no desde el contexto \"sandboxed\" alcanzando el límite de llamadas de la pila con una recursión infinita. El objeto devuelto se usa entonces para referenciar la propiedad mainModule del código del host que ejecuta el script permitiéndole generar un child_process y ejecutar código arbitrario"}],"metrics":{"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.7}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-674"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*","versionEndExcluding":"3.6.11","matchCriteriaId":"E1C137CC-088D-4998-BB3A-DD81B2CCCE79"}]}]}],"references":[{"url":"https://github.com/patriksimek/vm2/commit/4b22d704e4794af63a5a2d633385fd20948f6f90","source":"report@snyk.io","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/patriksimek/vm2/issues/197","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://snyk.io/vuln/SNYK-JS-VM2-473188","source":"report@snyk.io","tags":["Third Party Advisory"]},{"url":"https://github.com/patriksimek/vm2/commit/4b22d704e4794af63a5a2d633385fd20948f6f90","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/patriksimek/vm2/issues/197","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://snyk.io/vuln/SNYK-JS-VM2-473188","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}