| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-22709 | vm2 has a Sandbox Escape | patriksimek | vm2 | Critical | 9.8 | 2026-01-26 21:32:00 | Deep Dive |
| CVE-2023-37903 | Sandbox Escape in vm2 | patriksimek | vm2 | Critical | 9.8 | 2023-07-21 19:42:09 | Deep Dive |
| CVE-2023-37466 | vm2 Sandbox Escape vulnerability | patriksimek | vm2 | Critical | 9.8 | 2023-07-13 23:17:51 | Deep Dive |
| CVE-2023-32314 | Sandbox Escape | patriksimek | vm2 | Critical | 9.8 | 2023-05-15 19:46:33 | Deep Dive |
| CVE-2023-32313 | Inspect method manipulation in vm2 | patriksimek | vm2 | Medium | 5.3 | 2023-05-15 19:45:14 | Deep Dive |
| CVE-2023-30547 | Sandbox Escape in vm2 | patriksimek | vm2 | Critical | 9.8 | 2023-04-17 21:42:11 | Deep Dive |
| CVE-2023-29199 | vm2 Sandbox escape vulnerability | patriksimek | vm2 | Critical | 9.8 | 2023-04-14 18:37:04 | Deep Dive |
| CVE-2023-29017 | vm2 Sandbox Escape vulnerability | patriksimek | vm2 | Critical | 10.0 | 2023-04-06 19:18:34 | Deep Dive |
| CVE-2022-36067 | vm2 vulnerable to Sandbox Escape before v3.9.11 | patriksimek | vm2 | Critical | 10.0 | 2022-09-06 00:00:00 | Deep Dive |