enclave-vm@2.1.0 vulnerabilities

Sandbox runtime for secure JavaScript code execution

Direct Vulnerabilities

Known vulnerabilities in the enclave-vm package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Infinite loop

enclave-vm is a Sandbox runtime for secure JavaScript code execution

Affected versions of this package are vulnerable to Infinite loop via infinite recursion in the vm module. An attacker can execute arbitrary code outside the intended sandbox by crafting recursive calls that exploit host object references and dynamic property accesses.

How to fix Infinite loop?

There is no fixed version for enclave-vm.

*
  • H
Protection Mechanism Failure

enclave-vm is a Sandbox runtime for secure JavaScript code execution

Affected versions of this package are vulnerable to Protection Mechanism Failure via the exposure of a host-side Error object to sandboxed code, which retains its host realm prototype chain. An attacker can intentionally trigger a host error and traverse the prototype chain to access the host Function constructor, enabling execution of arbitrary JavaScript in the host context and access to sensitive resources such as environment variables, filesystem, and network.

How to fix Protection Mechanism Failure?

Upgrade enclave-vm to version 2.7.0 or higher.

<2.7.0