583 results (0.064 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

25 Feb 2026 — Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to version 2.11.1, it is possible to escape the security boundraries set by `@enclave-vm/core`, which can be used to achieve remote code execution (RCE). The issue has been fixed in version 2.11.1. • https://github.com/agentfront/enclave/commit/09afbebe4cb6d0586c1145aa71ffabd2103932db • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

24 Feb 2026 — Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2016358 •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

24 Feb 2026 — Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. • https://bugzilla.mozilla.org/show_bug.cgi?id=2015266 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

24 Feb 2026 — Sandbox escape in the Storage: IndexedDB component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2014101 •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

24 Feb 2026 — Sandbox escape in the Graphics: WebRender component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2011063 •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

24 Feb 2026 — Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2011062 •

CVSS: 9.4EPSS: 0%CPEs: 2EXPL: 0

24 Feb 2026 — A sandbox escape vulnerability exists in dotCMS’s Velocity scripting engine (VTools) that allows authenticated users with scripting privileges to bypass class and package restrictions enforced by SecureUberspectorImpl. • https://dev.dotcms.com/docs/known-security-issues?issueNumber=SI-74 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

21 Feb 2026 — In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, allowing trivial sandbox escape via a well-known one-liner that grants full access to the underlying process. • https://github.com/OneUptime/oneuptime/commit/7f9ed4d43945574702a26b7c206e38cc344fe427 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

13 Feb 2026 — Sandbox escape via writing .git configuration was possible in versions prior to 2.5. • https://github.com/cursor/cursor/security/advisories/GHSA-8pcm-8jpx-hv8r • CWE-862: Missing Authorization •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

09 Feb 2026 — Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. • https://github.com/nyariv/SandboxJS/commit/f369f8db26649f212a6a9a2e7a1624cb2f705b53 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •