595 results (0.011 seconds)

CVSS: -EPSS: %CPEs: 1EXPL: 0

11 Mar 2026 — use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html • CWE-416: Use After Free •

CVSS: -EPSS: %CPEs: 1EXPL: 0

11 Mar 2026 — Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html • CWE-125: Out-of-bounds Read •

CVSS: 6.3EPSS: %CPEs: 1EXPL: 0

11 Mar 2026 — FastGPT is an AI Agent building platform. In 4.14.7 and earlier, FastGPT's Python Sandbox (fastgpt-sandbox) includes guardrails intended to prevent file writes (static detection + seccomp). These guardrails are bypassable by remapping stdout (fd 1) to an arbitrary writable file descriptor using fcntl. After remapping, writing via sys.stdout.write() still satisfies the seccomp rule write(fd==1), enabling arbitrary file creation/overwrite inside the sandbox container despite the intended no file writes restri... • https://github.com/labring/FastGPT/security/advisories/GHSA-6hw6-mxrm-v6wj • CWE-184: Incomplete List of Disallowed Inputs •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

10 Mar 2026 — It does not require a separate vm sandbox escape. • https://github.com/OneUptime/oneuptime/releases/tag/10.0.21 • CWE-749: Exposed Dangerous Method or Function •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

09 Mar 2026 — This creates a distinct server-side RCE primitive: the attacker does not need the classic this.constructor.constructor(...) sandbox escape. • https://github.com/OneUptime/oneuptime/security/advisories/GHSA-4j36-39gm-8vq8 • CWE-749: Exposed Dangerous Method or Function •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

04 Mar 2026 — Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html • CWE-20: Improper Input Validation •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 1

26 Feb 2026 — In Agenta-API prior to version 0.48.1, a Python sandbox escape vulnerability existed in Agenta's custom code evaluator. • https://github.com/Agenta-AI/agenta/security/advisories/GHSA-pmgp-2m3v-34mq • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

25 Feb 2026 — Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) creates symlinks from the archive without validation, and the path guard (`writeable_path_from_extension`) only performs lexical prefix checks without resolving symlinks. An attacker can ship a tar that first creates a symlink inside the extension workdir pointing outside (e.g., `escape -> /`), then writes files through the symlink, causing writes to arbitrary ... • https://github.com/zed-industries/zed/security/advisories/GHSA-59p4-3mhm-qm3r • CWE-61: UNIX Symbolic Link (Symlink) Following •

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 0

25 Feb 2026 — n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of ... • https://docs.n8n.io/hosting/securing/overview • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 0

25 Feb 2026 — n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could exploit a vulnerability in the JavaScript Task Runner sandbox to execute arbitrary code outside the sandbox boundary. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task execut... • https://docs.n8n.io/hosting/configuration/task-runners • CWE-94: Improper Control of Generation of Code ('Code Injection') •