1184 results (0.036 seconds)

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 1

14 Oct 2025 — Flowise v3.0.1 < 3.0.8 and all versions after with 'ALLOW_BUILTIN_DEP' enabled contain an authenticated remote code execution vulnerability and node VM sandbox escape due to insecure use of integrated modules (Puppeteer and Playwright) within the nodevm execution environment. ... When the tool executes, the attacker-controlled executable/parameters are run on the host and circumvent the intended nodevm sandbox restrictions, resulting in execution of arbitrary code in the context ... • https://www.vulncheck.com/advisories/flowise-auth-command-execution-and-sandbox-bypass-via-puppeteer-and-playwright-packages • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

30 Sep 2025 — This vulnerability affects Firefox < 143.0.3. These are all security issues fixed in the MozillaFirefox-143.0.3-1.1 package on the GA media of openSUSE Tumbleweed. • https://bugzilla.mozilla.org/show_bug.cgi?id=1987246 • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0

26 Sep 2025 — Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. ... This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3. • https://github.com/apollographql/embeddable-explorer/security/advisories/GHSA-w87v-7w53-wwxv • CWE-346: Origin Validation Error CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

22 Sep 2025 — In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 t... • https://github.com/openai/codex/commit/8595237505a1e0faabc2af3db805b66ce3ae182d • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2025 — As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). • https://github.com/HubSpot/jinjava/commit/66df351e7e8ad71ca04dcacb4b65782af820b8b1 • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine •

CVSS: 7.6EPSS: 0%CPEs: 4EXPL: 0

16 Sep 2025 — The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to undefined behavior, invalid pointer in the Graphics. • https://bugzilla.mozilla.org/show_bug.cgi?id=1986185 • CWE-693: Protection Mechanism Failure CWE-824: Access of Uninitialized Pointer •

CVSS: 7.6EPSS: 0%CPEs: 4EXPL: 0

16 Sep 2025 — The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to use-after-free in the Graphics. • https://bugzilla.mozilla.org/show_bug.cgi?id=1984825 • CWE-416: Use After Free •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

15 Sep 2025 — A file quarantine bypass was addressed with additional checks. ... An app may be able to break out of its sandbox. • https://support.apple.com/en-us/125110 • CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

15 Sep 2025 — A permissions issue was addressed with additional sandbox restrictions. ... A shortcut may be able to bypass sandbox restrictions. • https://support.apple.com/en-us/125108 • CWE-862: Missing Authorization •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

04 Sep 2025 — In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. ... Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation. • https://android.googlesource.com/platform/art/+/444fc40dfb04d2ec5f74c443ed3a4dd45d3131f2 • CWE-416: Use After Free •