550 results (0.011 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

13 Jan 2026 — Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm that allows untrusted, sandboxed JavaScript code to execute arbitrary code in the host Node.js runtime. • https://github.com/agentfront/enclave/commit/ed8bc438b2cd6e6f0b5f2de321e5be6f0169b5a1 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-693: Protection Mechanism Failure •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

13 Jan 2026 — Sandbox escape in the Messaging System component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2005845 • CWE-284: Improper Access Control CWE-693: Protection Mechanism Failure •

CVSS: 10.0EPSS: 0%CPEs: 10EXPL: 0

13 Jan 2026 — Sandbox escape due to integer overflow in the Graphics component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2005014 • CWE-190: Integer Overflow or Wraparound •

CVSS: 10.0EPSS: 0%CPEs: 10EXPL: 0

13 Jan 2026 — Sandbox escape due to incorrect boundary conditions in the Graphics component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2004602 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.0EPSS: 0%CPEs: 10EXPL: 0

13 Jan 2026 — Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2003989 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

09 Jan 2026 — This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of MCP config objects. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escape the sandb... •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

26 Dec 2025 — From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. • https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v • CWE-693: Protection Mechanism Failure •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2025 — Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

11 Dec 2025 — MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0. • https://github.com/1Panel-dev/MaxKB/commit/f8ada9a110c4dbef8c3c2636c78847ecd621ece7 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

11 Dec 2025 — Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execut... • https://github.com/sandboxie-plus/Sandboxie/commit/000492f8c411d24292f1b977a107994347bc7dfa • CWE-190: Integer Overflow or Wraparound •