24h | 7d | 30d

Overview

  • openai
  • codex

22 Sep 2025
Published
23 Sep 2025
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.05%

KEV

Description

Codex CLI is a coding agent from OpenAI that runs locally. In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 that canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, and not the one generated by the model. Users running 0.38.0 or earlier should update immediately via their package manager or by reinstalling the latest Codex CLI to ensure sandbox boundaries are enforced. If using the Codex IDE extension, users should immediately update to 0.4.12 for a fix of the sandbox issue.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes
  • 0
  • 1
  • 1
  • 22h ago

Overview

  • Cohere
  • cohere-terrarium

14 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes
  • 0
  • 1
  • 1
  • 22h ago

Overview

  • Linux
  • Linux

14 Feb 2026
Published
03 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop operations are performed outside the cable lock, this may result in UAF when a program attempts to trigger frequently while opening/closing the tied stream, as spotted by fuzzers. For addressing the UAF, this patch changes two things: - It covers the most of code in loopback_check_format() with cable->lock spinlock, and add the proper NULL checks. This avoids already some racy accesses. - In addition, now we try to check the state of the capture PCM stream that may be stopped in this function, which was the major pain point leading to UAF.

Statistics

  • 2 Posts

Last activity: 23 hours ago

Bluesky

Profile picture fallback
CVE-2026-23191 (kernel race condition) and CVE-2026-23268 (AppArmor bypass) are classic privilege escalation flaws. Read more: -> tinyurl.com/43zmt7n8
  • 0
  • 0
  • 1
  • 23h ago

Overview

  • Cisco
  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

25 Sep 2025
Published
26 Feb 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
50.69%

Description

Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
Firestarter malware persists on Cisco Firepower and Secure Firewall devices running ASA/FTD, bypassing patches and reboots. Linked to UAT-4356, it exploits CVE-2025-20333 & CVE-2025-20362 via WebVPN. #CiscoFirepower #UK #Backdoor
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
10 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
3.35%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
~Akamai~ An incomplete patch for APT28's CVE-2026-21510 leaves a zero-click NTLM authentication coercion flaw (CVE-2026-32202) via malicious LNK files. - IOCs: CVE-2026-32202, CVE-2026-21510, APT28 - #APT28 #CVE2026_32202 #ThreatIntel #ZeroDay
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Linux
  • Linux

18 Mar 2026
Published
18 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: apparmor: fix unprivileged local user can do privileged policy management An unprivileged local user can load, replace, and remove profiles by opening the apparmorfs interfaces, via a confused deputy attack, by passing the opened fd to a privileged process, and getting the privileged process to write to the interface. This does require a privileged target that can be manipulated to do the write for the unprivileged process, but once such access is achieved full policy management is possible and all the possible implications that implies: removing confinement, DoS of system or target applications by denying all execution, by-passing the unprivileged user namespace restriction, to exploiting kernel bugs for a local privilege escalation. The policy management interface can not have its permissions simply changed from 0666 to 0600 because non-root processes need to be able to load policy to different policy namespaces. Instead ensure the task writing the interface has privileges that are a subset of the task that opened the interface. This is already done via policy for confined processes, but unconfined can delegate access to the opened fd, by-passing the usual policy check.

Statistics

  • 2 Posts

Last activity: 23 hours ago

Bluesky

Profile picture fallback
CVE-2026-23191 (kernel race condition) and CVE-2026-23268 (AppArmor bypass) are classic privilege escalation flaws. Read more: -> tinyurl.com/43zmt7n8
  • 0
  • 0
  • 1
  • 23h ago

Overview

  • Pending

15 Jan 2025
Published
25 Apr 2026
Updated

CVSS
Pending
EPSS
0.31%

Description

SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
~Cisa~ CISA added 4 actively exploited CVEs affecting Samsung, SimpleHelp, and D-Link to the KEV catalog. - IOCs: CVE-2024-7399, CVE-2024-57726, CVE-2025-29635 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Samsung Electronics
  • MagicINFO 9 Server

09 Aug 2024
Published
25 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
71.00%

Description

Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
~Cisa~ CISA added 4 actively exploited CVEs affecting Samsung, SimpleHelp, and D-Link to the KEV catalog. - IOCs: CVE-2024-7399, CVE-2024-57726, CVE-2025-29635 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 16h ago
Showing 31 to 38 of 38 CVEs