Chainshorts
Security

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

A critical security flaw in the Python-based Terrarium sandbox, tracked as CVE-2026-5752, was disclosed on April 22, 2026. Rated 9.3 on CVSS, the vulnerability allows attackers to execute arbitrary code with root privileges and escape the container via JavaScript prototype chain traversal. This flaw poses significant security risks for systems using the Terrarium sandbox.

Read to earn +1
Share on XShare on Telegram

More in Security

Security

Microsoft traces Universal Print issues to Graph API code change

Microsoft has identified a code change in the Microsoft Graph API as the cause of ongoing Universal Print sharing issues, which began affecting users in April 2026. The problem prevents users from creating certain printer shares, impacting enterprise printing workflows. Microsoft is working to resolve the issue and restore full functionality.

BleepingComputerApr 22source ↗
Security

Mastercard Enters BSSC With Coinbase and Fireblocks to Set Security Rules Today

On April 21, 2026, Mastercard became a charter member of the Blockchain Security Standards Council (BSSC), joining Coinbase, Fireblocks, and others. Claire Le Gal will represent Mastercard on the BSSC board. The company aims to contribute to security and privacy standards, aligning with its Multi-Token Network initiative. This move emphasizes Mastercard’s focus on enhancing blockchain security protocols.

CoinCentralApr 22source ↗
Security

New GoGra malware for Linux uses Microsoft Graph API for comms

A new Linux variant of the GoGra malware uses the Microsoft Graph API for communication, leveraging legitimate Microsoft infrastructure to evade detection. The malware, which relies on an Outlook inbox for stealthy payload delivery, highlights evolving security threats targeting Linux systems. This development underscores the importance of monitoring cloud-based communication channels for potential malicious activity.

BleepingComputerApr 22source ↗
All Security