![chrome based browsers windows chrome based browsers windows](https://d.ibtimes.co.uk/en/full/1526406/microsoft-edge-battery-experiment.jpg)
![chrome based browsers windows chrome based browsers windows](https://www.majorgeeks.com/content/file/2724_how+to+enable+or+disable+most+used+on+windows+10+start+menu+1.jpg)
So make sure you're using one of the best Windows 10 antivirus programs or best Mac antivirus programs to prevent infection. An attacker could use another method to infect your PC, Mac or Linux box, and then the running malware could use Agarwal's exploit to disable sandbox and take over your machine. Unfortunately, malware can disable the sandbox, too. A new Chrome window will open with no sandbox protections. You can do that in Windows by typing the Chrome application filepath in a command-line window with the suffix "-no-sandbox". To get Agarwal's exploit to work, the browser sandbox has to be disabled. Non-Chromium browsers such as Mozilla Firefox or Apple Safari are not affected by this flaw. Mobile versions of these browsers are also sandboxed, but there's no evidence that this affects them too.
CHROME BASED BROWSERS WINDOWS FULL
The exploit won't work on its own because Chromium-based browsers are "sandboxed" so that (most) exploits affecting them won't "escape" onto the full Windows, macOS or Linux system on which the browser is running. If you use one of these browsers, don't fret just yet. Agarwal used recent changes to the public V8 code to reverse-engineer the Pwn2Own exploit. The flaw lies in the V8 JavaScript engine used by Chrome, Edge, Opera, Brave, Vivaldi and several other browsers, all of which are based on the Chromium open-source browser maintained by Google and all of which are vulnerable to this exploit.