The first vulnerability, CVE-2026-4673, is a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. Google has yet to determine the bounty amount for CVE-2026-4677, another bug reported by the same researcher.
The TypeScript team released an early preview of TypeScript 6. This release is mainly about internal changes preparing for the future Go-based compiler planned for TypeScript 7. Large monorepos could see dramatic speed improvements once the Go compiler lands.
This fix associated with the Coruna exploit was shipped in iOS 17.2 on December 11th, 2023. This update brings that fix to devices that cannot update to the latest iOS version.
We've identified, responsibly disclosed, and confirmed 2 critical, 2 high, 2 medium, 1 low security vulnerabilities. Vibe-Hacking Cloudflare's Vibe-Coded Next.js Replacement demonstrates that AI-generated code passing functional tests can still miss security hardening, and automated AI tooling can help find those vulnerabilities.
The viral AI personal assistant, formerly known as Clawdbot and Moltbot, has dominated the feeds of AI boosters over the past few weeks for its ability to perform everyday tasks like sending emails, managing calendars, booking appointments, and complaining about their meatbag masters on the purportedly all-agent forum known as MoltBook. More level-headed voices have already flagged a wave of security vulnerabilities.
It's been another challenging week for the React ecosystem. Developers worldwide have been rushing to update their React versions to patch two new vulnerabilities. This serves as a good reminder for all of us to prioritize security during testing. Fortunately, React Native remains mostly unaffected by these threats, as Server Components aren't yet widely used in the mobile environment. We are taking a well-deserved Christmas break 🎄 so this will be our last issue until January 14th.
A hype cycle as overwhelming and logic-defying as the AI boom comes with its own whirlwind succession of trends that are their own mini booms driven by billions of dollars of money. Once the world got used to large language model-powered AI chatbots, autonomous AI agents became the next big thing. This past year, video generating models have been having their time in the Sun after rapid improvements.
The vulnerabilities on ControlVault USHs were potentially highly dangerous. These laptop models are widely-used in the cybersecurity industry, government settings and challenging environments in their rugged version.
I am very nervous that we have an impending, significant, impending fraud crisis. A thing that terrifies me is apparently there are still some financial institutions that will accept a voice print as authentication for you to move a lot of money.
These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal information disclosure vulnerabilities.
The deserialisation vulnerabilities, identified under the reference VU#252619, impact all versions of the PyTorch Lightning framework up to 2.4.0, allowing for potential arbitrary code execution.