The vm2 JavaScript sandbox module maintainers have released a patch to address a severe bug that affects all versions, including and prior to 3.9.14, and could be exploited to breach security boundaries and execute arbitrary shellcode. vm2 is a popular Node.js tool for running untrusted programs in an isolated environment. It is utilized in 721 packages and generates approximately four million weekly downloads. The vulnerability, CVE-2023-29017, has a CVSS score of 9.8 and does not correctly handle errors that occur in asynchronous operations. The release of the fix comes nearly six months after vm2 patched a further significant vulnerability (CVE-2022-36067, CVSS score: 10) that could have been used to perform arbitrary activities on the underlying machine.
A critical security vulnerability in Kyverno, a widely used Kubernetes policy engine, has been identified that completely undermines namespace isolation within affected clusters. T...
A critical zero-day vulnerability has been disclosed in the open-source Gemini MCP Tool, exposing systems to unauthenticated remote code execution. The flaw, tracked as CVE-2026-07...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted organizations to a critical security weakness impacting Johnson Controls, a major provider of smart bui...