24h | 7d | 30d

Overview

  • Linux
  • Linux

22 Apr 2026
Published
05 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.98%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 24 Posts
  • 65 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

#CopyFail **UPDATE 2025-05-05:** Red Hat has released the kernel updates for Red Hat Enterprise Linux 9 and 10. So if you followed the steps I described in this thread, you can now simply do

dnf update

on affected machines to get the new kernel and do a

grubby --update-kernel=ALL --remove-args='initcall_blacklist=algif_aead_init'

to remove the mitigation described in this post, before you finish the process with a

reboot

to switch to the fixed kernel.

access.redhat.com/security/cve

  • 10
  • 18
  • 0
  • 7h ago
Profile picture fallback

Une trÚs bonne synthÚse sur la faille CopyFail impactant le noyau Linux : historique de la faille, mécanisme d'exploitation, gestion érratique de la divulgation, mitigation - par Linuxtricks #Infosec #Linux linuxtricks.fr/news/10-logicie

  • 11
  • 0
  • 0
  • Last hour
Profile picture fallback

Kritische #Kernel #LĂŒcke bedroht zahlreiche #Linux Systeme - #fosstopia

#IT #Security #Forscher haben eine schwere #Schwachstelle im #Linux_Kernel offengelegt (CVE-2026-31431). Die LĂŒcke trĂ€gt den Namen Copy Fail und erlaubt lokalen Nutzern den Zugriff auf höchste Systemrechte (root). Angreifer können gezielt vier Bytes in den Seitencache beliebiger Dateien schreiben und so die Kontrolle ĂŒber ein System ĂŒbernehmen...

fosstopia.de/kritische-kernel-

  • 3
  • 1
  • 0
  • 15h ago
Profile picture fallback

NicFab Newsletter #19 is out.

This week:
→ EDPB marks 10 years of GDPR
→ AI Act trilogue stalls — high-risk rules still set for 2 August 2026
→ EU Age Verification App found vulnerable hours after launch
→ First European standard on trusted data transactions (EN 18235-1:2026)
→ CopyFail (CVE-2026-31431) added to CISA KEV
→ Minnesota first US state to ban nudification apps

nicfab.eu/en/newsletter-issues

#Privacy #DataProtection #AIAct #Cybersecurity #AI

  • 3
  • 0
  • 0
  • 4h ago
Profile picture fallback
  • 2
  • 1
  • 0
  • 6h ago
Profile picture fallback

AlmaLinux 10.2 Beta is now live!

The release team of AlmaLinux, which is a free binary-compatible alternative to a commercial Linux distribution, Red Hat Enterprise Linux, has just released the beta version of the upcoming point release, which is AlmaLinux v10.2.

This beta version of AlmaLinux brings many improvements over the current version, which is version v10.1. The version is available for the following architectures listed:

  • Intel/AMD (x86_64)
  • Intel/AMD (x86_64_v2)
  • Intel/AMD 32-bit (i686) (userspace only, no installation)
  • ARM64 (aarch64)
  • IBM PowerPC (ppc64le)
  • IBM Z (s390x)

However, this beta version of AlmaLinux is not a production release, and is not guaranteed to be stable, especially when it comes to production installations. For users who rely on stability, you’ll have to wait until the official release. If you are curious about this beta version, and you intend to test and to report bugs and issues, you can download the beta version here.

AlmaLinux 10.2 brings i686 userspace packages to enable legacy 32-bit software, CI pipelines, and containerized workloads for users who rely on them in their workflow. It also presents you with updated toolsets and packages, such as the updated MariaDB 11.8, PHP 8.4, and Python 3.14. Security updates have also been provided, such as OpenSSL, Keylime, and SELinux policies, to enhance your computer’s security and to reduce attack vectors.

Also, a severe vulnerability that was left unnoticed since 2017, called Copy Fail (CVE-2026-31431) that exposed a flaw in authencesn, has been patched in this version of AlmaLinux, along with versions v10.x, v9.x, and v8.x.

You can learn more about this beta version here.

Learn more Download #AlmaLinux #AlmaLinux10 #AlmaLinux102 #Linux #news #Tech #Technology #update
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback

Heads up: CVE-2026-31431 (Copy Fail) is a kernel crypto vulnerability affecting Rocky Linux. Our community is on it: tracking patches and sharing Rocky-specific guidance as it develops.

If you're running Rocky in production, check the forum thread for the latest:

forums.rockylinux.org/t/cve-20
#RockyLinux #LinuxSecurity #OpenSource

  • 0
  • 7
  • 0
  • 21h ago
Profile picture fallback

"CISA flags actively exploited ‘Copy Fail’ Linux kernel flaw enabling root takeover across major distros — unpatched systems may remain vulnerable to attack"

"CISA warns of the actively exploited “Copy Fail” Linux flaw (CVE-2026-31431), enabling root access, with a public exploit released before patches were ready."

tomshardware.com/software/linu

  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback

"CopyFail" (CVE-2026-31431) : un utilisateur local sans privilĂšge peut Ă©crire 4 bytes contrĂŽlĂ©s dans le cache de TOUT fichier lisible âžĄïž Ă©lĂ©vation root. Si vous avez du multi-tenant, des conteneurs, des CI runners non fiables : mettre Ă  jour. Ordinateur perso ? Moins urgent mais mettez Ă  jour quand mĂȘme.

L'article : xint.io/blog/copy-fail-linux-d (en)

Le site : copy.fail/ (en)
#linux #cybersecurity

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

Presenting, for absolutely no reason at all, CVE-2026-31431 as a 587-byte x86_64 static ELF:
github.com/Rat5ak/CVE-2026-314

  • 0
  • 0
  • 1
  • Last hour

Bluesky

Profile picture fallback
Kernel crypto vulnerability alert: CVE-2026-31431 (Copy Fail) affects Rocky Linux users. Our community is tracking patches and next steps in real time. Rocky-specific guidance: forums.rockylinux.org/t/cve-2026-3... #RockyLinux #LinuxSecurity
  • 1
  • 6
  • 0
  • 21h ago
Profile picture fallback
**Linux Security Alert! ** The 'Copy Fail' (CVE-2026-31431) flaw lets ANY local user gain root access on SUSE & other distros. Read more-> tinyurl.com/mr5e2y7d #SUSE #Security
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
CISA ajoute la faille Linux CVE-2026-31431, exploitĂ©e en local pour escalade de privilĂšges, Ă  son catalogue KEV. Plusieurs distrib Linux sont concernĂ©es. Restez vigilants ! 🔒🐧 #CyberSecurity #calimeg
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
CVE-2026-31431: perché Linux Copy Fail preoccupa Una vulnerabilità nel kernel Linux, presente dal 2017, consente escalation a root manipolando la page cache. CISA e altri sogge... https://www.ilsoftware.it/vulnerabilita-linux-copy-fail-cve-2026-31431/
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
The latest update for #SafeBreach includes "'Copy Fail' Vulnerability (CVE-2026-31431): #Linux Kernel Privilege Escalation" and "Introducing SafeBreach Helm". #Cybersecurity https://opsmtrs.com/41NWGuQ
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
The latest update for #Tanium includes "What is a software patch? How it works and why it matters" and "Copy Fail (CVE-2026-31431): What #Linux administrators need to know now". #cybersecurity #EndpointProtection #EndpointSecurity https://opsmtrs.com/3DH5Ks9
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CVE-2026-31431: Copy Fail vs. rootless containers #HackerNews https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/
  • 0
  • 0
  • 2
  • 8h ago
Profile picture fallback
CVE-2026-31431: Copy Fail vs. rootless containers | Discussion
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
🚹 What if a Linux exploit never touched disk? Copy Fail (CVE-2026-31431) lets attackers become root by corrupting the page cache in memory. No file changes No integrity alerts Harder to detect CVSS 7.8 (High) 👉 basefortify.eu/posts/2026/0... #Linux #CyberSecurity #CopyFail
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
28.36%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 11 Posts
  • 7 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Falla in cPanel e WHM mette a rischio gli account amministrativi sui server di hosting


@informatica
La pubblicazione di un PoC per la CVE-2026-41940 espone cPanel & WHM e WP Squared a rischi concreti di takeover. L’authentication bypass puĂČ compromettere server hosting e siti WordPress. Analisi tecnica, impatti e contromisure per

  • 3
  • 0
  • 0
  • 14h ago
Profile picture fallback

cPanel zero-day active:
40K+ servers hit
CVE-2026-41940
→ auth bypass
→ admin access
Patch immediately.

Source: securityweek.com/over-40000-se

Follow @technadu

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

🚹 In this week’s newsletter, we cover CVE-2026-41940, a cPanel & WHM authentication bypass that puts entire hosting environments at risk. We break down how it enables admin access and what defenders should do next.

Read the full analysis and protect your systems 👉 crowdsec.net/vulntracking-repo

  • 0
  • 0
  • 1
  • 21h ago
Profile picture fallback

📰 cPanel Zero-Day Auth Bypass (CVE-2026-41940) Actively Exploited for Months Before Patch

🚹 CRITICAL ZERO-DAY 🚹 cPanel & WHM auth bypass (CVE-2026-41940, CVSS 9.8) exploited for months before patch! Unauthenticated attackers can get root access. 1.5M instances exposed. Patch NOW! #cPanel #ZeroDay #CVE #WebHosting

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

Cyber Journaal S02E53: cPanel CVE-2026-41940 leidde tot 44.000 gecompromitteerde installaties, ShinyHunters lekte 215.600 Aman Resorts accounts en Raptor Supplies Nederland staat op het darkweb.

➀ ccinfo.nl/journaal/3150984_cpa

#cybersecurity #datalek #infosec

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Multiple threat actors actively exploit cPanel vulnerability (CVE-2026-41940) 📖 Read more: www.helpnetsecurity.com/2026/05/04/m... #cybersecurity #cybersecuritynews #cPanel #CVE #botnet #cyberespionage #malware #ransomware #webhosting @shadowserver.bsky.social @censys.bsky.social
  • 1
  • 1
  • 1
  • 23h ago
Profile picture fallback
The cPanel Situation Is
 - Censys On April 29, 2026, CVE-2026-41940 was disclosed as a critical pre-authentication bypass affecting cPanel and WHM. The is Read more: https://censys.com/blog/the-cpanel-situation-is/
  • 0
  • 2
  • 0
  • 6h ago
Profile picture fallback
Cyber Journaal S02E53: cPanel CVE-2026-41940 leidde tot 44.000 gecompromitteerde installaties na een zero day van twee maanden, ShinyHunters lekte 215.600 Aman Resorts accounts via vishing op de helpdesk, en Raptor Supplies Nederland staat op het darkweb. ➀ www.ccinfo.nl/journaal/315...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
📱 EntitĂ©s militaires sud-est asiatiques ciblĂ©es via CVE-2026-41940 (cPanel) avec exfiltration de donnĂ©es chinoises 📝 ## 🔍 C
 https://cyberveille.ch/posts/2026-05-04-entites-militaires-sud-est-asiatiques-ciblees-via-cve-2026-41940-cpanel-avec-exfiltration-de-donnees-chinoises/ #AdaptixC2 #Cyberveille
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Apache Software Foundation
  • Apache HTTP Server

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

Statistics

  • 7 Posts
  • 15 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Critical Apache HTTP Server 2.4.67 Patches RCE Flaw CVE-2026-23918 — Upgrade All Servers Immediately
#CyberSecurity
securebulletin.com/critical-ap

  • 4
  • 0
  • 0
  • 3h ago
Profile picture fallback

HTTP Server Vulnerability CVE-2026-23918 Exposes Millions of Servers to Remote Code Execution Attacks.
Anyone running Apache httpd version 2.4.66 or earlier are strongly urged to upgrade immediately!

👇
gbhackers.com/apache-http-serv

  • 0
  • 0
  • 1
  • Last hour
Profile picture fallback

Several vulnerabilities in HTTP Server 2.4 have been fixed in release 2.4.67. The most severe of these are:

- CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset

- CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr

- CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack

httpd.apache.org/security/vuln

  • 5
  • 6
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Critical Apache HTTP Server Flaw Exposes Millions of Servers to RCE Attacks: A Technical Deep Dive into CVE-2026-23918 + Video Introduction: A critical remote code execution (RCE) vulnerability, designated CVE-2026-23918 and rated High with a CVSS base score of 8.8, has been discovered in the

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
high risk CVE-2026-23918 in Apache HTTP Server HTTP/2 implementation. cc @levhita.net
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
Apache HTTP Serverăźè„†ćŒ±æ€§(Important: CVE-2026-23918, Moderate: CVE-2026-24072, CVE-2026-33006, Low:耇数)ず2.4.67ăƒȘăƒȘăƒŒă‚č #sios_tech #security #vulnerability #ă‚»ă‚­ăƒ„ăƒȘティ #è„†ćŒ±æ€§ #apache #struts security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Weaver Network Co., Ltd.
  • E-cology

07 Apr 2026
Published
07 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.18%

KEV

Description

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system. Exploitation evidence was first observed by the Shadowserver Foundation on 2026-03-31 (UTC).

Statistics

  • 3 Posts
  • 5 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands.
  • 1
  • 4
  • 0
  • 14h ago
Profile picture fallback
A critical unauthenticated RCE (CVE-2026-22679) exploited since March in Weaver E-cology 10.0 via an exposed debug API allowed remote command execution. Patch released March 12 removes the vulnerable endpoint. #WeaverEcology #RemoteCodeExec #China
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

Statistics

  • 3 Posts
  • 29 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

AISLE boasts about their AI tooling and CVE-2026-42511:

"Our autonomous AI system found another critical vulnerability in the FreeBSD DHCP stack - an unauthenticated remote code execution vulnerability with root privileges.

This finding is significant not only because RCE as root is about as severe as it gets, but also because FreeBSD was explicitly included in Anthropic’s Mythos announcement, and Mythos did not identify this issue."

  • 9
  • 20
  • 0
  • 4h ago
Profile picture fallback

Not sure if it was a good idea to look this closely: CVE-2026-42511 (#freebsd ) looks awfully similar to CVE-2011-0997 (isc-dhcp).

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
~Cybergcca~ CCCS released 5 advisories covering critical updates for IBM, Dell, FreeBSD, Ubuntu, and CISA ICS products. - IOCs: CVE-2026-42511, CVE-2026-7270, CVE-2026-7164 - #PatchManagement #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Google
  • Android

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution as the shell user with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 2 Posts
  • 8 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Critical Android Zero-Click Vulnerability CVE-2026-0073 Allows Remote Shell Access Without User Interaction
#CyberSecurity
securebulletin.com/critical-an

  • 6
  • 1
  • 0
  • 3h ago
Profile picture fallback

Actualiza tu Android ya: este fallo permite atacar el móvil sin que pulses nada 👇
adslzone.net/noticias/moviles/
#Ciberseguridad #Seguridad #Privacidad 🔏

  • 1
  • 0
  • 0
  • Last hour

Overview

  • D-Link
  • DNS-320L

04 Apr 2024
Published
21 Oct 2025
Updated

CVSS v3.1
HIGH (7.3)
EPSS
94.42%

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

Statistics

  • 2 Posts

Last activity: 4 hours ago

Fediverse

Profile picture fallback
[RSS] pyghidra-mcp Meets Ghidra GUI: Drive Project-Wide RE with Local AI

https://clearbluejar.github.io/posts/pyghidra-mcp-meets-ghidra-gui-drive-project-wide-re-with-local-ai/

+ CVE-2024-3273 analysis (D-Link)
  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture fallback
[RSS] pyghidra-mcp Meets Ghidra GUI: Drive Project-Wide RE with Local AI clearbluejar.github.io -> + CVE-2024-3273 analysis (D-Link Original->
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Progress Software
  • MOVEit Automation

30 Apr 2026
Published
01 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0.

Statistics

  • 3 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670) 📖 Read more: www.helpnetsecurity.com/2026/05/04/c... #CyberSecurity #CyberSecurityNews #CVE
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
Progress Software alerts on critical MOVEit Automation auth bypass (CVE-2026-4670) affecting versions before 2025.1.5, enabling remote unauthenticated attacks. Over 1,400 instances found, including US gov systems. #MOVEitFlaw #AuthBypass #USA
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions <=2025.1.4. #MOVEit #Airbus #Vulnerability
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • GitHub
  • Enterprise Server

10 Mar 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.30%

KEV

Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 6 hours ago

Bluesky

Profile picture fallback
Critical GitHub RCE Vulnerability CVE-2026-3854 Allows Arbitrary Commands URL: nvd.nist.gov/vuln/detail/... Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 8.8
  • 0
  • 2
  • 0
  • 6h ago

Overview

  • Oracle Corporation
  • Oracle MCP Server Helper Tool product of Oracle Open Source Projects

05 May 2026
Published
05 May 2026
Updated

CVSS v3.1
HIGH (8.7)
EPSS
Pending

KEV

Description

Vulnerability in the Oracle MCP Server Helper Tool product of Oracle Open Source Projects (component: helper tool). The supported versions that is affected is 1.0.1-1.0.156. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle MCP Server Helper Tool. Successful attacks of this vulnerability can result in Oracle MCP Server Helper Tool executing malicious SQL.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 2 hours ago

Bluesky

Profile picture fallback
⚠ A high-severity flaw in CVE-2026-35228 affects Oracle MCP Server Helper Tool (CVSS 8.7). Unauthenticated attackers can execute malicious SQL via HTTP. 🔗 basefortify.eu/cve_reports/... #CVE #CyberSecurity #Oracle
  • 0
  • 1
  • 0
  • 2h ago
Showing 1 to 10 of 35 CVEs