Skip to main content
FreeIntelHub
Feed Threat Feed Search Trending
Intelligence CVE Priority Vulnerability IOC Lookup IOC Feed YARA Rules Phishing Lookup Exploit Lookup Pastes Dark Web
Adversaries Threat Groups Software Campaigns
Explore Dashboard Geo Map Heatmap MITRE ATT&CK
Browse Sources Vendors Categories Sectors
RSS API
FreeIntelHub
/
Sign In

Oracle

20 articles

BleepingComputer CVE Oracle 8h ago

Ghost CMS SQL injection flaw exploited in large-scale ClickFix campaign

A large-scale campaign is exploiting a critical SQL injection vulnerability (CVE-2026-26980) in Ghost CMS to inject malicious JavaScript code that triggers C...

1 IOC

BleepingComputer →

The Hacker News Campaigns Oracle GitHub Linux 1d ago

Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware

A new "coordinated" supply chain attack campaign has impacted eight packages on Packagist including malicious code designed to run a Linux binary retrieved f...

T1195

The Hacker News →

GBHackers Campaigns Oracle 2d ago

Mini Shai-Hulud Attack Prompts npm to Revoke 2FA-Bypass Tokens

npm has forced a platform-wide reset of granular access tokens that bypass two-factor authentication (2FA) after a wave of supply chain attacks linked to the...

T1195

GBHackers →

GBHackers Vulnerability Disclosure Oracle F5 4d ago

New NGINX Vulnerability Exposes Servers to Malicious Code Execution

NGINX has disclosed a new high‑severity vulnerability in its JavaScript module that can allow remote attackers to crash servers and, in specific conditions, ...

GBHackers →

Help Net Security Vulnerability Disclosure Oracle 4d ago

CVE Lite CLI: Open-source dependency vulnerability scanner

Dependency vulnerability scanning in JavaScript and TypeScript projects has long sat at the end of the development pipeline. Pull requests get opened, contin...

Help Net Security →

GBHackers TTPs Oracle 5d ago

JavaScript Malware Campaign Drops Crypto Clipper via PowerShell

A large-scale CountLoader campaign that uses layered obfuscation, multi-stage payload delivery, and covert command-and-control (C2) communication to deploy c...

T1027

GBHackers →

GBHackers Campaigns Oracle 5d ago

Mini Shai-Hulud Attack Hits @antv npm Packages

A large-scale npm supply chain attack has compromised multiple widely used packages within the @antv ecosystem, to investigate what appears to be an active a...

T1195

GBHackers →

GBHackers Vulnerability Disclosure Oracle WordPress 6d ago

Critical FunnelKit Vulnerability Puts 40,000+ WooCommerce Sites at Risk

A critical security vulnerability in the Funnel Builder plugin by FunnelKit is actively being exploited, putting more than 40,000 WooCommerce websites at ris...

T1041 1 IOC

GBHackers →

Security Affairs Vulnerability Disclosure Oracle WordPress May 17

Attackers exploit Funnel Builder bug to inject e-skimmers into e-stores

Attackers are exploiting a critical flaw in the WordPress Funnel Builder plugin to inject skimming code into WooCommerce checkout pages. A critical vulnerabi...

Security Affairs →

The Hacker News Vulnerability Disclosure Oracle WordPress May 16

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

A critical security vulnerability impacting the Funnel Builder plugin for WordPress has come under active exploitation in the wild to inject malicious JavaSc...

The Hacker News →

BleepingComputer Vulnerability Disclosure Oracle WordPress May 15

Funnel Builder WordPress plugin bug exploited to steal credit cards

A critical vulnerability in the Funnel Builder plugin for WordPress is being actively exploited to inject malicious JavaScript snippets into WooCommerce chec...

BleepingComputer →

GBHackers Malware Oracle May 15

Popular node-ipc npm Library Hit by Supply Chain Attack, Impacting 822K Weekly Downloads

A widely used npm package with more than 822,000 weekly downloads has once again become the center of a serious supply chain attack, raising fresh concerns a...

T1195 T1598

GBHackers →

CSO Online Campaigns Oracle GitHub May 14

FlowerStorm phishing gang adopts virtual-machine obfuscation to evade email defenses

A widely active phishing-as-a-service (PhaaS) operation known as FlowerStorm has begun using a browser-based virtual machine to conceal credential theft code...

T1566 T1078 T1027

CSO Online →

The Hacker News Campaigns Oracle May 12

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, ...

T1195

The Hacker News →

GBHackers TTPs Oracle May 8

NWHStealer Campaign Deploys Bun Loader, Anti-VM Evasion, and Encrypted C2

A new distribution method for the NWHStealer infostealer that leverages the Bun JavaScript runtime, marking a significant evolution in the malware’s delivery...

T1573

GBHackers →

CSO Online General Oracle Docker May 8

13 new critical holes in JavaScript sandbox allow execution of arbitrary code

Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code to escape the container and do na...

CSO Online →

Help Net Security General Oracle May 7

Node.js 26 ships with Temporal API enabled by default

Developers managing JavaScript runtimes have a new major version to evaluate. Node.

Help Net Security →

The Hacker News General Oracle May 7

vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution

A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox an...

The Hacker News →

SecurityWeek Advisory Oracle May 6

Oracle Debuts Monthly Critical Security Patch Updates

Containing fixes for critical-severity vulnerabilities, the monthly rollouts will focus on addressing priority issues faster. The post Oracle Debuts Monthly ...

SecurityWeek →

Zero Day Initiative CVE Oracle Apr 28

ZDI-26-306: Oracle VirtualBox SoundBlaster 16 Race Condition Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to...

T1548 T1068 1 IOC

Zero Day Initiative →

1 2 Next page»
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA