Dismissed
Permalink
CVE-2026-23744
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
29 packages
- inspector
- appium-inspector
- rubyPackages.gh_inspector
- perlPackages.ClassInspector
- haskellPackages.hs-inspector
- rubyPackages_3_1.gh_inspector
- rubyPackages_3_2.gh_inspector
- rubyPackages_3_3.gh_inspector
- rubyPackages_3_4.gh_inspector
- rubyPackages_3_5.gh_inspector
- perl538Packages.ClassInspector
- perl540Packages.ClassInspector
- python312Packages.apkinspector
- python313Packages.apkinspector
- haskellPackages.amazonka-inspector
- python312Packages.debian-inspector
- python313Packages.debian-inspector
- haskellPackages.amazonka-inspector2
- kdePackages.accessibility-inspector
- python312Packages.container-inspector
- python313Packages.container-inspector
- python312Packages.mypy-boto3-inspector
- python313Packages.mypy-boto3-inspector
- python312Packages.mypy-boto3-inspector2
- python313Packages.mypy-boto3-inspector2
- python312Packages.types-aiobotocore-inspector
- python313Packages.types-aiobotocore-inspector
- python312Packages.types-aiobotocore-inspector2
- python313Packages.types-aiobotocore-inspector2
- @LeSuisse dismissed
REC in MCPJam inspector due to HTTP Endpoint exposes
MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
References
Affected products
inspector
- ==<= 1.4.2