{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifwmhs7h4igjea5b3psjm2aisvayrsnes2jlr2a2g4imqxglk75om",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3ml4tksqqovy2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiho3ckkp4ylfqa73dkau3vnjft6cd73qqxms3jcjmnzsrdff7xsx4"
    },
    "mimeType": "image/jpeg",
    "size": 436539
  },
  "path": "/2026/05/critical-apache-http2-flaw-cve-2026.html",
  "publishedAt": "2026-05-05T16:19:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RCE).\nThe vulnerability, tracked as CVE-2026-23918 (CVSS score: 8.8), has been described as a case of \"double free and possible RCE\" in the HTTP/2 protocol handling. This issue",
  "title": "Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE"
}