Skip to content
Threat Feed

Briefs

April 2026 (30)

high advisory

Multiple Vulnerabilities in cURL

Multiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.

cURL vulnerability
2r 3t 4c
medium advisory

AI-Powered Honeypots: Deceptive Environments for Automated Threat Actors

Generative AI can be used to rapidly deploy adaptive honeypot systems that simulate diverse environments, like Linux shells or IoT devices, to trick and observe AI-driven attacks that prioritize speed over stealth.

honeypot ai deception threat-intelligence
2r 3t 1c
high threat

Elinsky execution-system-mcp Path Traversal Vulnerability

Elinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.

exploited execution-system-mcp 0.1.0 path-traversal web-application cve-2026-7319
2r 1t 1c
medium advisory

Multiple Vulnerabilities in GNU libc

A remote, anonymous attacker can exploit multiple vulnerabilities in GNU libc to execute arbitrary program code, cause a denial-of-service condition, or disclose sensitive information.

libc vulnerability glibc denial-of-service code-execution
2r 3t 5c
high advisory

Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS

Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Enterprise Linux vulnerability code-execution denial-of-service linux
2r 2t
high advisory

ProFTPD SQL Injection Vulnerability

An anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.

ProFTPD sqli linux
2r 1t
medium advisory

CVE-2025-68146 filelock TOCTOU Race Condition Enables Symlink Attacks

CVE-2025-68146 describes a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the filelock library that could allow for symlink attacks during lock file creation, potentially leading to unauthorized file access or modification.

TOCTOU symlink filelock CVE-2025-68146 race condition
2r 1c
medium advisory

OpenTelemetry-Go Multi-Value Baggage Header Extraction DoS Vulnerability (CVE-2026-29181)

A vulnerability in OpenTelemetry-Go related to the extraction of multi-value baggage headers can lead to excessive resource allocation, resulting in a remote denial-of-service amplification.

OpenTelemetry-Go dos opentelemetry cve-2026-29181
2r 1t 1c
medium advisory

rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)

CVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.

rust-openssl memory-leak tls cve
2r 1c
medium advisory

CoreDNS DoQ Server Denial-of-Service Vulnerability

CoreDNS' DNS-over-QUIC (DoQ) server can be driven into large goroutine and memory growth by a remote client that opens many QUIC streams and stalls after sending only 1 byte, leading to denial of service in versions before 1.14.3.

coredns dos denial-of-service vulnerability
2r 3t 1c
high advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-42432)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability that allows previously paired nodes to reconnect and execute privileged commands without proper authorization, potentially leading to complete system compromise.

OpenClaw privilege-escalation cve-2026-42432
2r 1t 1c
high advisory

OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.

OpenClaw privilege-escalation vulnerability
2r 1t 1c
medium advisory

OpenClaw Unauthenticated WebSocket Denial-of-Service Vulnerability

OpenClaw before 2026.3.28 is vulnerable to a denial-of-service attack by accepting unbounded concurrent unauthenticated WebSocket upgrades, allowing attackers to exhaust server resources.

OpenClaw denial-of-service websocket cve
2r 1t 1c
high advisory

OpenClaw Exec Allowlist Bypass Vulnerability (CVE-2026-41390)

OpenClaw before version 2026.3.28 contains an exec allowlist bypass vulnerability (CVE-2026-41390) that allows attackers to persist trust for wrapper binaries like /usr/bin/script to execute different underlying programs, potentially leading to privilege escalation.

OpenClaw allowlist bypass privilege escalation cve-2026-41390
2r 2t 1c
critical advisory

LLM-Based Compromised User Triage

This rule correlates multiple security alerts involving the same user, analyzes them with an LLM, and flags potentially compromised accounts based on MITRE tactics, geographic anomalies, and multi-host activity, helping analysts prioritize users exhibiting indicators of credential theft or unauthorized access.

Elastic Cloud Domain: Identity Domain: LLM Use Case: Threat Detection Use Case: Identity and Access Audit Resources: Investigation Guide Rule Type: Higher-Order Rule
2r 2t
critical advisory

D-Link DIR-825M Remote Buffer Overflow Vulnerability

D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.

DIR-825M buffer-overflow router dlink cve
2r 1t 1c
high threat

UNC6692 Combines Social Engineering, Malware, and Cloud Abuse

UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.

Microsoft Teams +1 UNC6692 social-engineering malware cloud-abuse credential-theft lateral-movement
2r 12t
medium advisory

ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.

NextChat ssrf cve-2026-7177 web-application
2r 1t 1c
high advisory

mkdocs-mcp-plugin Path Traversal Vulnerability

A path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.

mkdocs-mcp-plugin path-traversal mkdocs CVE-2026-7159
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7130
2r 1t 1c
critical advisory

Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig

A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.

HG3 cve-2026-7151 buffer-overflow tenda router
2r 2t 1c
high advisory

AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)

A DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.

AVACAST dll-hijacking privilege-escalation code-execution
2r 1t 1c
medium advisory

Detection of Github Delete Actions in Audit Logs

This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.

Github audit data-loss impact
2r 1t
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

Totolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.

A8000RU cve-2026-7241 command-injection router
2r 1t 1c
critical advisory

D-Link DI-8100 Remote Buffer Overflow Vulnerability

A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.

DI-8100 cve-2026-7248 buffer-overflow d-link router
2r 1t 1c
critical advisory

Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)

A critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.

A8000RU command injection router vulnerability cve-2026-7244
3r 1t 1c
critical advisory

VMware Tanzu Spring Boot Multiple Vulnerabilities

Multiple vulnerabilities in VMware Tanzu Spring Boot allow attackers to execute arbitrary code, bypass security measures, manipulate or disclose sensitive data, or hijack authenticated users.

Tanzu Spring Boot vmware spring-boot vulnerability
2r 4t
critical advisory

Multiple Vulnerabilities in Atlassian Products

Multiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, and Jira allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.

Bamboo +3 atlassian vulnerability code-execution xss
2r 4t 1c
high advisory

AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)

A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.

scaffold-mcp path-traversal cve web-application
2r 1t 1c
critical advisory

Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)

CVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.

A8000RU 7.1cu.643_b20200521 cve-2026-7240 command-injection totolink router cgi
2r 1t 1c