Briefs
April 2026 (30)
AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure
2 rules 2 TTPsAttackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.
CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE
2 rules 2 TTPsThe CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.
GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence
2 rules 4 TTPsThis brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.
Suspicious Processes Connecting to Large Language Model Endpoints
3 rules 1 TTPThis rule detects DNS queries to known Large Language Model (LLM) domains by unsigned binaries or common Windows scripting utilities, indicating potential command and control activity leveraging LLMs for dynamic actions on compromised systems.
LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability
1 rule 1 TTP 1 CVELanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.
Critical RCE Vulnerabilities in Spinnaker
2 rules 1 TTP 2 CVEsCritical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.
OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode
2 rules 1 TTPA critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.
InstructLab Arbitrary Code Execution via Malicious HuggingFace Model
2 rules 1 TTP 1 CVEInstructLab is vulnerable to arbitrary code execution because the `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace, allowing remote attackers to execute code by convincing a user to load a malicious model.
InstructLab Path Traversal Vulnerability (CVE-2026-6855)
2 rules 1 TTP 1 CVEA local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.
ASP.NET Core Improper Signature Verification Vulnerability (CVE-2026-40372)
2 rules 1 TTP 1 CVECVE-2026-40372 is a critical vulnerability in ASP.NET Core stemming from improper cryptographic signature verification, potentially enabling unauthorized attackers to achieve network-based privilege escalation.
CrowdStrike LogScale Unauthenticated Path Traversal Vulnerability (CVE-2026-40050)
2 rules 1 TTP 1 CVEA critical unauthenticated path traversal vulnerability (CVE-2026-40050) in CrowdStrike LogScale allows remote attackers to read arbitrary files from the server filesystem if a specific cluster API endpoint is exposed, necessitating immediate patching for self-hosted customers.
ElectricSQL /v1/shape API SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe ElectricSQL sync engine is vulnerable to SQL injection, potentially allowing authenticated users to read, write, and destroy the underlying PostgreSQL database.
Fortra GoAnywhere MFT SSH Key Brute-Force Vulnerability (CVE-2025-14362)
2 rules 1 TTP 1 CVEFortra's GoAnywhere MFT prior to 7.10.0 is vulnerable to brute-force attacks on SSH keys because the login limit is not enforced on the SFTP service when Web Users are configured to log in with an SSH Key.
FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)
2 rules 1 TTP 1 CVE 4 IOCsFreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.
FreeScout Incorrect Authorization Vulnerability via Save Draft
2 rules 1 TTP 1 CVE 4 IOCsFreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.
FreeScout Mass Assignment Vulnerability (CVE-2026-40569)
2 rules 2 TTPs 1 CVEFreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.
FreeScout Privilege Escalation via Email Address Reassignment (CVE-2026-40589)
2 rules 1 TTP 1 CVE 1 IOCFreeScout versions before 1.8.214 are vulnerable to privilege escalation, allowing a low-privileged agent to reassign email addresses from hidden customers to visible customers, leading to information disclosure and unauthorized access to conversations.
goshs GitHub Token Leakage via ArtiPACKED Vulnerability (CVE-2026-40903)
2 rules 1 TTP 1 CVEThe goshs SimpleHTTPServer prior to version 2.0.0-beta.6 is vulnerable to ArtiPACKED, potentially leading to leakage of the GITHUB_TOKEN through workflow artifacts.
Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)
2 rules 1 TTP 1 CVEHermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.
HKUDS OpenHarness Insecure Default Configuration Vulnerability
2 rules 1 TTP 1 CVEHKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.
Lotus Data Wiper Targeting Venezuelan Energy and Utility Firms
3 rules 1 TTPThe Lotus wiper, a previously undocumented data-wiping malware, was deployed against Venezuelan energy and utilities organizations in 2025, overwriting physical drives, deleting files, and rendering systems unrecoverable.
NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)
2 rules 1 TTP 1 CVENestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.
NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)
2 rules 1 TTP 1 CVEA heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.
NVIDIA KAI Scheduler Authentication Bypass Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-24177 describes an authentication bypass vulnerability in NVIDIA KAI Scheduler that could allow unauthorized access to API endpoints, leading to information disclosure.
Oracle Java SE, GraalVM Networking Component Denial-of-Service Vulnerability (CVE-2026-34282)
2 rules 1 TTP 1 CVECVE-2026-34282 is a remotely exploitable vulnerability in the Networking component of Oracle Java SE and GraalVM that allows an unauthenticated attacker to cause a complete denial of service.
Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)
2 rules 1 TTP 1 CVE 4 IOCsTekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.
Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL
2 rules 1 TTP 1 CVEThe Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.
WWBN AVideo SSRF Vulnerability (CVE-2026-41055)
2 rules 1 TTP 1 CVE 1 IOCWWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.
WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)
2 rules 3 TTPs 1 CVEWWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.
JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities
2 rules 1 TTP 2 CVEsUnpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.