Briefs
May 2026 (30)
libexif Vulnerability Allows Code Execution
2 rules 2 TTPsA local attacker can exploit a vulnerability in libexif to potentially execute arbitrary code, cause a denial of service, or disclose sensitive information.
GNU InetUtils Multiple Vulnerabilities Allow Code Execution and Information Disclosure
2 rules 2 TTPsMultiple vulnerabilities in GNU InetUtils allow a remote attacker to execute arbitrary code and disclose sensitive information.
Grafana Multiple Vulnerabilities Leading to XSS and Information Disclosure
2 rules 1 TTPMultiple vulnerabilities in Grafana allow a remote, anonymous attacker to conduct a Cross-Site Scripting attack or disclose information.
XZ Utility Vulnerability Allows Remote Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.
MariaDB Vulnerability Allows Denial of Service and Potential Code Execution
2 rules 2 TTPsA remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.
Tegsoft Online Support Application Reflected XSS Vulnerability (CVE-2025-14320)
2 rules 1 TTP 1 CVECVE-2025-14320 is a reflected cross-site scripting (XSS) vulnerability in Tegsoft Online Support Application versions V3 through 31122025, allowing attackers to inject arbitrary web scripts into user browsers.
Multiple Vulnerabilities in Rapid7 Velociraptor
2 rules 3 TTPsMultiple vulnerabilities in Rapid7 Velociraptor could allow an attacker to disclose information or cause a denial of service.
osrg GoBGP Integer Underflow Vulnerability
2 rules 1 TTP 1 CVEosrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.
Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)
2 rules 1 TTP 1 CVEFunadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.
GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability
2 rules 1 CVEA remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.
Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEShandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.
Totolink WA300 Buffer Overflow Vulnerability (CVE-2026-7719)
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Totolink WA300 version 5.2cu.7112_B20190227 within the loginauth function of the /cgi-bin/cstecgi.cgi file, specifically affecting the POST Request Handler component, triggerable via manipulation of the http_host argument, and remotely exploitable with a publicly available exploit.
Totolink WA300 Buffer Overflow Vulnerability in UploadCustomModule
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in the UploadCustomModule function of the /cgi-bin/cstecgi.cgi file in the POST Request Handler component of Totolink WA300 version 5.2cu.7112_B20190227, which can be exploited by manipulating the File argument.
YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)
2 rules 1 TTP 1 CVEYunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.
Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach
2 rules 4 TTPs 5 CVEsMultiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.
AV Stumpfl Pixera Two Media Server Code Injection Vulnerability
2 rules 1 TTP 1 CVEA remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.
Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.
Acrel ECEMS SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.
Microsoft CVE-2026-30656 Information Published
1 CVEMicrosoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.
Microsoft Product Vulnerability CVE-2026-37555
2 rules 1 CVECVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.
Edimax BR-6208AC Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Edimax BR-6208AC devices (<= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.
Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.
NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)
2 rules 1 TTP 1 CVEThe NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.
Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Shenzhen Libituo Technology LBT-T300-HW1 version 1.2.8 and earlier, allowing remote attackers to execute arbitrary code by manipulating the Channel/ApCliSsid argument in the start_lan function of the /apply.cgi file.
Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability (CVE-2026-7674) exists in the Web Management Interface of Shenzhen Libituo Technology LBT-T300-HW1 devices, allowing remote attackers to execute arbitrary code by manipulating the vpn_pptp_server or vpn_l2tp_server arguments in the start_single_service function.
Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)
2 rules 1 TTP 1 CVEJinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.
code-projects Online Hospital Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.
InnoShop Improper Authentication Vulnerability (CVE-2026-7630)
2 rules 1 TTP 1 CVEInnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.
WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion
2 rules 1 TTP 1 CVEThe WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.
Potential Chroot Container Escape via Mount
2 rulesThe rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.