Skip to content
Threat Feed

Briefs

May 2026 (29)

medium advisory

AWS Discovery API Calls from VPN ASN by New Identity

This rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.

Amazon Web Services cloud aws discovery vpn
2r 1t
high advisory

SQL Injection Vulnerability in itsourcecode Courier Management System

itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.

Courier Management System sql-injection web-application cve
2r 1t 1c
low advisory

AWS Discovery API Calls via CLI from a Single Resource

This rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.

cloud aws cloudtrail discovery
2r 2t
low advisory

Rapid Enumeration of AWS S3 Buckets

An AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.

AWS S3 +1 aws s3 cloudtrail discovery enumeration reconnaissance
2r 4t
high advisory

Potential Kerberos SPN Spoofing via Suspicious DNS Query

Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.

Elastic Defend credential-access kerberos spn-spoofing dns windows
2r 1t
medium advisory

Prosody Memory Exhaustion Vulnerability (CVE-2026-43506)

Prosody versions before 0.12.6, versions 1.0.0 through 13.0.0, and before version 13.0.5 are vulnerable to a denial of service due to memory leaks from unauthenticated connections, leading to memory exhaustion.

Prosody denial-of-service memory exhaustion
2r 1t 1c
high advisory

WP Editor Plugin CSRF Vulnerability

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.

WP Editor plugin <= 1.2.9.2 csrf wordpress plugin vulnerability
2r 1t 1c
critical advisory

WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)

The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.

Temporary Login plugin authentication bypass wordpress plugin vulnerability cve-2026-7567 cloud
2r 1t 1c
high advisory

Potential Root Effective Shell from Non-Standard Path via Auditd

This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.

Auditd Manager privilege-escalation linux auditd
2r 1t
high advisory

Malware Distribution via Hugging Face and ClawHub

Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.

Atomic macOS Stealer malware social-engineering ai-platforms
2r 1t
medium advisory

Microsoft Product Vulnerability CVE-2026-41526

CVE-2026-41526 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon patch release for exploitation details.

vulnerability microsoft
1c
medium advisory

Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)

CVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.

libssh denial-of-service CVE-2026-0967 defense-evasion
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application cve-2026-7550
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application vulnerability
2r 1t 1c
critical advisory

Totolink NR1800X Command Injection Vulnerability

A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.

NR1800X 9.1.0u.6279_B20210910 command-injection router network
2r 1t 1c
critical advisory

Totolink NR1800X Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.

NR1800X 9.1.0u.6279_B20210910 cve remote code execution buffer overflow router
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)

A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.

Chrome +1 use-after-free chromium edge cve-2026-7359
2r 1c
critical advisory

Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)

CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.

Chrome +1 heap overflow chromium cve-2026-7353
2r 2t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)

CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free edge cve-2026-7338 remote code execution
2r 1c
high advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)

CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free browser chromium
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)

CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free vulnerability browser
2r 1t 1c
critical threat

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)

CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium gpu cve-2026-7333 remote code execution
2r 1c
critical advisory

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)

CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium edge
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)

CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.

Chrome +1 use-after-free chromium cve-2026-7355 browser
2r 1t 1c
critical advisory

CVE-2026-7339: Heap Buffer Overflow in WebRTC

A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.

Chrome +1 webrtc heap-overflow code-execution cve-2026-7339
2r 1c
high advisory

SourceCodester Advanced School Management System SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.

Advanced School Management System 1.0 sqli vulnerability web-application
2r 1t 1c
high advisory

Fujian Apex LiveBOS Path Traversal Vulnerability

A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.

LiveBOS path-traversal web-application cve-2026-7519
2r 1t 1c
critical advisory

Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials

Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.

pytorch-lightning supply-chain pypi credential-theft malware
2r 2t
critical threat

UTT HiPER 1200GW Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in UTT HiPER 1200GW devices up to version 2.5.3-170306, stemming from manipulation of the `strcpy` function in the `/goform/formRemoteControl` file, which allows remote attackers to execute arbitrary code.

HiPER 1200GW buffer-overflow iot router cve
2r 1t 1c