March 2026 (30)
Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338
2 rules 3 TTPsCVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.
Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)
2 rules 1 TTPOry Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.
OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability
2 rulesThe openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.
Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
2 rules 1 TTP 2 IOCsNetty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.
Netty HTTP/2 CONTINUATION Frame Flood Denial of Service
1 ruleA denial of service vulnerability exists in Netty's HTTP/2 server implementation where an unauthenticated user can exhaust server CPU resources by sending a flood of CONTINUATION frames with zero-byte payloads, bypassing size-based mitigations and leading to service unavailability with minimal bandwidth usage; affected versions include netty-codec-http2 < 4.1.132.Final and netty-codec-http2 versions >= 4.2.0.Alpha1 and < 4.2.10.Final.
OpenBao OIDC Direct Callback Authentication Bypass Vulnerability
2 rules 1 TTPOpenBao versions before 2.5.2 lack user confirmation for OIDC direct callback mode, allowing attackers to perform remote phishing and bypass authentication.
Ory Kratos SQL Injection Vulnerability in ListCourierMessages API
2 rules 1 TTPA SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.
Kysely SQL Injection Vulnerability (CVE-2026-33468)
2 rules 1 TTPA SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.
Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)
2 rules 1 TTPMattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.
SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)
2 rules 1 TTPKysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.
EVerest EV Charging Stack Data Race Vulnerability (CVE-2026-26074)
2 rulesEVerest versions prior to 2026.02.0 exhibit a data race vulnerability (CVE-2026-26074) where concurrent network requests and physical events can corrupt the event queue, leading to potential denial of service or other undefined behavior.
n8n Prototype Pollution Vulnerability Leads to Remote Code Execution
2 rules 1 TTPA prototype pollution vulnerability in the n8n GSuiteAdmin node allows authenticated users with workflow creation/modification permissions to achieve remote code execution (RCE) by injecting attacker-controlled values into `Object.prototype`.
CPCI85 and SICORE Base System XML Out-of-Bounds Write Vulnerability
2 rules 1 TTPAn unauthenticated attacker can exploit an out-of-bounds write vulnerability in CPCI85 Central Processing/Communication and SICORE Base System by sending a malicious XML request, potentially causing a service crash leading to a denial-of-service condition.
EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)
2 rules 1 TTPEVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.
EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.
Fluent Booking WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.
HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)
2 rules 1 TTPA missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.
HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)
2 rules 1 TTPCVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.
Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)
2 rules 1 TTPA command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.
ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability
2 rules 1 TTPASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.
KomSeo Cart 1.3 SQL Injection Vulnerability
2 rules 1 TTPKomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.
Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)
2 rules 1 TTPOnline Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.
School Management System CMS 1.0 SQL Injection Vulnerability
2 rules 1 TTPSchool Management System CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing attackers to bypass authentication by injecting SQL code through the username parameter.
Wecodex Hotel CMS 1.0 SQL Injection Vulnerability
2 rules 1 TTPWecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.
NATS Server WebSocket Frame Length Overflow Denial of Service
2 rules 1 TTPA vulnerability in NATS server allows a remote, unauthenticated attacker to cause a denial of service by sending a crafted WebSocket frame, leading to a server crash due to missing validation on WebSocket frame length.
node-tesseract-ocr OS Command Injection Vulnerability
2 rules 1 TTP 4 IOCsThe node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.
OpenEMR Missing Authorization Allows Unauthorized Data Deletion
2 rules 1 TTPOpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.
OpenEMR XXE Vulnerability (CVE-2026-33913)
2 rulesOpenEMR before version 8.0.0.3 is vulnerable to XML External Entity (XXE) injection, allowing an authenticated user with access to the Carecoordination module to upload a crafted CCDA document and read arbitrary files from the server.
SiYuan Note Taking Application Directory Traversal Vulnerability
2 rules 1 TTPSiYuan note taking application is vulnerable to a directory traversal via the /api/file/readDir endpoint, which does not require authentication, allowing an attacker to enumerate the directory structure and retrieve file names, potentially leading to arbitrary document reading.
TeamPCP Supply Chain Attack via CI/CD Compromise
2 rules 1 TTPTeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.