March 2026 (30)
Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability
2 rules 2 TTPsA remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.
Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)
2 rules 2 TTPsCVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.
Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)
2 rules 1 TTPConnect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.
Critical RCE Vulnerability in Langflow AI Pipelines (CVE-2026-33017)
2 rules 2 TTPsA critical remote code execution vulnerability, CVE-2026-33017, exists in Langflow AI pipelines prior to version 1.9.0 that allows an unauthenticated remote attacker to execute code with full server process privileges, impacting availability, integrity, and confidentiality.
CrowdStrike Falcon Flex for Services Expansion
2 rules 2 TTPsCrowdStrike is expanding the Falcon Flex model to its services offering to provide organizations with more flexible access to incident response and proactive security services.
Crunchyroll Data Breach via Telus Supply Chain Compromise
2 rules 3 TTPs 1 IOCCrunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.
DNS Queries to RMM Domains from Non-Browser Processes
2 rules 74 IOCsDetection of DNS queries to known remote monitoring and management (RMM) domains originating from non-browser processes on Windows systems indicates potential abuse of legitimate software for command and control.
Easy Chat Server 3.1 Denial of Service Vulnerability (CVE-2019-25613)
2 rules 1 TTPEasy Chat Server 3.1 is vulnerable to a denial-of-service attack where a remote attacker can crash the application by sending oversized data in the message parameter via a POST request to the body2.ghp endpoint after establishing a session, leading to service unavailability.
JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow
2 rules 2 TTPs 1 IOCJetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.
Lucky Pasta Shellcode Loader for Windows
2 rules 3 TTPs 2 IOCsA shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.
MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)
2 rules 1 TTPA missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.
OpenClaw Improper Header Validation Leads to Credential Leakage
2 rules 1 TTPOpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.
Oracle Fusion Middleware RCE Vulnerability (CVE-2026-21992)
2 rules 2 TTPsCVE-2026-21992 allows an unauthenticated attacker to gain network access via HTTP and execute code remotely on Oracle Identity Manager and Oracle Web Services Manager.
OwnTone Server DAAP Request NULL Pointer Dereference Denial-of-Service (CVE-2026-26828)
2 rules 2 TTPsA NULL pointer dereference vulnerability in the daap_reply_playlists function of owntone-server allows attackers to cause a Denial of Service (DoS) by sending a crafted DAAP request.
ReviewX WordPress Plugin Arbitrary Method Call Vulnerability
2 rules 1 TTPThe ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.
SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.
VMware Tanzu Spring Framework and Spring Security Vulnerabilities Allow Security Bypass
2 rules 1 TTPAn anonymous, remote attacker can exploit multiple vulnerabilities in VMware Tanzu Spring Security and VMware Tanzu Spring Framework to bypass security measures.
Znuny Cross-Site Scripting Vulnerability
2 rules 1 TTPAn anonymous remote attacker can exploit a vulnerability in Znuny to perform a cross-site scripting attack, potentially leading to information disclosure or session hijacking.
OpenSSH Vulnerabilities Allow Local Code Execution
2 rules 1 TTPA local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.
cURL Vulnerability Allows File Manipulation
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in cURL to manipulate files on a vulnerable system.
PostgreSQL JDBC Driver SQL Injection Vulnerability
2 rules 1 TTPAn anonymous, remote attacker can exploit a vulnerability in the PostgreSQL JDBC Driver to perform SQL injection attacks.
Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service
2 rules 2 TTPsMultiple vulnerabilities in libpng allow a remote, anonymous attacker to perform denial of service attacks and execute arbitrary code.
Apache CXF Multiple Vulnerabilities Allow Information Disclosure and SSRF
2 rules 1 TTPA remote attacker can exploit multiple vulnerabilities in Apache CXF to disclose information and perform Server-Side Request Forgery (SSRF) attacks.
GIMP Vulnerability Allows Remote Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in GIMP to execute arbitrary code on a targeted system.
Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.
Apache Commons FileUpload Denial of Service Vulnerability
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in Apache Commons FileUpload to perform a denial of service attack.
Apache Commons BeanUtils Security Bypass Vulnerability
1 rule 1 TTPAn authenticated remote attacker can exploit a vulnerability in Apache Commons BeanUtils to bypass security measures, potentially leading to unauthorized access or privilege escalation.
MIT Kerberos Security Bypass Vulnerability
2 rules 1 TTPAn anonymous, remote attacker can exploit a vulnerability in MIT Kerberos to bypass security measures.
Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation
2 rules 3 TTPsA local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.
Android-ImageMagick7 Memory Leak Vulnerability (CVE-2026-33852)
2 rules 1 TTPA missing release of memory vulnerability (CVE-2026-33852) in MolotovCherry Android-ImageMagick7 before version 7.1.2-11 can lead to a denial-of-service condition due to memory exhaustion.