Severity
Pillow Out-of-Bounds Write Vulnerability in PSD Processing (CVE-2026-42311)
2 rules 1 TTP 1 CVEPillow versions 10.3.0 through 12.1.1 are vulnerable to an out-of-bounds write in PSD image decoding/encoding due to an integer overflow when computing tile extent sums, potentially leading to arbitrary code execution.
Argo Workflows Credentials Exposed in Pod Logs
2 rules 1 TTP 1 CVEArgo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.
Argo Workflows Template Referencing Restriction Bypass
3 rules 2 TTPs 1 CVEArgo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.
WordPress Easy PayPal Events & Tickets Plugin Information Disclosure Vulnerability
2 rules 1 TTP 1 CVEAn information disclosure vulnerability in the Easy PayPal Events & Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.
WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAn unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.
Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters
2 rules 2 TTPsQuarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.
Qualcomm Driver IOCTL Memory Corruption Vulnerability
2 rules 1 TTP 1 CVEA memory corruption vulnerability, CVE-2025-47408, exists in Qualcomm drivers when another driver calls an IOCTL with an invalid input/output buffer, potentially leading to code execution or denial of service.
Memory Corruption Vulnerability in Digital Signal Processor (CVE-2025-47407)
2 rules 1 TTP 1 CVECVE-2025-47407 describes a memory corruption vulnerability affecting the digital signal processor due to allocation failure at the kernel level, potentially leading to arbitrary code execution with elevated privileges on affected systems.
Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise
2 rules 2 TTPs 2 IOCsA widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.
AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)
2 rules 1 TTP 1 CVECVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.
Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)
2 rules 1 TTP 1 CVEA privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.
Multiple Vulnerabilities in Progress Software MOVEit Automation
2 rules 2 TTPsMultiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.
Totolink N300RH Buffer Overflow Vulnerability in setWanConfig
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.
MariaDB Vulnerability Allows Denial of Service and Potential Code Execution
2 rules 2 TTPsA remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.
GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability
2 rules 1 CVEA remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.
Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)
2 rules 1 TTP 1 CVEFunadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.
Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEShandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.
YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)
2 rules 1 TTP 1 CVEYunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.
AV Stumpfl Pixera Two Media Server Code Injection Vulnerability
2 rules 1 TTP 1 CVEA remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.
Acrel ECEMS SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.
Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)
2 rules 1 TTP 1 CVEJinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.
InnoShop Improper Authentication Vulnerability (CVE-2026-7630)
2 rules 1 TTP 1 CVEInnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.
code-projects Online Hospital Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.
WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion
2 rules 1 TTP 1 CVEThe WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.
Potential Chroot Container Escape via Mount
2 rulesThe rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.
Chroot Execution in Container Context on Linux
2 rules 1 TTPDetects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.
Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability
2 rules 1 TTP 1 CVEThe Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.
Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification
2 rules 3 TTPs 1 CVEThe Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)
2 rules 1 TTP 1 CVEThe Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)
2 rules 1 TTP 1 CVEA time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (<= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.
Zyosoft School App Insecure Direct Object Reference Vulnerability
2 rules 3 TTPs 1 CVEZyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.
Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)
2 rules 3 TTPs 1 CVEA privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.
Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)
2 rules 1 TTP 1 CVESunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.
PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)
2 rules 1 TTP 1 CVEThe PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.
WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation
2 rules 1 TTP 1 CVEThe WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.
WordPress Import and Export Users Plugin Privilege Escalation Vulnerability
2 rules 1 TTP 1 CVEA privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.
Increased npm Supply Chain Attacks Targeting SAP Developers
2 rules 5 TTPs 3 IOCsThreat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.
Expanding Detection Beyond Endpoints to Counter Evolving Threats
3 rules 6 TTPsThreat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.
GenAI Tools Accessing Sensitive Files for Credential Access and Persistence
2 rules 4 TTPsThis threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.
Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.
Flux159 mcp-game-asset-gen Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.
AWS IAM Privilege Operations via Lambda Execution Role
2 rules 3 TTPsDetection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.
SQL Injection Vulnerability in itsourcecode Courier Management System
2 rules 1 TTP 1 CVEitsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.
Potential Kerberos SPN Spoofing via Suspicious DNS Query
2 rules 1 TTPDetects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.
WP Editor Plugin CSRF Vulnerability
2 rules 1 TTP 1 CVEThe WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.
Potential Root Effective Shell from Non-Standard Path via Auditd
2 rules 1 TTPThis rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.
Malware Distribution via Hugging Face and ClawHub
2 rules 1 TTPThreat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVESourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.
Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)
2 rules 1 CVEA use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.
Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)
2 rules 1 TTP 1 CVECVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.
Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)
2 rules 1 TTP 1 CVECVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.
SourceCodester Advanced School Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.
Fujian Apex LiveBOS Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.
nextlevelbuilder GoClaw and GoClaw Lite Improper Authorization Vulnerability
2 rules 1 TTP 1 CVEnextlevelbuilder GoClaw and GoClaw Lite versions up to 3.8.5 are vulnerable to improper authorization in the RPC Handler component, potentially allowing remote attackers to bypass security controls.
Kirby CMS Missing Authorization Vulnerability
2 rules 2 TTPsA missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.
Contrast CLI CopyFile Policy Subversion via Symlinks Allows Guest Root Filesystem Writes
2 rules 2 TTPsA vulnerability in the CopyFile verification of Kata agent policies generated by the Contrast CLI allows arbitrary writes to the guest root filesystem, potentially leading to a full guest takeover.
Clerk Authorization Bypass Vulnerability
2 rules 1 TTPClerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.
GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)
2 rules 3 TTPs 1 CVEA flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.
n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass
2 rules 1 TTPThe n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.
Jupyter Notebook Authentication Token Theft via CommandLinker XSS
2 rulesA stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.
Gotenberg Unauthenticated SSRF Vulnerability
3 rules 1 TTPGotenberg version 8.29.1 is vulnerable to Server-Side Request Forgery (SSRF) due to an unfiltered webhook URL, allowing unauthenticated attackers to force outbound HTTP POST requests to arbitrary destinations, enabling internal network probing and interaction with internal services.
Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket
2 rules 2 TTPs 1 CVEThis rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.
Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption
2 rules 1 TTPIn Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.
ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer
2 rules 3 TTPs 1 IOCThe 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.
ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure
3 rules 1 TTP 3 CVEsMultiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).
ABB Ability OPTIMAX Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVECVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.
Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation
2 rules 1 TTPA local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.
Multiple Vulnerabilities in Absolute Secure Access
2 rules 3 TTPs 1 CVEMultiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.
Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.
Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS
2 rules 3 TTPs 3 CVEsMultiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.
Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath
2 rules 4 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.
CUPS Vulnerability Allows Local Privilege Escalation
2 rules 1 TTPA local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.
Sudo Privilege Escalation Vulnerabilities
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.
Multiple Vulnerabilities in Google Chrome
2 rules 5 TTPs 5 CVEsMultiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.
PackageKit Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.
Multiple Vulnerabilities in Xen and Citrix Systems XenServer
3 rules 7 TTPsMultiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.
OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)
2 rules 2 TTPs 1 CVECVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.
CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access
2 rules 1 CVECVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.
VetCoders mcp-server-semgrep OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEVetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.
Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service
2 rulesMultiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.
Multiple Vulnerabilities in MISP Threat Intelligence Platform
2 rules 1 TTPMultiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.
Multiple Vulnerabilities in Exim Mail Transfer Agent
3 rules 3 TTPsMultiple vulnerabilities in Exim versions prior to 4.99.2 allow an attacker to cause a remote denial of service, a breach of data confidentiality, and an unspecified security problem.
Komari Agent Abused as SYSTEM-Level Backdoor
2 rules 4 TTPs 2 IOCsThreat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.
n8n MCP OAuth Client XSS Vulnerability
2 rules 1 TTPn8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.
n8n Python Task Runner Sandbox Escape Vulnerability
2 rules 2 TTPsA sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.
Relative Path Traversal Vulnerability in mcpo-simple-server
2 rules 1 TTP 1 CVEA relative path traversal vulnerability exists in getsimpletool mcpo-simple-server <= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.
Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)
2 rules 1 TTP 1 CVEAlloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.
Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)
2 rules 1 TTP 1 CVEAllok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.
SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)
2 rules 2 TTPs 1 CVESysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.
BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion
2 rules 1 TTP 1 CVECVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.
XATABoost CMS 1.0.0 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEXATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.
Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)
2 rules 1 TTP 1 CVEPrime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.
Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow
2 rules 1 TTP 1 CVEEasy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.
Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)
2 rules 1 TTP 1 CVEAllok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.
Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability
1 rule 1 TTP 1 CVEAllok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.
Path Traversal Vulnerability in mail-mcp-bridge
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.
EyouCMS SQL Injection Vulnerability (CVE-2026-7389)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.
OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.
OpenClaw Security Bypass Vulnerability Allows Persistent Browser Profile Mutation
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows attackers to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.
OpenClaw Role Bypass Vulnerability in device.token.rotate Function
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function, allowing attackers to mint tokens for unapproved roles and bypass intended approval processes.
OpenClaw QQ Bot Media Download SSRF Vulnerability
2 rules 2 TTPs 1 CVEOpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.
OpenClaw Privilege Escalation via Trusted Proxy Authentication (CVE-2026-41404)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation by declaring operator scopes on non-Control-UI clients.
OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)
2 rules 1 TTP 1 CVEOpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.
OpenClaw Incomplete Host Environment Variable Sanitization Vulnerability (CVE-2026-41387)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.22 is vulnerable to incomplete host environment variable sanitization, allowing attackers to redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content.
OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)
2 rules 3 TTPs 1 CVEOpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.
OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.
OpenClaw Arbitrary Directory Deletion Vulnerability
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.
Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.
eiceblue spire-doc-mcp-server Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.
Multiple Vulnerabilities in cURL
2 rules 3 TTPs 4 CVEsMultiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.
Elinsky execution-system-mcp Path Traversal Vulnerability
2 rules 1 TTP 1 CVEElinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.
Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS
2 rules 2 TTPsMultiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
ProFTPD SQL Injection Vulnerability
2 rules 1 TTPAn anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.
OpenClaw Privilege Escalation Vulnerability (CVE-2026-42432)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains a privilege escalation vulnerability that allows previously paired nodes to reconnect and execute privileged commands without proper authorization, potentially leading to complete system compromise.
OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.
OpenClaw Exec Allowlist Bypass Vulnerability (CVE-2026-41390)
2 rules 2 TTPs 1 CVEOpenClaw before version 2026.3.28 contains an exec allowlist bypass vulnerability (CVE-2026-41390) that allows attackers to persist trust for wrapper binaries like /usr/bin/script to execute different underlying programs, potentially leading to privilege escalation.
UNC6692 Combines Social Engineering, Malware, and Cloud Abuse
2 rules 12 TTPsUNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.
mkdocs-mcp-plugin Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.
AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)
2 rules 1 TTP 1 CVEA DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.
AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.
BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.
Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.
Path Traversal Vulnerability in engineer-your-data
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.
edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.
Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.
dvladimirov MCP Git Search API Command Injection Vulnerability
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.
dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)
2 rules 1 CVEA SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.
OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.
Online Lot Reservation System SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.
BlueNoroff Targeting Web3 Sector via Spear Phishing
2 rules 1 TTPBlueNoroff, a subgroup of the Lazarus Group, is targeting North American Web3 companies through spear-phishing campaigns, impersonating Fintech legal professionals.
tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVESourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.
itsourcecode Construction Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.
CodePanda Source canteen_management_system SQL Injection Vulnerability
1 rule 1 TTP 1 CVEA SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.
SQL Injection Vulnerability in code-projects Inventory Management System 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.
D-Link DIR-822 A_101 Command Injection via DHCP Hostname
2 rules 1 TTP 1 CVEA command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.
code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)
2 rules 1 TTP 1 CVECVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.
Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEToowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.
KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)
2 rules 1 TTP 1 CVEKLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.
Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)
2 rules 1 TTP 1 CVECVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.
Cilium `cilium-bugtool` WireGuard Private Key Exposure
2 rules 1 TTP 1 IOCThe `cilium-bugtool` debugging tool in Cilium exposes WireGuard private keys, potentially allowing unauthorized access to encrypted node-to-node communication in affected versions.
SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)
2 rules 1 TTP 1 CVEA remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.
PicoClaw Web Launcher Management Plane Command Injection Vulnerability
2 rules 1 TTP 1 CVEPicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.
Claude Code Trust Dialog Bypass via Git Worktree Spoofing
2 rules 1 TTPA vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.
Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026
2 rules 1 TTPIn early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.
k8sGPT Operator Vulnerable to Prompt Injection
2 rules 2 TTPsk8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.
OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.
OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)
2 rules 2 TTPs 1 CVEOpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.
OpenClaw Arbitrary Code Execution via Environment Variable Override (CVE-2026-41336)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 allows attackers to execute arbitrary code by overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable using a workspace .env file, enabling the loading of attacker-controlled hook code.
Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution
3 rules 3 TTPs 5 CVEsMultiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.
D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability
2 rules 1 CVED-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.
Kirby CMS Server-Side Template Injection via Double Template Resolution
2 rules 1 TTPA server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.
Radare2 Path Traversal Vulnerability in Project Deletion
2 rules 1 TTP 1 CVERadare2 versions prior to 6.1.4 are vulnerable to a path traversal in project deletion, allowing local attackers to recursively delete arbitrary directories by escaping the 'dir.projects' root, leading to integrity and availability loss.
Trigona Ransomware Employing Custom Data Exfiltration Tool
2 rules 4 TTPs 1 IOCTrigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.
CanisterSprawl: Self-Propagating npm Malware Campaign
2 rules 6 TTPsThe CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.
rust-openssl Unchecked Callback Length Memory Leak
2 rulesThe rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.
Daptin SQL Injection Vulnerability in Aggregate API
2 rules 1 TTPA SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.
China-Nexus Cyber Actors Using Covert Networks of Compromised Devices
2 rules 4 TTPsChina-nexus cyber actors are increasingly using large-scale networks of compromised devices, including SOHO routers and IoT devices, to obscure the origin of their attacks and conduct various malicious activities, from reconnaissance to data exfiltration.
WeKan Missing Authorization Vulnerability in Integration REST API
2 rules 1 TTP 1 CVE 4 IOCsWeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.
CVE-2026-31478 Vulnerability in Microsoft ksmbd
2 rules 3 TTPs 1 CVECVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.
CVE-2026-31507 Double-Free Vulnerability in net/smc
2 rules 2 TTPs 1 CVECVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.
SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint
2 rules 1 TTP 1 CVE 1 IOCSiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.
Entra ID Excessive Account Lockouts Detected
2 rules 3 TTPsA high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.
AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure
2 rules 2 TTPsAttackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.
GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence
2 rules 4 TTPsThis brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.
LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability
1 rule 1 TTP 1 CVELanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.
InstructLab Path Traversal Vulnerability (CVE-2026-6855)
2 rules 1 TTP 1 CVEA local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.
WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)
2 rules 3 TTPs 1 CVEWWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.
WWBN AVideo SSRF Vulnerability (CVE-2026-41055)
2 rules 1 TTP 1 CVE 1 IOCWWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.
Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL
2 rules 1 TTP 1 CVEThe Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.
Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)
2 rules 1 TTP 1 CVE 4 IOCsTekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.
Oracle Java SE, GraalVM Networking Component Denial-of-Service Vulnerability (CVE-2026-34282)
2 rules 1 TTP 1 CVECVE-2026-34282 is a remotely exploitable vulnerability in the Networking component of Oracle Java SE and GraalVM that allows an unauthenticated attacker to cause a complete denial of service.
NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)
2 rules 1 TTP 1 CVEA heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.
NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)
2 rules 1 TTP 1 CVENestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.
HKUDS OpenHarness Insecure Default Configuration Vulnerability
2 rules 1 TTP 1 CVEHKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.
Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)
2 rules 1 TTP 1 CVEHermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.
goshs GitHub Token Leakage via ArtiPACKED Vulnerability (CVE-2026-40903)
2 rules 1 TTP 1 CVEThe goshs SimpleHTTPServer prior to version 2.0.0-beta.6 is vulnerable to ArtiPACKED, potentially leading to leakage of the GITHUB_TOKEN through workflow artifacts.
FreeScout Mass Assignment Vulnerability (CVE-2026-40569)
2 rules 2 TTPs 1 CVEFreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.
Fortra GoAnywhere MFT SSH Key Brute-Force Vulnerability (CVE-2025-14362)
2 rules 1 TTP 1 CVEFortra's GoAnywhere MFT prior to 7.10.0 is vulnerable to brute-force attacks on SSH keys because the login limit is not enforced on the SFTP service when Web Users are configured to log in with an SSH Key.
Binutils XCOFF Heap-Based Buffer Overflow Vulnerability (CVE-2026-6846)
2 rules 4 TTPs 1 CVE 1 IOCA heap-buffer-overflow vulnerability exists in binutils when processing a specially crafted XCOFF object file, potentially leading to arbitrary code execution or denial of service.
Telerik UI for AJAX RadAsyncUpload Uncontrolled Resource Consumption (CVE-2026-6022)
2 rules 1 TTP 1 CVEA vulnerability exists in Progress Telerik UI for AJAX prior to 2026.1.421, RadAsyncUpload, due to missing cumulative size enforcement during chunk reassembly, which allows file uploads to exceed the configured maximum size, leading to disk space exhaustion.
Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection
3 rules 3 TTPsMultiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.
pyLoad Privilege Escalation Vulnerability (CVE-2026-41133)
2 rules 1 TTP 1 CVEpyLoad versions up to 0.5.0b3.dev97 cache user roles and permissions in the session, leading to privilege escalation even after an admin revokes privileges.
Oracle VM VirtualBox CVE-2026-35246 Vulnerability
2 rules 1 CVECVE-2026-35246 is a vulnerability in Oracle VM VirtualBox version 7.2.6, where a high-privileged attacker with local access can exploit it to compromise the application potentially leading to a complete takeover.
NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)
2 rules 2 TTPs 1 IOCNVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.
OpenMage LTS Phar Deserialization RCE
2 rules 2 TTPsA remote code execution vulnerability exists in OpenMage LTS versions prior to 20.16.1 due to Phar deserialization, where an attacker can upload a malicious phar file disguised as an image and trigger deserialization via functions like `getimagesize()`, `file_exists()`, or `is_readable()` when processing `phar://` stream wrapper paths, leading to arbitrary code execution.
CVE-2026-32223 Windows USB Printing Stack Elevation of Privilege Vulnerability
2 rules 1 TTP 1 CVECVE-2026-32223 is an elevation of privilege vulnerability affecting the Windows USB Printing Stack (usbprint.sys), potentially allowing a local attacker to gain elevated privileges on a vulnerable system.
FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)
2 rules 1 TTP 1 CVEFreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.
Notepad++ Updater (gup.exe) Creates Uncommon Files
2 rules 3 TTPsThe Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.
MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)
2 rules 1 TTP 1 CVEA deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.
Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution
2 rules 2 TTPsAdversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.
Multiple Vulnerabilities in Fortinet FortiSandbox
3 rules 3 TTPsMultiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.
Multiple Vulnerabilities in Roundcube
2 rules 3 TTPsMultiple vulnerabilities in Roundcube allow an attacker to manipulate files, bypass security measures, perform cross-site scripting attacks, and disclose information.
Multiple Vulnerabilities in Microsoft Developer Tools
2 rules 4 TTPsMultiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.
Multiple Vulnerabilities in FreeRDP Allow Remote Code Execution and DoS
2 rules 5 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in FreeRDP to potentially execute arbitrary code, cause a denial-of-service condition, manipulate data, disclose confidential information, or perform other unspecified attacks.
Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities
2 rules 2 TTPsA local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.
AiAssistant Type Privilege Bypass Vulnerability (CVE-2026-31368)
2 rules 2 TTPs 1 CVECVE-2026-31368 is a type privilege bypass vulnerability in AiAssistant, potentially leading to service availability issues and complete compromise of the system.
FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)
2 rules 2 TTPs 1 CVEFreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.
OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.
Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)
2 rules 1 TTP 1 CVEAn improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.
Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)
2 rules 1 TTPA SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.
ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability
2 rules 2 TTPs 1 CVETeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.
Modelscope Agentscope Code Injection Vulnerability (CVE-2026-6603)
2 rules 1 TTPA code injection vulnerability exists in modelscope agentscope up to version 1.0.18, specifically affecting the execute_python_code/execute_shell_command functions, allowing for remote code execution.
Silex Technology SD-330AC and AMC Manager Insecure Default Password Vulnerability (CVE-2026-32965)
2 rules 1 CVESilex Technology's SD-330AC and AMC Manager are vulnerable to insecure default initialization, allowing a null string password to be set upon initial network connection (CVE-2026-32965).
Langflow Unrestricted File Upload Vulnerability (CVE-2026-6596)
2 rules 2 TTPsAn unrestricted file upload vulnerability in langflow-ai langflow versions up to 1.1.0 allows remote attackers to execute arbitrary code via the create_upload_file function in the API Endpoint.
brikcss merge Prototype Pollution Vulnerability (CVE-2026-6594)
2 rules 2 TTPs 1 CVEA prototype pollution vulnerability (CVE-2026-6594) in brikcss merge up to version 1.3.0 allows remote attackers to modify object prototype attributes by manipulating the __proto__/constructor.prototype/prototype argument.
liangliangyy DjangoBlog Hardcoded Cryptographic Key Vulnerability (CVE-2026-6580)
2 rules 1 CVECVE-2026-6580 describes a vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 where manipulation of the 'key' argument in the Amap API Call Handler leads to the use of a hard-coded cryptographic key, enabling remote exploitation.
Apple Account Notification Phishing Campaign
2 rules 1 TTP 5 IOCsA phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.
osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)
2 rules 1 TTP 1 CVECVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture <= 1.2.2, leading to hardcoded credentials exposure.
KodExplorer Path Traversal Vulnerability (CVE-2026-6568)
2 rules 1 TTP 1 CVE 5 IOCsKodExplorer up to version 4.52 is vulnerable to a path traversal attack via manipulation of the path argument in the share.class.php::initShareOld function, potentially allowing remote attackers to access sensitive files.
WeGIA SQL Injection Vulnerability (CVE-2026-40285)
2 rules 1 TTP 1 CVEWeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.
PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix
2 rules 1 TTP 1 CVEPraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.
DNN (DotNetNuke) SVG Upload Vulnerability (CVE-2026-40321)
2 rules 3 TTPs 1 CVEDNN (formerly DotNetNuke) before 10.2.2 is vulnerable to stored cross-site scripting (XSS) via malicious SVG file uploads, potentially leading to account takeover and arbitrary code execution.
Anviz CrossChex Standard TDS7 PreLogin Encryption Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAnviz CrossChex Standard is vulnerable to unauthorized database access due to the manipulation of TDS7 PreLogin, which disables encryption, leading to plaintext transmission of database credentials.
Firebird Server Denial-of-Service Vulnerability (CVE-2026-28224)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can trigger a denial-of-service condition on vulnerable Firebird servers by sending a specially crafted op_crypt_key_callback packet, leading to a null pointer dereference and server crash.
SecureDrop Client Code Execution via Gzip Extraction Vulnerability
2 rules 1 TTP 2 CVEsA compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.
Dagster SQL Injection Vulnerability in Dynamic Partition Keys
2 rules 6 TTPsA SQL injection vulnerability exists in Dagster's DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers, where a user with 'Add Dynamic Partitions' permission can inject arbitrary SQL due to improper escaping of dynamic partition key values, leading to unauthorized data access or modification.
YesWiki Authenticated SQL Injection Vulnerability
2 rules 1 TTP 2 IOCsYesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.
Movary Privilege Escalation Vulnerability (CVE-2026-40349)
2 rules 1 TTP 1 CVE 1 IOCMovary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.
FastGPT NoSQL Injection Vulnerability in Password Change Endpoint
2 rules 2 TTPs 1 CVEFastGPT versions prior to 4.14.9.5 are vulnerable to NoSQL injection in the password change endpoint, allowing authenticated attackers to bypass password verification and perform account takeover.
OpenClaw Environment Variable Injection Vulnerability
2 rules 1 TTPThe openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.
Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification
2 rules 1 TTP 1 CVEAnviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.
Anviz CrossChex Standard TCP Packet Injection Vulnerability
2 rules 2 TTPs 1 CVE 4 IOCsAnviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.
xrdp Privilege Escalation Vulnerability (CVE-2026-32107)
2 rules 2 TTPs 1 CVE 1 IOCxrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.
ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability
2 rules 1 TTP 1 CVEByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.
Dnsmasq Out-of-Bounds Write Vulnerability (CVE-2026-6507)
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-6507) in dnsmasq by sending a specially crafted BOOTREPLY packet to a server configured with the `--dhcp-split-relay` option, leading to a denial of service.
zrok Unauthenticated Denial-of-Service Vulnerability
2 rules 1 TTPAn unauthenticated attacker can cause a denial-of-service (DoS) in zrok by sending a crafted HTTP request with a large cookie chunk count to an OAuth-protected proxy share, triggering unbounded memory allocation and leading to process termination.
Paperclip Unauthenticated API Access Vulnerability
2 rules 3 TTPsPaperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.
OCaml opam Path Traversal Vulnerability (CVE-2026-41082)
2 rules 1 TTP 1 CVEOCaml opam before 2.5.1 is vulnerable to path traversal via a crafted .install file, potentially allowing attackers to overwrite arbitrary files.
Meridian Library Multiple Defense-in-Depth Gaps
3 rules 5 TTPsMultiple defense-in-depth gaps exist in Meridian versions prior to 2.1.1, including high severity issues related to bypassing safety caps on collection mapping that can lead to resource exhaustion, along with medium and low severity issues affecting constructor selection, telemetry, retry mechanisms, and exception handling.
ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)
2 rules 4 TTPs 1 CVEAn authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.
Kyverno ConfigMap Cross-Namespace Read RBAC Bypass (CVE-2026-22039 Incomplete Fix)
2 rules 1 TTP 1 CVECVE-2026-22039 incompletely fixed a cross-namespace privilege escalation vulnerability in Kyverno's apiCall context, as the ConfigMap context loader still lacks namespace validation, allowing a namespace admin to read ConfigMaps from any namespace using Kyverno's privileged service account, leading to a complete RBAC bypass in multi-tenant Kubernetes clusters.
Better Auth OAuth Provider Authorization Bypass Vulnerability
2 rules 2 TTPsAn authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.
Wavlink WL-WN530H4 OS Command Injection Vulnerability
2 rules 2 TTPs 1 CVEA remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.
Dell PowerProtect Data Domain Improper Certificate Validation Vulnerability
2 rules 1 TTP 1 CVEDell PowerProtect Data Domain versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.60, contain an improper certificate validation vulnerability in certificate-based login, potentially leading to privilege escalation.
Dell Storage Manager Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in Dell Storage Manager to escalate their privileges on the system.
Dell PowerProtect Data Domain BoostFS Credential Exposure Vulnerability (CVE-2025-36568)
2 rules 1 TTP 1 CVEDell PowerProtect Data Domain BoostFS versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50 are vulnerable to an insufficiently protected credentials vulnerability, allowing a low-privileged attacker with local access to expose credentials and potentially gain elevated privileges.
Dell PowerProtect Data Domain Weak Credentials Vulnerability (CVE-2026-23853)
3 rules 2 TTPs 1 CVE 2 IOCsDell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability (CVE-2026-23853) that can lead to unauthorized access by a local attacker.
Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)
2 rules 1 TTP 1 CVEThe Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.
Vault Token Leak via Authorization Header Forwarding
2 rules 1 TTP 1 CVE 1 IOCVault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
Paperclip codex_local Unauthorized Gmail Access
2 rules 5 TTPsA Paperclip-managed `codex_local` runtime can access and utilize Gmail connectors connected in the ChatGPT/OpenAI apps UI without explicit Paperclip configuration, allowing unauthorized mailbox access and email sending capabilities due to a trust-boundary failure and dangerous default runtime settings.
Flowise SSRF Protection Bypass via Unprotected Built-in HTTP Modules
2 rules 1 TTPFlowise is vulnerable to SSRF protection bypass via unprotected built-in HTTP modules in the custom function sandbox, allowing authenticated users to access internal network resources by exploiting the lack of SSRF protection on Node.js `http`, `https`, and `net` modules.
@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)
2 rules 1 TTP 1 CVEA middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.
Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)
2 rules 2 TTPs 1 CVEWeblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.
Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)
2 rules 1 TTP 1 CVE 1 IOCA missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.
Mirax RAT Targeting Android Users in Europe
2 rules 4 TTPsMirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.
Malicious Chrome Extensions Stealing Data and Opening Backdoors
2 rules 6 TTPsA coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.
Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)
2 rules 1 TTP 1 CVEA type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.
Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)
2 rules 1 TTP 1 CVE 1 IOCA remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.
Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)
2 rules 1 TTP 1 CVEGoogle Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome Dawn Use-After-Free Vulnerability (CVE-2026-6310)
2 rules 2 TTPs 1 CVE 1 IOCA use-after-free vulnerability (CVE-2026-6310) in Google Chrome's Dawn component allows a remote attacker, having compromised the renderer process, to potentially execute a sandbox escape via a specially crafted HTML page.
Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)
1 rule 1 TTP 1 CVEA use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.
Dragon Boss Solutions Adware Disabling Antivirus Protections
2 rules 2 TTPs 2 IOCsDigitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.
Multiple Vulnerabilities in Cisco Unity Connection
2 rules 1 TTPMultiple vulnerabilities in Cisco Unity Connection can be exploited by an attacker to conduct cross-site scripting attacks, redirect users to malicious websites, manipulate data, and disclose confidential information.
Multiple Vulnerabilities in libssh Allow File Manipulation and DoS
2 rules 1 TTPMultiple vulnerabilities in libssh allow an attacker to manipulate files or cause a denial-of-service condition, potentially leading to data corruption or service disruption.
Grafana Vulnerability Allows File Manipulation and Information Disclosure
2 rules 4 TTPsA remote, authenticated attacker can exploit a vulnerability in Grafana to manipulate files and disclose sensitive information, potentially leading to persistence, unauthorized access, and significant impact.
rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)
2 rules 1 TTP 1 CVErsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.
Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.
Openfind MailGates/MailAudit CRLF Injection Vulnerability
2 rules 1 TTP 1 CVEOpenfind MailGates/MailAudit is vulnerable to CRLF injection (CVE-2026-6351), enabling unauthenticated remote attackers to read system files by injecting malicious CRLF sequences.
Radare2 Command Injection Vulnerability (CVE-2026-41015)
2 rules 1 TTP 1 CVERadare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.
wger Broken Access Control in Global Gym Configuration Update Endpoint
2 rules 1 TTPThe wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.
Luanti 5 Improper Access Control Vulnerability (CVE-2026-40960)
2 rules 1 TTP 1 CVE 1 IOCLuanti 5 before 5.15.2 allows unintended access to an insecure environment if a crafted mod intercepts requests when secure mods are enabled, potentially leading to unauthorized access and control.
GIMP GIF Image Buffer Overflow Vulnerability
2 rules 3 TTPs 1 CVEA buffer overflow vulnerability in the GIF image loading component of GIMP allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file, potentially leading to denial of service or arbitrary code execution.
Fastify Body Schema Validation Bypass via Leading Space in Content-Type Header
2 rules 1 TTP 2 CVEsFastify v5.x is vulnerable to a body schema validation bypass, allowing attackers to circumvent request body validation by prepending a single space to the Content-Type header, potentially compromising data integrity and security constraints.
Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)
2 rules 3 TTPs 1 CVEWeblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.
Velociraptor Authentication Bypass via query() Plugin
2 rules 2 TTPs 1 CVEVelociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.
WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)
2 rules 1 TTP 1 CVE 1 IOCAn SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.
Splunk MCP Server App Cleartext Credential Exposure (CVE-2026-20205)
2 rules 1 TTP 1 CVEA user with access to the `_internal` index or the `mcp_tool_admin` capability in Splunk MCP Server app versions below 1.0.3 can view user session and authorization tokens in clear text, leading to potential credential compromise.
Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name
3 rules 1 TTPZarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.
Windows WinSock Use-After-Free Privilege Escalation (CVE-2026-26177)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26177 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a local attacker to elevate privileges.
Windows WinSock Race Condition Privilege Escalation (CVE-2026-26173)
2 rules 1 TTP 1 CVECVE-2026-26173 is a race condition vulnerability in the Windows Ancillary Function Driver for WinSock that allows a local attacker to elevate privileges.
Windows Win32K GRFX Privilege Escalation via Race Condition (CVE-2026-33104)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-33104 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.
Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.
Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.
Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)
2 rules 2 TTPs 1 CVECVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.
Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)
2 rules 1 TTP 1 CVECVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.
Windows SSDP Service Race Condition Privilege Escalation (CVE-2026-32068)
2 rules 1 TTP 1 CVECVE-2026-32068 is a race condition vulnerability in the Windows SSDP Service that allows an authorized attacker to elevate privileges locally.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)
2 rules 1 TTP 1 CVECVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.
Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)
2 rules 1 TTP 1 CVECVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.
Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.
Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.
Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.
Windows BitLocker Security Feature Bypass Vulnerability (CVE-2026-27913)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27913 describes an improper input validation vulnerability in Windows BitLocker that allows a local attacker to bypass security features.
Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)
2 rules 1 TTP 1 CVEA Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.
Microsoft Word Use-After-Free Vulnerability CVE-2026-23657
2 rules 1 TTP 1 CVECVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.
Microsoft PowerShell Improper Input Validation Vulnerability (CVE-2026-26143)
2 rules 1 TTP 1 CVE 2 IOCsAn improper input validation vulnerability (CVE-2026-26143) in Microsoft PowerShell allows an unauthorized local attacker to bypass security features.
Microsoft Office Word Use-After-Free Vulnerability (CVE-2026-33095)
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability in Microsoft Office Word (CVE-2026-33095) could allow a local attacker to execute arbitrary code by opening a specially crafted document.
Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)
3 rules 1 TTP 1 CVECVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.
Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.
Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.
Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.
Libsixel Use-After-Free Vulnerability (CVE-2026-33018)
2 rules 1 TTP 1 CVEA use-after-free vulnerability exists in libsixel versions 1.8.7 and prior when processing animated GIFs due to improper frame buffer management, potentially leading to code execution.
Krayin CRM v2.2.x SQL Injection Vulnerability
2 rules 1 TTP 1 CVEKrayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.
Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
2 rules 1 TTP 1 CVE 2 IOCsJetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.
Go Markdown Library Out-of-Bounds Read Vulnerability
2 rules 1 TTPA vulnerability in the go-markdown library exists where processing a malformed input containing a '<' character that is not followed by a '>' character with a SmartypantsRenderer can lead to an out-of-bounds read or a panic, causing a denial of service.
Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)
2 rules 3 TTPs 1 CVEAn SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.
CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAn improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.
CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.
CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVEA use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.
CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver
2 rules 1 TTP 1 CVECVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.
CVE-2026-33096 HTTP.sys Out-of-Bounds Read Denial-of-Service
2 rules 2 TTPs 1 CVEAn unauthenticated, remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-33096) in Windows HTTP.sys to cause a denial-of-service condition.
CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.
CVE-2026-32164 Windows User Interface Core Race Condition Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32164 is a race condition vulnerability in Windows User Interface Core that allows a locally authorized attacker to elevate privileges.
CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.
CVE-2026-32153 Windows Speech Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32153 is a use-after-free vulnerability in Microsoft Windows Speech that allows a locally authorized attacker to elevate privileges.
CVE-2026-32152 Use-After-Free in Desktop Window Manager
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32152 is a use-after-free vulnerability in the Desktop Window Manager (dwm.exe) that allows an authorized local attacker to elevate privileges.
CVE-2026-32078: Windows Projected File System Use-After-Free Elevation of Privilege
2 rules 1 TTP 1 CVEA use-after-free vulnerability, CVE-2026-32078, exists in the Windows Projected File System, allowing a locally authenticated attacker to escalate privileges.
CVE-2026-32071: Windows LSASS Null Pointer Dereference DoS
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32071 is a null pointer dereference vulnerability in the Windows Local Security Authority Subsystem Service (LSASS), allowing an unauthorized network attacker to cause a denial-of-service condition.
CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation
3 rules 1 TTP 1 CVECVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.
CVE-2026-27917: Windows WFP NDIS Lightweight Filter Driver Use-After-Free Vulnerability
2 rules 1 TTP 1 CVECVE-2026-27917 is a use-after-free vulnerability in the Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) that allows a locally authorized attacker to elevate privileges.
CVE-2026-27916 Use-After-Free in Windows UPnP Device Host
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.
CVE-2026-27910: Windows Installer Local Privilege Escalation
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.
CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.
CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.
CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.
CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.
CVE-2026-26179 Windows Kernel Double Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.
CVE-2026-26163: Windows Kernel Double Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26163 is a double free vulnerability in the Windows Kernel, allowing an authorized attacker to elevate privileges locally with a CVSS v3.1 score of 7.8.
CVE-2026-26153: Windows EFS Out-of-Bounds Read Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26153 is an out-of-bounds read vulnerability in the Windows Encrypting File System (EFS) that allows an authorized local attacker to elevate privileges.
CVE-2026-26152: Windows Cryptographic Services Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26152 is an insecure storage of sensitive information vulnerability in Windows Cryptographic Services that allows a local, authorized attacker to elevate privileges.
Composer Command Injection via Malicious Perforce Repository
2 rules 1 TTPComposer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.
Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.
Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.
Autodesk Fusion Stored XSS Vulnerability (CVE-2026-4344)
2 rules 3 TTPs 1 CVE 3 IOCsCVE-2026-4344 is a stored cross-site scripting (XSS) vulnerability in the Autodesk Fusion desktop application where a malicious HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can lead to arbitrary code execution.
Adobe Photoshop Out-of-Bounds Read Vulnerability (CVE-2026-27289)
2 rules 3 TTPs 1 CVE 2 IOCsAn out-of-bounds read vulnerability (CVE-2026-27289) in Adobe Photoshop Desktop versions 27.4 and earlier allows for potential code execution via a crafted file, requiring user interaction to trigger the exploit.
Adobe InDesign Heap-Based Buffer Overflow Vulnerability (CVE-2026-34629)
2 rules 2 TTPs 1 CVEAdobe InDesign versions 20.5.2, 21.2 and earlier are vulnerable to a heap-based buffer overflow (CVE-2026-34629) that could lead to arbitrary code execution if a user opens a malicious file.
Adobe ColdFusion Path Traversal Vulnerability (CVE-2026-34619)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-34619) in Adobe ColdFusion versions 2023.18, 2025.6, and earlier allows an attacker to bypass security features and access unauthorized files or directories without user interaction.
Adobe Bridge Heap-based Buffer Overflow Vulnerability (CVE-2026-27312)
2 rules 2 TTPs 1 CVEA heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4 and earlier can lead to arbitrary code execution if a user opens a malicious file.
Adobe Bridge Heap-Based Buffer Overflow Vulnerability (CVE-2026-27311)
2 rules 1 TTP 1 CVEA heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4, and earlier (CVE-2026-27311) allows for arbitrary code execution when a user opens a specially crafted file.
Adobe Acrobat Reader Prototype Pollution Vulnerability (CVE-2026-34622)
2 rules 1 TTP 1 CVEA prototype pollution vulnerability in Adobe Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier (CVE-2026-34622) allows for arbitrary code execution when a user opens a specially crafted malicious file.
.NET Uncontrolled Resource Consumption Vulnerability (CVE-2026-26171)
1 rule 1 CVECVE-2026-26171 is a vulnerability in .NET that allows an unauthorized attacker to perform a denial-of-service attack over a network due to uncontrolled resource consumption.
n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting
2 rules 6 TTPs 2 IOCsThreat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.
Kyverno SSRF Vulnerability in CEL HTTP Library
2 rules 3 TTPs 1 CVE 4 IOCsA Server-Side Request Forgery (SSRF) vulnerability in Kyverno's CEL HTTP library allows users with namespace-scoped policy creation permissions to make arbitrary HTTP requests, enabling unauthorized access to internal services, cloud metadata endpoints, and data exfiltration.
Kyverno Service Account Token Leak via API Call
2 rules 1 TTP 5 IOCsKyverno's apiCall serviceCall helper implicitly injects the Kyverno controller service account token into requests when policies lack an explicit Authorization header, allowing exfiltration to attacker-controlled endpoints and unauthorized actions.
free5gc UDR Improper Path Validation Allows Unauthenticated Access to Traffic Influence Subscriptions
2 rules 2 TTPs 1 IOCAn improper path validation vulnerability exists in the free5gc UDR service, allowing unauthenticated attackers with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions.
CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.
Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.
CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.
CVE-2026-26183 Windows RPC API Local Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.
Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.
Adobe Connect XSS Vulnerability Leading to Privilege Escalation
2 rules 1 TTP 1 CVEAdobe Connect versions 2025.3, 12.10, and earlier are susceptible to a Cross-Site Scripting (XSS) vulnerability (CVE-2026-34617) that can lead to privilege escalation if a user interacts with a malicious URL or compromised web page.
CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.
Microsoft Graphics Component Heap-based Buffer Overflow Vulnerability (CVE-2026-32221)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32221 is a heap-based buffer overflow vulnerability in the Microsoft Graphics Component, allowing a local attacker to execute arbitrary code.
CVE-2026-32224 Use-After-Free in Windows Server Update Service
2 rules 1 TTP 1 CVECVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.
Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)
2 rules 1 TTP 1 CVECVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.
Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.
CVE-2026-32165 Use-After-Free in Windows User Interface Core
2 rules 1 TTP 1 CVECVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.
Windows COM Privilege Escalation via CVE-2026-32162
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.
Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)
2 rules 1 TTP 1 CVECVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.
CVE-2026-32087 Function Discovery Service Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.
CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.
Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.
Windows Shell Race Condition Vulnerability (CVE-2026-27918)
2 rules 1 TTP 1 CVECVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.
Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.
Adobe Connect Reflected XSS Vulnerability (CVE-2026-27245)
2 rules 1 TTP 1 CVE 3 IOCsAdobe Connect versions 2025.3, 12.10, and earlier are vulnerable to a reflected Cross-Site Scripting (XSS) attack, enabling attackers to execute malicious JavaScript in a victim's browser by enticing them to visit a crafted URL.
CVE-2026-26176 Windows CSC Driver Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.
Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).
Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)
2 rules 2 TTPs 1 CVECVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.
State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)
2 rules 6 TTPsIn 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.
Eclipse Jetty HTTP/1.1 Request Smuggling via Chunk Extensions (CVE-2026-2332)
2 rules 3 TTPs 1 CVE 2 IOCsEclipse Jetty's HTTP/1.1 parser is vulnerable to request smuggling due to improper handling of chunk extensions, allowing attackers to inject malicious requests.
PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.
libTIFF Vulnerability Allows Code Execution and DoS
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in libTIFF to potentially execute arbitrary code or cause a denial-of-service condition.
RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability (CVE-2026-27668)
2 rules 1 TTP 1 CVECVE-2026-27668 allows authenticated User Administrators in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to escalate their privileges and access any device group, due to an incorrect privilege assignment in versions prior to V5.8.
Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)
2 rules 1 TTP 1 CVECVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.
SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)
2 rules 1 TTP 1 CVE 1 IOCAn authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.
Smart Post Show WordPress Plugin PHP Object Injection Vulnerability
2 rules 1 TTP 1 CVEThe Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.
NestJS Microservices Denial-of-Service via Recursive handleData
2 rules 1 TTPA denial-of-service vulnerability exists in NestJS's @nestjs/microservices package, affecting versions 11.1.18 and earlier, where an attacker can send multiple small, valid JSON messages within a single TCP frame, causing a stack overflow.
MinIO Unauthenticated Object Write Vulnerability
2 rules 3 TTPsTwo authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.
ImageMagick Heap Buffer Overflow Vulnerability (CVE-2026-33901)
2 rules 1 TTP 1 CVEImageMagick versions before 7.1.2-19 and 6.9.13-44 are vulnerable to a heap buffer overflow in the MVG decoder, potentially leading to an out-of-bounds write when processing a crafted image, which can result in denial of service or arbitrary code execution.
SQL Injection Vulnerability in Simple Content Management System 1.0
2 rules 1 TTP 1 CVE 5 IOCsA remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.
VMware Tanzu Spring Cloud Gateway Security Bypass Vulnerability
1 rule 1 TTPAn anonymous, remote attacker can exploit a vulnerability in VMware Tanzu Spring Cloud Gateway to bypass security measures, potentially gaining unauthorized access or control.
SQL Injection Vulnerability in Faculty Management System
2 rules 1 TTP 1 CVEA remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.
ZTE ZXEDM iEMS Password Reset Vulnerability (CVE-2026-40436)
2 rules 2 TTPs 1 CVECVE-2026-40436 is a vulnerability in the ZTE ZXEDM iEMS product that allows attackers to reset user passwords due to improper access control on the user list acquisition function within the cloud EMS portal, potentially leading to unauthorized operations and system compromise.
SQL Injection Vulnerability in Vehicle Showroom Management System 1.0
2 rules 1 TTP 1 CVEA remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.
SQL Injection Vulnerability in Lost and Found Thing Management 1.0
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.
Samsung Escargot Out-of-Bounds Write Vulnerability (CVE-2026-25207)
2 rules 2 TTPs 1 CVECVE-2026-25207 is an out-of-bounds write vulnerability in Samsung Open Source Escargot that allows for buffer overflows, potentially leading to arbitrary code execution.
Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)
2 rules 1 TTP 1 CVECVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (<= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.
Samsung Escargot Heap-Based Buffer Overflow Vulnerability (CVE-2026-25205)
2 rules 1 TTP 1 CVEA heap-based buffer overflow vulnerability in Samsung Open Source Escargot (CVE-2026-25205) allows for out-of-bounds write operations, potentially leading to arbitrary code execution.
Mesa WebGPU Out-of-Bounds Write Vulnerability (CVE-2026-40393)
2 rules 1 CVEAn out-of-bounds write vulnerability exists in Mesa versions before 25.3.6 and 26 before 26.0.1 due to an untrusted allocation size in WebGPU, potentially leading to code execution.
MyT-PM 1.5.1 SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 4 IOCsMyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.
Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEDolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.
ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 5 IOCsImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.
eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)
2 rules 1 TTP 1 CVE 5 IOCseBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.
Easy Video to iPod Converter 1.6.20 Local Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEEasy Video to iPod Converter 1.6.20 is vulnerable to a local buffer overflow in the user registration field, allowing a local attacker to overwrite the structured exception handler (SEH) by providing a crafted payload exceeding 996 bytes in the username field, potentially leading to arbitrary code execution with user privileges.
CMSsite 1.0 SQL Injection Vulnerability (CVE-2019-25697)
2 rules 2 TTPs 1 CVECMSsite 1.0 is vulnerable to unauthenticated SQL injection (CVE-2019-25697) via the cat_id parameter in category.php, allowing attackers to extract sensitive database information.
HTML5 Video Player 1.2.5 Local Buffer Overflow Vulnerability
2 rules 4 TTPs 1 CVEHTML5 Video Player version 1.2.5 is vulnerable to a local buffer overflow, allowing attackers to execute arbitrary code by providing an oversized key code string through the Help Register dialog.
zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)
2 rules 1 TTP 1 CVECVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.
SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams
2 rules 3 TTPs 1 CVESiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.
Red Hat OpenShift AI odh-dashboard Kubernetes Token Disclosure (CVE-2026-5483)
2 rules 1 TTP 1 CVECVE-2026-5483 is a high-severity vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) that allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint, potentially leading to unauthorized access to Kubernetes resources.
Postiz SSRF Vulnerability (CVE-2026-40168)
2 rules 1 CVEPostiz, an AI social media scheduling tool, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 2.21.5, allowing attackers to access internal resources.
Math.js Improperly Controlled Modification of Object Attributes Leads to RCE
2 rules 1 TTPA vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.
Helm Plugin Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.
DotNetNuke.Core Stored XSS via SVG Upload
2 rules 2 TTPsDotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.
CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)
2 rules 1 TTP 1 CVECouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.
Chamilo LMS SSRF Vulnerability in Social Wall Feature
2 rules 1 TTP 1 CVEA Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.
Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.
Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)
2 rules 1 TTP 1 CVEChamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.
Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)
2 rules 1 TTP 1 CVE 1 IOCA path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.
Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.
CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)
2 rules 1 TTP 1 CVECVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.
BugSink Authenticated File Write Vulnerability (CVE-2026-40162)
2 rules 1 TTP 1 CVE 1 IOCBugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.
@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability
2 rules 1 TTP 1 CVEA vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.
Chartbrew Cross-Tenant Authorization Bypass Vulnerability
2 rules 1 TTP 1 CVEChartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.
Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)
2 rules 2 TTPs 1 CVEAn Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.
OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)
2 rules 1 TTP 1 CVE 5 IOCsOpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.
OpenClaw Path Traversal Vulnerability (CVE-2026-35668)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.
OpenClaw Arbitrary Code Execution via Malicious .npmrc File
2 rules 1 TTP 1 CVE 1 IOCOpenClaw before 2026.3.24 is vulnerable to arbitrary code execution via local plugin and hook installation, where an attacker can craft a .npmrc file with a git executable override to execute malicious code during npm install.
Multiple External EDR Alerts by Host
3 rules 3 TTPsThis rule detects multiple external EDR alerts on the same host, indicating a potential compromise, by analyzing alert data from various EDR solutions like CrowdStrike, SentinelOne, and M365 Defender to identify hosts triggering multiple alerts, enabling prioritization of investigation and response.
Multiple Cloud Secrets Accessed by Single Source IP
2 rules 1 TTPA single source IP accessing secret-management APIs across multiple cloud providers (AWS, GCP, Azure) and Kubernetes clusters within a short timeframe indicates potential credential theft, session hijacking, or token replay.
AWS IAM Login Profile Added for Root
2 rules 2 TTPsAn adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.
Synology SSL VPN Client Plaintext Password Storage Vulnerability (CVE-2021-47961)
2 rules 1 TTP 1 CVESynology SSL VPN Client before 1.4.5-0684 stores passwords in plaintext, allowing remote attackers to potentially access or manipulate user PIN codes, leading to unauthorized VPN configuration and traffic interception.
Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)
2 rules 3 TTPs 1 CVEA remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.
SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)
2 rules 2 TTPs 1 CVEA remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.
Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)
2 rules 2 TTPs 1 CVEThe Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.
Samsung MagicINFO 9 Server Local Privilege Escalation via Incorrect Default Permissions (CVE-2026-25203)
2 rules 1 TTP 1 CVE 1 IOCSamsung MagicINFO 9 Server versions prior to 21.1091.1 are susceptible to a local privilege escalation vulnerability due to incorrect default permissions, potentially allowing a low-privilege user to gain elevated privileges on the system.
PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion
2 rules 1 TTP 1 CVEPraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.
PraisonAI SSRF Vulnerability via Unvalidated Webhook URL
2 rules 3 TTPs 1 CVEPraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.
OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.
Nimiq Blockchain Timestamp Manipulation Vulnerability
2 rules 4 TTPs 1 CVEA vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.
WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)
2 rules 1 TTP 1 CVE 2 IOCsThe WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.
bsv-sdk and bsv-wallet Credential Forgery Vulnerability
2 rules 1 TTPThe bsv-sdk and bsv-wallet packages are vulnerable to credential forgery because the `acquire_certificate` function persists certificate records to storage without verifying the certifier's signature, allowing attackers to forge identity certificates.
MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.
CVE-2026-4436: Modbus Odorant Injection Manipulation
2 rules 2 TTPs 1 CVEA low-privileged remote attacker can exploit CVE-2026-4436 by sending Modbus packets to manipulate register values controlling odorant injection in gas lines, potentially leading to hazardous conditions.
HDF5 Heap Use-After-Free Vulnerability in h5dump (CVE-2026-34734)
2 rules 1 TTP 1 CVEA heap-use-after-free vulnerability (CVE-2026-34734) in HDF5 version 1.14.1-2 and earlier within the h5dump helper utility can be triggered by a malicious h5 file, leading to arbitrary code execution.
MetaGPT Code Injection Vulnerability (CVE-2026-5970)
2 rules 1 TTP 1 CVEA code injection vulnerability, CVE-2026-5970, exists in FoundationAgents MetaGPT up to version 0.8.1, allowing remote attackers to execute arbitrary code via manipulation of the `check_solution` function in the HumanEvalBenchmark/MBPPBenchmark component.
FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)
2 rules 1 TTP 1 CVEA code injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.
BSV Ruby SDK Improper ARC Response Handling
2 rules 1 TTP 1 CVEBSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.
GNUTLS Denial of Service via Malformed ClientHello (CVE-2026-1584)
2 rules 2 TTPs 1 CVEA remote, unauthenticated attacker can exploit CVE-2026-1584 in gnutls by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake, leading to a NULL pointer dereference and a denial-of-service condition.
SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation
1 rule 1 TTP 1 CVE 2 IOCsThreat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.
MinIO S3 Select CSV Parsing Denial of Service
2 rules 1 TTPMinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.
Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)
2 rules 1 TTP 1 CVELaravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.
Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion
2 rules 1 TTP 1 CVETmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.
Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)
2 rules 1 TTP 1 CVEPlane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.
osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)
2 rules 1 TTP 1 CVEA stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.
OPNsense LDAP Injection Vulnerability (CVE-2026-34578)
2 rules 1 TTP 1 CVEOPNsense versions prior to 26.1.6 are vulnerable to LDAP injection, allowing unauthenticated attackers to enumerate valid LDAP usernames and bypass group membership restrictions via the WebGUI login page.
OpenClaw RCE via Build Tool Environment Variable Injection
2 rules 2 TTPsOpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.
OpenClaw Trust Model Vulnerability: System Prompt Channel Injection
2 rulesOpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.
HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)
2 rules 1 TTP 1 CVE 1 IOCHashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.
OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability
2 rules 1 TTP 1 CVE 1 IOCA heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.
WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)
2 rules 1 TTP 1 CVE 2 IOCsAn authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.
Vim Vulnerability Allows Local Code Execution
2 rules 1 TTPA local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.
Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)
2 rules 1 TTP 1 CVECVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.
PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)
2 rules 1 TTP 1 CVEPHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.
code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.
Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)
2 rules 1 TTP 1 CVECVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.
UAC (Unix-like Artifacts Collector) Command Injection Vulnerability
2 rules 1 TTP 1 CVEUAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.
parseusbs Unsanitized LNK File Command Injection Vulnerability
2 rules 1 TTP 1 CVEparseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.
parseusbs OS Command Injection Vulnerability (CVE-2026-40030)
2 rules 1 TTP 1 CVE 1 IOCparseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.
MemProcFS DLL and Shared Library Hijacking Vulnerability
2 rules 3 TTPs 1 CVEMemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.
Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)
2 rules 3 TTPs 1 CVEA path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.
PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)
2 rules 1 TTP 1 CVE 1 IOCPraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.
Kamailio Out-of-Bounds Access Denial of Service Vulnerability
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds access vulnerability (CVE-2026-39863) in Kamailio versions prior to 6.1.1, 6.0.6, and 5.8.8 by sending a specially crafted data packet over TCP, causing a denial-of-service condition.
InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)
2 rules 1 TTP 1 CVE 1 IOCA non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.
React Server Components Denial of Service Vulnerability (CVE-2026-23869)
2 rules 1 TTP 1 CVEA denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.
Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)
2 rules 2 TTPs 1 CVEA stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.
LORIS File Traversal Vulnerability (CVE-2026-34392)
2 rules 1 TTP 1 CVEA file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.
mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications
2 rules 2 IOCsThe mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.
Logstash Arbitrary File Write via Path Traversal (CVE-2026-33466)
2 rules 2 TTPs 1 CVECVE-2026-33466 describes a vulnerability in Logstash where improper validation of file paths within compressed archives allows arbitrary file writes, potentially leading to remote code execution.
Unauthenticated Access to kcp Cache Server
2 rules 2 TTPsThe kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.
XWiki Remote Code Execution via Unprotected Velocity Scripting API
2 rules 2 TTPsXWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.
CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)
2 rules 2 TTPs 1 CVEUnauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.
WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)
2 rules 1 TTP 1 CVEThe WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.
NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)
2 rules 4 TTPs 1 CVE 1 IOCA memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.
Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)
2 rules 5 TTPs 1 CVEDrizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.
ChurchCRM Stored XSS Vulnerability in Person Property Management
2 rules 1 TTP 2 CVEsA stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.
D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability
2 rules 5 TTPsThe 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.
WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps
2 rules 2 TTPs 1 CVEThe Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
ASDA-Soft Stack-based Buffer Overflow Vulnerability (CVE-2026-5726)
2 rules 6 TTPs 1 CVE 3 IOCsA stack-based buffer overflow vulnerability exists in ASDA-Soft, potentially leading to arbitrary code execution, as identified by CVE-2026-5726 and reported by Deltaww with a CVSS v3.1 score of 7.8.
Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)
3 rules 1 TTP 1 CVEThe Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.
Amazon Firecracker Virtio PCI Out-of-Bounds Write Vulnerability (CVE-2026-5747)
3 rules 2 TTPs 1 CVEAn out-of-bounds write vulnerability in Amazon Firecracker's virtio PCI transport (CVE-2026-5747) allows a local guest user with root privileges to potentially crash the VMM process or execute arbitrary code on the host.
WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix
2 rules 1 TTP 2 CVEs 1 IOCWWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.
File Browser Share Links Accessible After Permission Revocation
3 rules 1 TTP 1 CVEFile Browser share links remain accessible after Share/Download permissions are revoked, allowing continued access to shared files even after an administrator revokes the user's permissions.
LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash
2 rules 1 TTPLiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.
Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop
2 rules 4 TTPs 1 CVEPodman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.
PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)
2 rules 1 TTP 1 CVEA code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.
OpenObserve SSRF via Improper IPv6 Validation
2 rules 1 TTP 1 CVE 1 IOCOpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.
NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)
2 rules 5 TTPs 1 CVEA memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.
NI LabVIEW Memory Corruption Vulnerability (CVE-2026-32862)
2 rules 5 TTPs 1 CVEA memory corruption vulnerability (CVE-2026-32862) in NI LabVIEW versions 2026 Q1 (26.1.0) and prior, stemming from an out-of-bounds write in ResFileFactory::InitResourceMgr(), can lead to information disclosure or arbitrary code execution if a user opens a malicious VI file.
NI LabVIEW LVLIB File Parsing Memory Corruption Vulnerability (CVE-2026-32860)
2 rules 2 TTPs 1 CVE 1 IOCA memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVLIB file, potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvlib file.
NI LabVIEW LVCLASS File Parsing Out-of-Bounds Write Vulnerability (CVE-2026-32861)
2 rules 4 TTPs 1 CVEA memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVCLASS file (CVE-2026-32861), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvclass file.
Mise Trust Bypass Vulnerability via Malicious .mise.toml
2 rules 2 TTPsA vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.
PowerJob SQL Injection Vulnerability (CVE-2026-5736)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.
ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)
2 rules 1 TTP 1 CVEAn authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.
NVIDIA Triton Inference Server Denial-of-Service Vulnerability (CVE-2026-24146)
2 rules 1 TTP 1 CVENVIDIA Triton Inference Server is vulnerable to denial of service due to insufficient input validation that, when combined with a large number of outputs, can cause a server crash.
NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)
2 rules 2 TTPs 1 CVE 1 IOCNVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.
SoftEtherVPN Pre-Authentication Denial-of-Service Vulnerability (CVE-2026-39312)
2 rules 2 TTPs 1 CVESoftEtherVPN version 5.2.5188 and earlier is vulnerable to a pre-authentication denial-of-service attack where an unauthenticated remote attacker can crash the vpnserver process by sending a malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.
PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)
2 rules 1 TTP 1 CVE 1 IOCPolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.
Emissary OS Command Injection Vulnerability (CVE-2026-35581)
2 rules 1 TTP 1 CVEEmissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.
libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)
2 rules 2 TTPs 1 CVECVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.
ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)
2 rules 1 TTP 1 CVE 2 IOCsChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.
text-generation-webui SSRF Vulnerability (CVE-2026-35486)
2 rules 1 TTP 1 CVE 2 IOCsThe text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.
runZero Platform Superuser Privilege Escalation (CVE-2026-5373)
2 rules 1 TTP 1 CVE 3 IOCsCVE-2026-5373 is an improper privilege management vulnerability in the runZero platform that allows all-organization administrators to promote accounts to superuser status, which was fixed in version 4.0.260202.0.
LibRaw Heap-Based Buffer Overflow Vulnerability (CVE-2026-24660)
2 rules 1 TTP 1 CVEA heap-based buffer overflow vulnerability (CVE-2026-24660) exists in the x3f_load_huffman functionality of LibRaw commit d20315b, where a specially crafted malicious file can lead to a heap buffer overflow.
LibRaw Integer Overflow Vulnerability in deflate_dng_load_raw
2 rules 1 TTP 1 CVECVE-2026-20884 is an integer overflow vulnerability in LibRaw's deflate_dng_load_raw function that leads to a heap buffer overflow when processing crafted DNG files.
Apache Traffic Server Vulnerabilities Leading to Denial of Service
2 rules 2 TTPsA remote attacker can exploit multiple vulnerabilities in Apache Traffic Server to conduct a denial of service or request smuggling attack.
SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns
3 rules 1 TTP 5 IOCsAttackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.
Malicious NPM Packages Target Strapi Users
3 rules 6 TTPsA threat actor published 36 malicious NPM packages disguised as Strapi plugins in a supply chain attack, designed to execute code, escape containers, harvest credentials, and establish persistent implants on Linux systems targeting Strapi users, with specific focus on the Guardarian cryptocurrency payment gateway.
Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.
Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)
2 rules 1 TTP 1 CVEThe Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.
Samsung Exynos Wi-Fi Driver Use-After-Free Vulnerability (CVE-2025-54602)
2 rules 1 TTP 1 CVEA use-after-free vulnerability exists in the Wi-Fi driver of Samsung Mobile and Wearable Processors Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000 due to improper synchronization on a global variable, allowing attackers to trigger a race condition and potentially execute arbitrary code.
Samsung Exynos Processor Denial-of-Service Vulnerability (CVE-2025-57834)
2 rules 1 TTP 1 CVE 1 IOCA denial-of-service vulnerability, CVE-2025-57834, exists in Samsung Exynos processors and modems due to improper input validation, potentially leading to device malfunction or service disruption.
Totolink A8000R Authentication Bypass Vulnerability (CVE-2026-5676)
2 rules 1 TTP 1 CVEA remote, unauthenticated attacker can bypass authentication on Totolink A8000R routers running firmware version 5.9c.681_B20180413 by manipulating the `langType` argument in the `setLanguageCfg` function of the `/cgi-bin/cstecgi.cgi` file.
Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)
2 rules 1 TTP 1 CVEA remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.
Plunk Email Platform CRLF Header Injection Vulnerability
2 rules 1 TTP 1 CVEA CRLF header injection vulnerability in Plunk versions prior to 0.8.0 allows authenticated API users to inject arbitrary email headers, enabling silent email forwarding, reply redirection, or sender spoofing.
code-projects Online FIR System SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 6 IOCsA SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.
ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)
2 rules 1 TTP 1 CVECVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.
Qualcomm Memory Corruption Vulnerability CVE-2026-21382
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-21382 is a memory corruption vulnerability related to handling power management requests with improperly sized input/output buffers, potentially leading to code execution.
Qualcomm Memory Corruption Vulnerability in Auxiliary Sensor Processing (CVE-2026-21374)
2 rules 1 TTP 1 CVECVE-2026-21374 describes a memory corruption vulnerability due to insufficient buffer size validation when processing auxiliary sensor input/output control commands, potentially allowing a local attacker to execute arbitrary code with elevated privileges.
Qualcomm IOCTL Memory Corruption Vulnerability (CVE-2026-21375)
2 rules 1 TTP 1 CVECVE-2026-21375 is a memory corruption vulnerability in Qualcomm chipsets due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.
Qualcomm Camera Driver Memory Corruption Vulnerability
2 rules 1 TTP 1 CVEA memory corruption vulnerability exists in Qualcomm camera sensor drivers due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.
Memory Corruption Vulnerability in DMABUF IOCTL Calls (CVE-2026-21380)
2 rules 1 TTP 1 CVEA use-after-free vulnerability, identified as CVE-2026-21380, exists due to memory corruption when using deprecated DMABUF IOCTL calls for video memory management, potentially leading to arbitrary code execution.
CVE-2026-21378 Memory Corruption in Camera Sensor Driver
2 rules 1 TTP 1 CVEA memory corruption vulnerability (CVE-2026-21378) exists in a camera sensor driver due to improper validation of output buffer size during IOCTL processing, potentially leading to arbitrary code execution.
Qualcomm Memory Corruption Vulnerability (CVE-2026-21371)
2 rules 1 TTP 1 CVECVE-2026-21371 is a memory corruption vulnerability due to insufficient size validation when retrieving an output buffer, potentially leading to information disclosure or arbitrary code execution on affected Qualcomm devices.
Qualcomm IOCTL Memory Corruption Vulnerability
2 rules 1 TTP 1 CVE 1 IOCA memory corruption vulnerability (CVE-2026-21372) exists when processing IOCTL requests with invalid buffer sizes leading to a heap-based buffer overflow, reported by Qualcomm with a CVSS v3.1 score of 7.8.
Memory Corruption Vulnerability in Satellite Data Decoding (CVE-2025-47392)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-47392 describes a memory corruption vulnerability that occurs when decoding corrupted satellite data files with invalid signature offsets, reported by Qualcomm, Inc.
CVE-2025-47391 Qualcomm Memory Corruption Vulnerability
3 rules 3 TTPs 1 CVE 2 IOCsCVE-2025-47391 is a memory corruption vulnerability due to a stack-based buffer overflow (CWE-121) while processing a frame request, as detailed in the Qualcomm security bulletin for April 2026, potentially leading to arbitrary code execution.
CVE-2025-47390: JPEG Driver IOCTL Memory Corruption Vulnerability
2 rules 1 TTP 1 CVEA memory corruption vulnerability (CVE-2025-47390) exists while preprocessing IOCTL requests in the JPEG driver, potentially leading to local privilege escalation or denial of service.
CVE-2025-47389 Memory Corruption Vulnerability in Attestation Report Generation
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-47389 describes a memory corruption vulnerability stemming from a buffer copy operation failure due to an integer overflow during the attestation report generation process, potentially leading to arbitrary code execution.
Potential File Download via a Headless Browser
2 rules 1 TTPDetects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.
OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)
2 rules 1 TTP 1 CVEA remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.
Media Library Assistant WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.
Distribution Toolkit Authentication Redirection Vulnerability (CVE-2026-33540)
2 rules 1 TTP 1 CVEA vulnerability in the distribution toolkit prior to 3.1.0 allows a malicious upstream registry or man-in-the-middle attacker to redirect authentication requests, potentially exposing upstream credentials.
GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)
2 rules 1 TTP 1 CVEGLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.
GLPI SQL Injection Vulnerability (CVE-2026-29047)
2 rules 1 TTP 1 CVEGLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.
AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts
2 rules 2 TTPsThis rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.
Mattermost Legal Hold Plugin Authentication Bypass Vulnerability
2 rules 2 TTPs 1 CVEMattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.
SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)
2 rules 1 TTP 1 CVE 5 IOCsA remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.
SQL Injection Vulnerability in Easy Blog Site 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in code-projects Easy Blog Site 1.0 within the login.php file, exploitable remotely by manipulating the username/password parameters, potentially leading to unauthorized database access.
SQL Injection Vulnerability in projectworlds Car Rental System 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.
GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)
2 rules 1 TTP 1 CVE 6 IOCsA server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.
GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)
2 rules 1 TTP 1 CVECVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.
GPT Researcher Code Injection Vulnerability (CVE-2026-5631)
2 rules 1 TTP 1 CVEA remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.
JeecgBoot AI Chat Module Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEJeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.
Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)
2 rules 1 TTP 1 CVEKados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.
Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)
2 rules 1 TTP 1 CVEKados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.
Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)
2 rules 1 TTP 1 CVEKados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.
RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)
2 rules 1 TTP 1 CVE 1 IOCRealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.
OpenDocMan 1.3.4 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEOpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.
River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVERiver Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.
PilusCart 1.4.1 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEPilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.
News Website Script 2.0.5 SQL Injection Vulnerability
2 rules 1 TTP 1 CVENews Website Script 2.0.5 contains an SQL injection vulnerability (CVE-2019-25668) allowing unauthenticated attackers to extract sensitive information by injecting SQL code through the news ID parameter in GET requests.
SuiteCRM 7.10.7 Time-Based SQL Injection Vulnerability
2 rules 1 TTP 1 CVESuiteCRM 7.10.7 is vulnerable to time-based SQL injection in the record parameter of the Users module DetailView action, allowing authenticated attackers to manipulate database queries and potentially extract sensitive information.
ResourceSpace 8.6 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEResourceSpace 8.6 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL queries via the 'ref' parameter in GET requests to the watched_searches.php endpoint, leading to sensitive data extraction.
R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)
2 rules 2 TTPs 1 CVE 5 IOCsR i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.
SQL Injection Vulnerability in jkev Record Management System 1.0 (CVE-2026-5575)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5575) exists in the Login component of SourceCodester/jkev Record Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username parameter in index.php.
Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)
2 rules 1 TTP 1 CVE 4 IOCsCVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.
Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)
2 rules 1 TTP 1 CVECVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.
Technostrobe HI-LED-WR120-G2 Improper Access Control Vulnerability (CVE-2026-5569)
2 rules 1 TTP 1 CVECVE-2026-5569 describes a remote improper access control vulnerability in the /Technostrobe/ endpoint of Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30, potentially leading to unauthorized access and control of affected devices.
code-projects Simple Laundry System 1.0 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.
Provectus Kafka UI Code Injection Vulnerability (CVE-2026-5562)
2 rules 2 TTPs 1 CVEA code injection vulnerability exists in provectus kafka-ui up to version 0.7.2, specifically affecting the validateAccess function within the /api/smartfilters/testexecutions endpoint, allowing remote attackers to inject code.
SQL Injection Vulnerability in Concert Ticket Reservation System
2 rules 1 TTP 1 CVEA remote attacker can exploit CVE-2026-5554 in code-projects Concert Ticket Reservation System 1.0 to perform SQL injection by manipulating the searching argument in the process_search.php file.
SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)
2 rules 1 TTP 1 CVE 1 IOCA SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.
Tenda 4G03 Pro Improper Access Control Vulnerability (CVE-2026-5526)
2 rules 1 TTP 1 CVECVE-2026-5526 describes an improper access control vulnerability in the Tenda 4G03 Pro router's /bin/httpd file, allowing remote attackers to potentially gain unauthorized access.
Snes9K 0.0.9z Buffer Overflow Vulnerability (CVE-2018-25251)
2 rules 1 TTP 1 CVESnes9K 0.0.9z is vulnerable to a buffer overflow in the Netplay Socket Port Number field, enabling local attackers to execute arbitrary code via a crafted payload.
Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)
2 rules 1 TTP 1 CVE 4 IOCsSheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.
prompts.chat Path Traversal Vulnerability (CVE-2026-22661)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.
OpenEXR Heap Information Disclosure in PXR24 Decompression (CVE-2026-34543)
2 rules 2 TTPs 1 CVE 2 IOCsOpenEXR is vulnerable to a heap information disclosure in PXR24 decompression, where the undo_pxr24_impl function ignores the actual decompressed size, potentially leading to the exposure of uninitialized heap memory when processing crafted EXR files.
Mesop Framework WebSocket Denial-of-Service Vulnerability (CVE-2026-34824)
2 rules 2 TTPsAn unauthenticated attacker can exploit an uncontrolled resource consumption vulnerability in Mesop versions 1.2.3 to 1.2.4 by sending a rapid succession of WebSocket messages, leading to thread exhaustion and a denial-of-service condition.
Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification
2 rules 2 TTPs 1 CVEAn authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.
Budibase Command Injection Vulnerability in Bash Automation Step
2 rules 1 TTPA command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.
ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability
2 rules 1 TTP 1 CVEThe ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.
libp2p-rendezvous Unlimited Namespace Registration DoS
2 rules 1 TTPA vulnerable libp2p-rendezvous server can be crashed via a denial-of-service attack where an unauthenticated peer registers unlimited namespaces, leading to memory exhaustion.
Coder Code-Marketplace Zip Slip Vulnerability
2 rules 2 TTPsA Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.
Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)
2 rules 2 TTPs 1 CVEA context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.
PraisonAI OS Command Injection Vulnerability (CVE-2026-34937)
2 rules 1 TTP 1 CVEPraisonAI versions prior to 1.5.90 are vulnerable to OS Command Injection (CVE-2026-34937) due to insufficient escaping in the run_python() function, allowing arbitrary OS command execution via shell interpolation.
Piwigo SQL Injection Vulnerability (CVE-2026-27885)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27885 is a SQL Injection vulnerability in Piwigo before version 16.3.0, affecting the Activity List API endpoint, allowing an authenticated administrator to extract sensitive data.
Piwigo SQL Injection Vulnerability (CVE-2026-27834)
2 rules 1 TTP 1 CVE 1 IOCA SQL Injection vulnerability (CVE-2026-27834) exists in Piwigo versions prior to 16.3.0, allowing authenticated administrators to execute arbitrary SQL commands via the pwg.users.getList Web Service API method.
OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)
2 rules 1 TTPOAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.
fast-jwt Library Vulnerability Allows crit Header Validation Bypass
2 rules 1 TTP 1 CVEThe fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.
curl_cffi SSRF Vulnerability via Redirects
2 rules 1 TTP 1 CVE 3 IOCscurl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.
Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability
2 rules 1 TTP 1 CVEA man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.
Amazon Athena ODBC Driver Denial of Service Vulnerability (CVE-2026-35562)
2 rules 1 TTP 1 CVEA remote, unauthenticated attacker can cause a denial of service by sending crafted input to vulnerable versions of the Amazon Athena ODBC driver, triggering excessive resource consumption during parsing operations.
Amazon Athena ODBC Driver Authentication Bypass Vulnerability (CVE-2026-35561)
2 rules 2 TTPs 1 CVECVE-2026-35561 describes an insufficient authentication security control vulnerability in the browser-based authentication components of the Amazon Athena ODBC driver before version 2.1.0.0, potentially allowing a threat actor to intercept or hijack authentication sessions.
Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)
2 rules 1 TTP 1 CVECVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.
Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)
2 rules 2 TTPs 1 CVEA command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.
prompts.chat Fal.ai SSRF Vulnerability (CVE-2026-22664)
2 rules 1 TTP 1 CVE 3 IOCsprompts.chat prior to commit 30a8f04 is vulnerable to server-side request forgery (SSRF) in Fal.ai media status polling, allowing authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs, leading to potential credential theft and internal network probing.
Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)
2 rules 2 TTPs 1 CVEA denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.
Hardcoded Storage Credentials in Mobile App and Device Firmware (CVE-2025-10681)
2 rules 1 TTP 1 CVECVE-2025-10681 describes a vulnerability where hardcoded storage credentials in a mobile app and device firmware, with inadequate permission limits and lack of expiration, could lead to unauthorized access to production storage containers.
Rise in Software Supply Chain Attacks Targeting Open-Source Libraries
3 rules 1 TTPMultiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.
Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)
2 rules 1 TTP 1 CVEA stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.
AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions
2 rules 1 TTP 1 CVEAIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.
Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)
2 rules 1 TTP 1 CVEA command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.
Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)
2 rules 1 TTPAjenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.
Wisp Multipart Parsing Vulnerability Leads to Denial of Service
3 rules 1 TTP 1 CVEA vulnerability in the multipart parsing logic of gleam-wisp allows an unauthenticated attacker to bypass request size limits and cause a denial of service by exhausting server memory or disk.
Swift Crypto X-Wing HPKE Decapsulation Vulnerability
2 rules 1 TTPThe X-Wing decapsulation path in swift-crypto accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length of 1120 bytes, leading to a potential out-of-bounds read.
Ech0 Unauthenticated Server-Side Request Forgery Vulnerability
2 rules 1 TTP 2 IOCsEch0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.
Sudo Privilege Escalation Vulnerability (CVE-2026-35535)
2 rules 1 TTP 1 CVECVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.
OpenClaw Incomplete Scope Clearing Allows Privilege Escalation
2 rules 1 TTPAn incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.
Electron Use-After-Free Vulnerability in Offscreen Rendering with Child Windows
2 rules 1 IOCA use-after-free vulnerability (CVE-2026-34774) exists in Electron applications using offscreen rendering and allowing child windows, potentially leading to crashes or memory corruption if the parent WebContents is destroyed before the child window.
Electron Use-After-Free Vulnerability in PowerMonitor Module
2 rules 1 TTP 1 IOCA use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.
Azure SRE Agent Improper Authentication Vulnerability (CVE-2026-32173)
2 rules 1 TTP 1 CVEAn improper authentication vulnerability (CVE-2026-32173) in the Azure SRE Agent allows an unauthorized attacker to disclose sensitive information over the network, potentially leading to data breaches or further compromise.
Hirschmann EagleSDV Denial-of-Service Vulnerability (CVE-2022-4986)
2 rules 1 TTP 1 CVEHirschmann EagleSDV devices are vulnerable to denial-of-service (DoS) attacks where a device crash can be triggered by establishing TLS 1.0 or TLS 1.1 connections, leading to service disruption.
Hirschmann HiLCOS Web Interface Heap Overflow Vulnerability (CVE-2024-14033)
2 rules 1 TTP 1 CVEA heap overflow vulnerability in the HiLCOS web interface of Hirschmann Industrial IT products (CVE-2024-14033) allows unauthenticated remote attackers to cause a denial-of-service condition by sending specially crafted requests, leading to device crashes and service disruption, particularly when the Public Spot functionality is enabled.
OpenClaw NPM Package Vulnerable to Python Package Index Redirection
2 rulesThe openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.
Kiro IDE Code Execution Vulnerability via Crafted Color Theme (CVE-2026-5429)
2 rules 2 TTPs 1 CVECVE-2026-5429 is a code execution vulnerability in Kiro IDE before version 0.8.140 that allows a remote, unauthenticated attacker to execute arbitrary code by exploiting a crafted color theme name when a local user opens a workspace.
goshs Authentication Bypass Vulnerability (CVE-2026-34581)
1 rule 1 TTPgoshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).
CVE-2024-44250: macOS Sequoia Privilege Escalation Vulnerability
2 rules 1 TTP 1 CVECVE-2024-44250 is a permission issue in macOS Sequoia 15.1 that allows an application to execute arbitrary code outside of its sandbox or with elevated privileges, potentially leading to full system compromise.
Balena Etcher for Windows TOCTOU Vulnerability
2 rules 1 TTP 1 CVEA Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.
Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)
2 rules 1 TTP 1 CVE 1 IOCEndian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.
SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.
DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)
2 rules 2 TTPs 1 CVEDefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.
OpenSTAManager Time-Based Blind SQL Injection Vulnerability
2 rules 1 TTPOpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.
Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)
2 rules 3 TTPs 1 CVECVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.
Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.
Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.
TrueConf Zero-Day Exploitation Leading to Arbitrary Code Execution
2 rules 3 TTPs 1 CVE 4 IOCsHackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf conference servers to execute arbitrary files on connected endpoints, potentially deploying the Havoc C2 framework.
SillyTavern Path Traversal Vulnerability in Chat Endpoints
3 rules 4 TTPsA path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.
DeepLoad Malware Distributed via ClickFix
2 rules 3 TTPsThe DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.
CVE-2026-33613: Remote Code Execution in generateSrpArray Function
2 rules 1 TTP 1 CVECVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.
Cesanta Mongoose TLS 1.3 Heap-Based Buffer Overflow Vulnerability (CVE-2026-5244)
2 rules 1 TTP 1 CVEA remote heap-based buffer overflow vulnerability exists in Cesanta Mongoose versions up to 7.20 due to improper handling of the pubkey argument in the mg_tls_recv_cert function, potentially leading to code execution.
WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)
2 rules 1 TTP 1 CVEThe Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.
AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.
vanna-ai vanna Authentication Bypass Vulnerability (CVE-2026-5320)
2 rules 2 TTPs 1 CVECVE-2026-5320 describes an unauthenticated remote access vulnerability in vanna-ai vanna up to version 2.0.2 via manipulation of the /api/vanna/v2/ Chat API endpoint, potentially allowing unauthorized access and actions.
HCL BigFix Platform Insecure Permissions Vulnerability (CVE-2026-21765)
2 rules 2 TTPs 1 CVEHCL BigFix Platform is vulnerable to insecure permissions on private cryptographic keys, where keys on a Windows host may have overly permissive file system permissions, potentially leading to unauthorized access and privilege escalation.
PraisonAI SubprocessSandbox Shell Escape via sh/bash
2 rules 3 TTPsPraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '<command>'`.
PraisonAI SSRF Vulnerability via Unvalidated api_base Parameter
2 rules 1 TTP 1 IOCPraisonAI versions 4.5.89 and earlier are vulnerable to SSRF via the `api_base` parameter in the `passthrough()` function, allowing attackers to make requests to internal services or external hosts, potentially leading to IAM credential theft on cloud infrastructure or access to internal services within the VPC.
KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe
2 rules 1 TTPThe KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.
V-SFT Stack-Based Buffer Overflow Vulnerability (CVE-2026-32928)
2 rules 1 TTP 1 CVEV-SFT versions 6.2.10.0 and prior are susceptible to a stack-based buffer overflow vulnerability that could allow arbitrary code execution when a malicious V7 file is opened.
IBM Verify and Security Verify Access Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVECVE-2026-4101 describes an authentication bypass vulnerability in IBM Verify Identity Access Container and IBM Security Verify Access Container versions 11.0 through 11.0.2 and 10.0 through 10.0.9.1, respectively, that could allow unauthorized access under specific load conditions.
IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability
2 rules 1 TTP 1 CVEUnauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.
Goshs Authentication Bypass via Share Token
2 rules 3 TTPs 2 IOCsGoshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.
Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)
2 rules 1 TTP 1 CVEAuth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.
Tina CMS Path Traversal Vulnerability (CVE-2026-34603)
2 rules 1 TTPTina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.
pandas-ai SQL Injection Vulnerability (CVE-2026-30273)
2 rules 1 TTP 1 CVEpandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.
Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)
2 rules 1 TTP 1 CVELakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.
Potential JAVA/JNDI Exploitation Attempt
2 rules 5 TTPs 1 CVEThis rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.
Libinput Code Injection Vulnerability via Malicious Lua Bytecode (CVE-2026-35093)
3 rules 6 TTPs 1 CVEA local attacker can exploit CVE-2026-35093 in libinput by placing a specially crafted Lua bytecode file in configuration directories, allowing arbitrary code execution with the privileges of the application using libinput.
Dell AppSync 4.6.0 Incorrect Permission Assignment Vulnerability
2 rules 1 TTP 1 CVEDell AppSync version 4.6.0 contains an incorrect permission assignment vulnerability that allows a low-privileged attacker with local access to elevate privileges on the system.
Right-to-Left Override Character Used for Defense Evasion
2 rules 1 TTPAdversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.
BPFDoor Lock File Access
2 rules 2 TTPsBPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.
SonicWall Email Security Appliance Multiple Vulnerabilities
2 rules 2 TTPsA remote, authenticated attacker with administrator rights can exploit multiple vulnerabilities in SonicWall Email Security Appliance to perform cross-site scripting, manipulate data, or cause a denial-of-service.
gdk-pixbuf Vulnerability Allows Denial of Service and Potential Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in gdk-pixbuf to cause a denial of service and potentially execute arbitrary code.
cPanel/WHM Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in cPanel/WHM to escalate their privileges.
7-Zip Multiple Vulnerabilities Allow Remote Code Execution
2 rules 1 TTPMultiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.
Multiple Vulnerabilities in PowerDNS
1 ruleMultiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.
IBM App Connect Enterprise Multiple Vulnerabilities
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in IBM App Connect Enterprise to cause a denial-of-service condition or bypass security measures, enabling cross-site scripting attacks.
Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS
2 rules 2 TTPsA remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.
Sanster IOPaint Path Traversal Vulnerability (CVE-2026-5258)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-5258) exists in Sanster IOPaint 1.5.3, allowing remote attackers to read arbitrary files by manipulating the filename argument in the _get_file function within the File Manager component.
Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)
2 rules 1 TTP 1 CVECVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.
CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer
2 rules 1 TTP 1 CVEAn application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.
XenForo Template Code Injection Vulnerability (CVE-2025-71281)
2 rules 2 TTPs 1 CVE 1 IOCXenForo before 2.3.7 is vulnerable to code injection due to a loose prefix match for methods accessible within templates, potentially allowing unauthorized method invocations.
XenForo OAuth2 Unauthorized Scope Request Vulnerability
2 rules 1 TTP 1 CVE 2 IOCsXenForo before 2.3.5 allows OAuth2 client applications to request unauthorized scopes, potentially allowing client applications to gain access beyond their intended authorization level due to improper authorization checks.
SiYuan Note Reflected XSS Vulnerability in SVG Processing
2 rules 1 TTPSiYuan Note versions prior to the fix for commit f09953afc57a are vulnerable to reflected cross-site scripting (XSS) via a namespace prefix bypass in the SanitizeSVG function when handling dynamic icons, allowing unauthenticated attackers to execute arbitrary JavaScript in a victim's browser.
itsourcecode Payroll Management System 1.0 SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 5 IOCsitsourcecode Payroll Management System 1.0 is vulnerable to SQL injection via the ID parameter in /view_employee.php, allowing remote attackers to execute arbitrary SQL commands.
OpenClaw Gateway Unauthorized Session Reset Vulnerability
2 rules 1 TTPA vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.
File Browser Stored XSS via Crafted EPUB File
2 rules 5 TTPs 1 CVE 2 IOCsFile Browser version 2.62.1 and earlier is vulnerable to stored cross-site scripting (XSS) via crafted EPUB files, allowing attackers to execute arbitrary JavaScript in a victim's browser by exploiting the application's misconfigured iframe sandbox and stealing sensitive information like JWT tokens.
SQL Injection Vulnerability in itsourcecode Payroll Management System 1.0 (CVE-2026-5237)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5237) exists in itsourcecode Payroll Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID parameter in the /manage_user.php file.
Axios npm Package Compromised in Supply Chain Attack
2 rules 1 TTPThe widely used Axios npm package was compromised via a supply chain attack on March 31, 2026, resulting in the publication of malicious versions through a compromised maintainer account.
SourceCodester Leave Application System 1.0 File Inclusion Vulnerability (CVE-2026-5210)
2 rules 1 TTP 1 CVE 6 IOCsSourceCodester Leave Application System 1.0 is vulnerable to remote file inclusion (CVE-2026-5210) due to improper handling of the 'page' argument, potentially allowing attackers to execute arbitrary code.
AWS-C-EventStream Out-of-Bounds Write Vulnerability (CVE-2026-5190)
2 rules 3 TTPs 1 CVECVE-2026-5190 is an out-of-bounds write vulnerability in the aws-c-event-stream library before version 0.6.0 that allows a malicious third-party server to cause memory corruption and potential arbitrary code execution on client applications.
SciTokens C++ Authorization Bypass Vulnerability (CVE-2026-32725)
2 rules 1 TTP 1 CVESciTokens C++ library before 1.4.1 is vulnerable to an authorization bypass (CVE-2026-32725) due to improper path normalization, allowing attackers to escalate privileges by using parent-directory traversal in scope claims.
NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)
2 rules 1 TTP 1 CVE 1 IOCNVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.
NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)
2 rules 5 TTPs 1 CVE 1 IOCCVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.
NVIDIA Jetson JetPack Insecure Default Initialization Vulnerability (CVE-2026-24148)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-24148 is a vulnerability in NVIDIA Jetson for JetPack's system initialization logic, where an unprivileged attacker can cause the initialization of a resource with an insecure default, potentially leading to information disclosure, data tampering, and denial of service.
OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.
SQL Injection Vulnerability in Student Membership System 1.0
2 rules 1 TTP 1 CVECVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.
code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.
DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)
2 rules 1 TTP 1 CVEA stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.
ENOVIA Collaborative Industry Innovator Stored XSS Vulnerability (CVE-2025-10551)
2 rules 1 TTP 1 CVE 1 IOCA stored cross-site scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator allows an attacker to execute arbitrary script code in a user's browser session by injecting malicious code into document management functions.
DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.
SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)
2 rules 1 TTP 1 CVE 5 IOCsA SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.
SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.
vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)
2 rules 2 TTPs 1 CVEA vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.
SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)
2 rules 1 TTP 1 CVE 4 IOCsSciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.
SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.
Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)
2 rules 2 TTPs 1 CVE 2 IOCsA security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.
Botan SM2 Decryption Heap Over-read Vulnerability (CVE-2026-32877)
2 rules 1 TTP 1 CVE 2 IOCsBotan C++ cryptography library versions 2.3.0 before 3.11.0 are vulnerable to a heap over-read during SM2 decryption due to insufficient validation of the authentication code length, potentially leading to crashes or undefined behavior.
SQL Injection Vulnerability in code-projects Accounting System 1.0 (CVE-2026-5150)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-5150) exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' argument in /viewin_costumer.php, potentially allowing attackers to execute arbitrary SQL commands.
YunaiV yudao-cloud SQL Injection Vulnerability
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.
GNU C Library iconv() Function Assertion Failure (CVE-2026-4046)
2 rules 1 TTPA vulnerability in the iconv() function of the GNU C Library (versions 2.43 and earlier) can cause a crash due to an assertion failure when handling IBM1390 or IBM1399 character sets, potentially leading to remote application denial-of-service.
Parse Server LiveQuery Protected Field Leak via Shared Mutable State
3 rulesParse Server versions before 8.6.65 and between 9.0.0 and 9.7.0-alpha.9 are vulnerable to a data leak where protected fields and authentication data can be exposed to unauthorized clients due to shared mutable objects across concurrent LiveQuery subscribers.
TinaCMS GraphQL Path Traversal Vulnerability
2 rules 2 TTPsA path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root by manipulating the relativePath parameter in GraphQL mutations, leading to potential arbitrary code execution.
Glances XML-RPC Server Cross-Origin Information Disclosure
2 rules 3 TTPs 2 IOCsThe Glances XML-RPC server exposes sensitive system information due to a permissive CORS policy and missing Content-Type validation, enabling attackers to bypass CORS restrictions and steal data like hostnames, OS details, IP addresses, and process lists.
Gotenberg Chromium Deny-List Bypass via Case-Insensitive URL Scheme
2 rules 1 TTPGotenberg versions before 8.29.0 are vulnerable to unauthenticated arbitrary file read, where a case-insensitive URL scheme bypasses the Chromium deny-list, allowing attackers to read sensitive files such as /etc/passwd by using mixed-case or uppercase URL schemes like FILE:///etc/passwd, leading to the leakage of sensitive data from the Gotenberg container and bypassing the fix for CVE-2024-21527.
libp2p-gossipsub Remote Denial of Service via Integer Overflow
2 rules 1 TTPA remote, unauthenticated attacker can crash applications using libp2p-gossipsub versions prior to 0.49.4 by sending a crafted PRUNE control message with a near-maximum backoff value, causing an arithmetic overflow during heartbeat processing.
Red Hat Undertow Multiple Vulnerabilities Allow Security Bypass
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat Undertow to bypass security measures, manipulate data, and disclose sensitive information.
Langflow Vulnerability Allows File Manipulation
2 rules 1 TTPAn authenticated, remote attacker can exploit a vulnerability in Langflow to manipulate files, potentially leading to unauthorized data modification or application compromise.
OpenBao Multiple Vulnerabilities Allow Security Bypass and XSS
2 rules 4 TTPsAn anonymous, remote attacker can exploit multiple vulnerabilities in OpenBao to bypass security measures or conduct cross-site scripting attacks.
Multiple Vulnerabilities in Dovecot Mail Server
2 rules 2 TTPsMultiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.
Internet Systems Consortium BIND Vulnerabilities Leading to Denial of Service
2 rules 1 TTPMultiple vulnerabilities in Internet Systems Consortium BIND can be exploited by a remote attacker to conduct a denial of service attack or bypass security measures.
Tinyproxy HTTP Chunked Encoding Integer Overflow Denial of Service
2 rules 1 TTPAn integer overflow vulnerability in Tinyproxy's HTTP chunked transfer encoding parser (versions <= 1.11.3) allows an unauthenticated remote attacker to cause a denial of service by sending a crafted chunk size that bypasses validation, leading to resource exhaustion.
CVE-2026-2328 Unauthenticated Path Traversal Vulnerability
2 rules 1 TTP 2 IOCsCVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.
Securing AI Agents and Governing Shadow AI
2 rules 1 TTPCrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.
GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)
2 rules 2 TTPs 1 IOCGitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.
OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability
2 rules 1 TTPThe openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.
OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs
2 rules 1 TTPOpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.
Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)
2 rules 1 TTPA remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.
XPath Boolean Expression DoS Vulnerability
2 rules 1 TTPA vulnerability in the antchfx/xpath package allows for denial of service via CPU exhaustion by exploiting boolean expressions that evaluate to true, leading to an infinite loop.
OpenClaw Credential Exposure via Leaked Pairing Codes
2 rules 1 TTPOpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.
OpenClaw Code Execution via Script Modification (CVE-2026-32979)
2 rules 1 TTPOpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.
OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)
2 rules 1 TTPOpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.
OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)
2 rules 1 TTPOpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.
OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)
2 rules 2 TTPsOpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.
OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)
2 rules 1 TTP 3 IOCsOpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.
Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown
2 rules 2 TTPsThe Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.
CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization
3 rules 3 TTPsCrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for risk prioritization, application-layer visibility, and runtime analysis, addressing critical gaps in cloud security and enabling faster remediation based on threat actor behavior like LABYRINTH CHOLLIMA and SCATTERED SPIDER.
Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 5 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.
CrowdStrike CNAPP Enhancements Prioritize Risk Based on Adversary Behavior
2 rules 8 TTPsCrowdStrike's CNAPP enhancements prioritize cloud risk based on adversary behavior, correlating application insights with cloud infrastructure telemetry to identify and address critical exposures targeted by specific threat actors like LABYRINTH CHOLLIMA and SCATTERED SPIDER.
code-projects Accounting System 1.0 SQL Injection Vulnerability (CVE-2026-5034)
2 rules 1 TTPA remote SQL injection vulnerability exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' parameter in '/edit_costumer.php', potentially allowing unauthorized database access.
SQL Injection Vulnerability in Simple Food Order System 1.0
2 rules 1 TTPA SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.
code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)
2 rules 1 TTPCVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.
CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection
2 rules 2 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails, providing enterprise-grade protection for AI agents by defending against runtime attacks like prompt injection, redacting sensitive data, defanging malicious content, and moderating unwanted topics to ensure agents stay within compliance boundaries in sectors like finance, healthcare, customer service, and software development.
Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 1 TTPCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents from attacks like prompt injection, data exfiltration, and unauthorized actions, enabling organizations to deploy AI applications more securely.
SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension
2 rules 1 TTPA SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.
SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)
2 rules 1 TTPSC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.
Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)
2 rules 1 TTPFlat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.
PInfo 0.6.9-5.1 Local Buffer Overflow Vulnerability
2 rules 1 TTPPInfo version 0.6.9-5.1 is susceptible to a local buffer overflow vulnerability, enabling local attackers to execute arbitrary code by providing an overly large argument to the '-m' parameter, ultimately allowing for shellcode execution with user privileges.
yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)
2 rules 1 TTPyTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.
TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)
2 rules 1 TTPTiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.
Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)
2 rules 1 TTPMulti Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.
xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.
Undertow Request Smuggling Vulnerability (CVE-2026-28368)
2 rules 1 TTPCVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.
Silver Fox Spearphishing Campaign Targeting Japanese Firms During Tax Season
2 rules 5 TTPsThe Silver Fox threat actor is conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses, exploiting the annual tax filing and organizational change season by sending emails containing malicious attachments that deploy ValleyRAT, leading to remote access, data theft, and persistence.
LibreChat SSRF Vulnerability (CVE-2026-31943)
2 rules 2 TTPs 1 IOCLibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.
Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage
2 rules 1 TTPA server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.
LangChain Core Path Traversal Vulnerability in Legacy APIs
1 rule 1 TTPA path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.
CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI
2 rules 3 TTPsCrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.
Tycoon2FA PhaaS Platform Resurgence After Takedown
2 rules 2 TTPs 1 IOCThe Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.
CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails Secure AI Agents
2 rules 1 TTPCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0), providing enterprise-grade protection for AI agents by managing data access, controlling responses, ensuring policy compliance, and blocking prompt injection attacks.
Tycoon2FA Phishing-as-a-Service Resurgence After Takedown
2 rules 2 TTPs 1 IOCThe Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.
Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)
2 rules 1 TTPThe Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.
eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)
2 rules 2 TTPsCVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.
WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)
2 rules 1 TTPWeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.
OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope
2 rules 1 TTPThe openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.
MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability
2 rules 1 TTPA vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.
LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)
2 rules 1 TTPLinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.
UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)
2 rules 2 TTPsUniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.
AWS SDK for PHP CloudFront Policy Document Injection via Special Characters
2 rules 1 TTP 1 IOCA vulnerability exists in the AWS SDK for PHP CloudFront signing utilities where special characters in input values are not properly handled when creating policy documents, potentially leading to unintended access restrictions, affecting versions 3.11.7 through 3.371.3.
Langflow IDOR Vulnerability Allows Cross-User Flow Manipulation
2 rules 3 TTPsLangflow versions 1.5.0 and earlier contain an IDOR vulnerability (CVE-2026-34046) that allows authenticated users to read, modify, and delete flows belonging to other users due to a missing ownership check, potentially exposing sensitive information and enabling unauthorized control over AI agent logic.
@mobilenext/mobile-mcp Path Traversal Vulnerability
2 rules 2 TTPsThe @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.
Moby Authorization Plugin Bypass via Oversized Request Bodies
2 rulesA vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.
Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)
2 rules 1 TTPA remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.
Postiz App SSRF Vulnerability via Next.js
2 rules 1 TTP 1 IOCA high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.
mingSoft MCMS Server-Side Request Forgery Vulnerability (CVE-2026-4953)
2 rules 3 TTPsA server-side request forgery (SSRF) vulnerability (CVE-2026-4953) exists in mingSoft MCMS version 5.5.0, allowing remote attackers to manipulate the 'catchimage' argument in the catchImage function to potentially access or interact with internal resources.
OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update
2 rules 2 TTPsOpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.
Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)
2 rules 2 TTPsA stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.
LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)
2 rules 2 TTPsAn out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.
Kestra Orchestration Platform XSS Vulnerability (CVE-2026-33664)
2 rules 1 TTPKestra versions up to 1.3.3 are vulnerable to a cross-site scripting (XSS) vulnerability (CVE-2026-33664) allowing arbitrary JavaScript execution by viewing crafted flow metadata.
EVerest Out-of-Bounds Access Vulnerability (CVE-2026-26008)
2 rules 2 TTPs 2 IOCsEVerest, an EV charging software stack, has an out-of-bounds access vulnerability in versions prior to 2026.02.0, which can lead to remote crash or memory corruption when the CSMS sends UpdateAllowedEnergyTransferModes over the network.
EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.
CVE-2026-4926: Regular Expression Denial of Service
2 rules 2 TTPsCVE-2026-4926 describes a denial-of-service vulnerability due to an inefficient regular expression complexity issue when handling multiple sequential optional groups, leading to exponential growth and resource exhaustion.
BadAML Injection Allows Arbitrary Code Execution in Confidential VMs
2 rules 1 TTPThe BadAML injection attack allows arbitrary code execution in confidential VMs by exploiting the ACPI interface, enabling attackers with host control to execute malicious AML code within the guest.
Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)
2 rules 1 TTP 2 IOCsCVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.
Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)
2 rules 1 TTPDoveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.
Spring AI Redis Store TAG Injection Vulnerability (CVE-2026-22744)
2 rules 1 TTPCVE-2026-22744 is a code injection vulnerability in Spring AI's RedisFilterExpressionConverter which allows an attacker to inject arbitrary commands into RediSearch TAG blocks via unescaped user-controlled strings, affecting versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4.
Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)
2 rules 1 TTP 2 IOCsSpring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.
Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability
2 rules 1 TTP 5 IOCsA SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.
cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects
2 rules 1 TTPThe cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.
C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)
2 rules 1 TTPThe c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.
Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)
2 rules 1 TTPA path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.
Forge Ed25519 Signature Forgery Vulnerability
2 rules 1 TTPForge is vulnerable to signature forgery in Ed25519 due to a missing check that S < L, allowing non-canonical signatures and potentially bypassing authentication/authorization logic, affecting versions before 1.4.0.
Node-Forge Certificate Chain Verification Bypass due to basicConstraints Violation
2 rules 3 TTPs 1 IOCNode-forge's certificate chain verification fails to enforce RFC 5280 basicConstraints, allowing leaf certificates without basicConstraints and keyUsage extensions to act as Certificate Authorities, leading to potential certificate forgery and man-in-the-middle attacks.
OpenClaw ACP Chat Command Injection Vulnerability
2 rulesA vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.
Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)
2 rules 1 TTPOry Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.
OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability
2 rulesThe openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.
Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
2 rules 1 TTP 2 IOCsNetty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.
Netty HTTP/2 CONTINUATION Frame Flood Denial of Service
1 ruleA denial of service vulnerability exists in Netty's HTTP/2 server implementation where an unauthenticated user can exhaust server CPU resources by sending a flood of CONTINUATION frames with zero-byte payloads, bypassing size-based mitigations and leading to service unavailability with minimal bandwidth usage; affected versions include netty-codec-http2 < 4.1.132.Final and netty-codec-http2 versions >= 4.2.0.Alpha1 and < 4.2.10.Final.
Ory Kratos SQL Injection Vulnerability in ListCourierMessages API
2 rules 1 TTPA SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.
Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)
2 rules 1 TTPMattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.
Kysely SQL Injection Vulnerability (CVE-2026-33468)
2 rules 1 TTPA SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.
SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)
2 rules 1 TTPKysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.
CPCI85 and SICORE Base System XML Out-of-Bounds Write Vulnerability
2 rules 1 TTPAn unauthenticated attacker can exploit an out-of-bounds write vulnerability in CPCI85 Central Processing/Communication and SICORE Base System by sending a malicious XML request, potentially causing a service crash leading to a denial-of-service condition.
EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.
Fluent Booking WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.
HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)
2 rules 1 TTPCVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.
HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)
2 rules 1 TTP 1 IOCA missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.
Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)
2 rules 1 TTP 4 IOCsOnline Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.
KomSeo Cart 1.3 SQL Injection Vulnerability
2 rules 1 TTPKomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.
ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability
2 rules 1 TTPASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.
TeamPCP Supply Chain Attack via CI/CD Compromise
2 rules 1 TTPTeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.
OpenEMR XXE Vulnerability (CVE-2026-33913)
2 rules 1 IOCOpenEMR before version 8.0.0.3 is vulnerable to XML External Entity (XXE) injection, allowing an authenticated user with access to the Carecoordination module to upload a crafted CCDA document and read arbitrary files from the server.
OpenEMR Missing Authorization Allows Unauthorized Data Deletion
2 rules 1 TTPOpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.
NATS Server WebSocket Frame Length Overflow Denial of Service
2 rules 1 TTPA vulnerability in NATS server allows a remote, unauthenticated attacker to cause a denial of service by sending a crafted WebSocket frame, leading to a server crash due to missing validation on WebSocket frame length.
GitLab GraphQL CSRF Vulnerability (CVE-2026-3857)
2 rules 2 TTPs 1 IOCCVE-2026-3857 describes a vulnerability in GitLab CE/EE versions 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1, where an unauthenticated user can execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection, potentially leading to data modification or privilege escalation.
SQL Injection Vulnerability in Simple Laundry System 1.0
2 rules 1 TTP 6 IOCsA remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.
SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0
2 rules 1 TTPA remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.
code-projects Online Food Ordering System SQL Injection Vulnerability (CVE-2026-4844)
2 rules 1 TTPCVE-2026-4844 describes a SQL injection vulnerability in the Admin Login Module of code-projects Online Food Ordering System 1.0, which can be exploited remotely by manipulating the Username argument in the /admin.php file.
SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)
2 rules 1 TTP 6 IOCsA remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.
OpenEMR Blind SQL Injection Vulnerability in Patient Search (CVE-2026-29187)
2 rules 1 TTPOpenEMR versions prior to 8.0.0.3 are susceptible to a blind SQL injection vulnerability in the Patient Search functionality, allowing authenticated attackers to execute arbitrary SQL commands by manipulating HTTP parameter keys.
Picomatch ReDoS Vulnerability via Extglob Quantifiers
2 rules 1 TTPPicomatch is vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns with quantifiers, leading to excessive CPU consumption and denial of service.
Protobuf PHP Library Denial of Service Vulnerability
2 rules 1 TTPA denial-of-service vulnerability exists in the Protobuf PHP library due to maliciously crafted messages with negative varints or deep recursion, leading to application crashes and impacting service availability.
Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability
2 rules 1 TTP 5 IOCsThe code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.
OpenCart Core SQL Injection Vulnerability (CVE-2024-58341)
2 rules 1 TTPOpenCart Core 4.0.2.3 is vulnerable to SQL injection via the 'search' parameter, enabling unauthenticated attackers to manipulate database queries and extract sensitive information through boolean-based or time-based blind SQL injection.
Kiteworks Core Access Control Vulnerability (CVE-2026-23514)
2 rules 1 TTP 1 IOCKiteworks Core versions 9.2.0 and 9.2.1 contain an access control vulnerability (CVE-2026-23514) due to improper ownership management, allowing authenticated users to access unauthorized content, which can be mitigated by upgrading to version 9.2.2 or later.
SourceCodester Online Catering Reservation SQL Injection Vulnerability (CVE-2026-4615)
2 rules 1 TTP 5 IOCsA SQL injection vulnerability exists in SourceCodester Online Catering Reservation 1.0's `/search.php` file, allowing remote attackers to execute arbitrary SQL commands by manipulating the `rcode` argument.
Salvo Web Framework Denial of Service Vulnerability (CVE-2026-33241)
2 rules 1 TTPThe Salvo web framework before version 0.89.3 is vulnerable to denial of service due to unbounded memory allocation when parsing form data, enabling attackers to crash services by sending large payloads.
Palo Alto Networks Recruiting Impersonation Phishing Campaign
2 rules 2 TTPs 6 IOCsSince August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.
Langflow Path Traversal Vulnerability (CVE-2026-33497)
2 rules 1 TTPA path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.
Device Code Phishing Campaign Targeting Cloud Platforms
2 rules 2 TTPsA phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.
CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability
2 rules 2 TTPsA heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.
CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)
2 rules 1 TTPAn unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.
Blinko Pre-1.8.4 OS Command Injection Vulnerability
2 rules 1 TTP 4 IOCsBlinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.
Apache CXF Vulnerability Allows DoS and Information Disclosure
2 rules 2 TTPsAn anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.
IBM WebSphere Application Server Liberty Multiple Vulnerabilities
2 rules 3 TTPsA remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.
TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation
2 rules 2 TTPsA remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.
M-Trends 2026: Evolving Threat Landscape
3 rules 10 TTPsThe M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.
NICKEL ALLEY Targeting Developers with Fake Job Opportunities
2 rules 5 TTPs 4 IOCsNICKEL ALLEY, a North Korean threat group, is targeting technology professionals with fake job opportunities and malicious code repositories to deliver malware like PyLangGhost RAT and BeaverTail, aiming to steal cryptocurrency.
Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.
Multiple Vulnerabilities in Grub Bootloader
2 rules 2 TTPsMultiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.
RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.
Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments
2 rules 7 TTPsUncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.
Checkmk Vulnerability Allows Session Hijacking
2 rules 1 TTPAn authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.
Multiple Vulnerabilities in Vim Allow Local Code Execution and DoS
2 rules 2 TTPsMultiple vulnerabilities in vim allow a local attacker to execute arbitrary code, cause a denial-of-service condition, or manipulate data.
Froxlor Vulnerability Allows File Manipulation and Information Disclosure
2 rules 1 TTPA vulnerability in Froxlor allows an attacker to manipulate files and disclose sensitive information, potentially leading to data breaches or system compromise.
Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs
2 rules 1 TTPThe 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.
Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior
2 rules 1 TTPA remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.
Free5GC AMF Denial-of-Service Vulnerability (CVE-2026-30653)
2 rules 2 TTPsA remote attacker can exploit CVE-2026-30653 in Free5GC v4.2.0 and earlier by sending crafted requests to the AMF component's HandleAuthenticationFailure function, leading to a denial-of-service condition.
NGINX ngx_mail_auth_http_module Denial-of-Service Vulnerability (CVE-2026-27651)
2 rules 2 TTPs 1 IOCNGINX Plus and NGINX Open Source are vulnerable to a denial-of-service condition (CVE-2026-27651) when the ngx_mail_auth_http_module is enabled, CRAM-MD5 or APOP authentication is used, and the authentication server permits retry via the Auth-Wait response header, leading to worker process termination.
SQL Injection Vulnerability in Free Hotel Reservation System 1.0
2 rules 1 TTPA SQL injection vulnerability (CVE-2026-4612) exists in itsourcecode Free Hotel Reservation System 1.0 within the Parameter Handler component, allowing remote attackers to execute arbitrary SQL commands via the account_id parameter in the /hotel/admin/mod_users/index.php script.
CVE-2026-4690: Mozilla Firefox, Firefox ESR, and Thunderbird XPCOM Sandbox Escape
2 rules 1 TTP 1 IOCA sandbox escape vulnerability, identified as CVE-2026-4690, exists in the XPCOM component of Mozilla Firefox, Firefox ESR, and Thunderbird due to incorrect boundary conditions and an integer overflow, potentially allowing an attacker to execute arbitrary code outside the sandbox.
libpng Vulnerability Allows Code Execution
2 rules 4 TTPsA vulnerability in libpng allows a remote, anonymous attacker to potentially execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.
Inout Article Base CMS SQL Injection Vulnerability (CVE-2019-25640)
2 rules 1 TTP 4 IOCsInout Article Base CMS is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters via XOR-based payloads in GET requests to portalLogin.php, potentially leading to sensitive information extraction or denial-of-service.
Zeeways Jobsite CMS SQL Injection Vulnerability (CVE-2019-25636)
2 rules 1 TTP 4 IOCsZeeways Jobsite CMS is vulnerable to SQL injection, allowing unauthenticated attackers to inject SQL code through the 'id' GET parameter in crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php to extract sensitive database information.
X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability
2 rules 1 TTPX-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.
Meeplace Business Review Script SQL Injection Vulnerability (CVE-2019-25638)
2 rules 1 TTP 4 IOCsMeeplace Business Review Script is vulnerable to SQL injection via the 'id' parameter in the addclick.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries and potentially extract sensitive database information or cause a denial of service.
Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)
2 rules 2 TTPsBase64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.
AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)
2 rules 3 TTPsAIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.
FlexHEX 2.71 Local Buffer Overflow Vulnerability (CVE-2019-25627)
2 rules 2 TTPsFlexHEX 2.71 is vulnerable to a local buffer overflow in the Stream Name field, allowing local attackers to execute arbitrary code via a structured exception handler (SEH) overflow.
AIDA64 Extreme 5.99.4900 Structured Exception Handler Buffer Overflow
2 rules 1 TTP 4 IOCsAIDA64 Extreme 5.99.4900 is vulnerable to a structured exception handler buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious CSV log file path through the Hardware Monitoring logging preferences.
Compromised Litellm PyPI Package Versions
2 rules 4 TTPs 1 IOCVersions 1.82.7 and 1.82.8 of the Litellm package on PyPI were compromised in a supply chain attack, potentially impacting numerous users, with recommendations to avoid updating to these versions.
Multiple Vulnerabilities in cPanel/WHM
2 rules 2 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in cPanel/WHM to bypass security measures, perform XSS and SSRF attacks, disclose information, and potentially execute code.
WWBN AVideo Unauthenticated decryptString Vulnerability
2 rules 1 TTPWWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.
WP Job Portal Plugin SQL Injection Vulnerability
2 rules 1 TTPThe WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.
strongSwan EAP-TTLS AVP Integer Underflow Vulnerability (CVE-2026-25075)
2 rules 1 TTPAn integer underflow vulnerability in strongSwan's EAP-TTLS AVP parser allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication, leading to excessive memory allocation or a NULL pointer dereference.
SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.
OpenClaw Improper Header Validation Leads to Credential Leakage
2 rules 1 TTPOpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.
MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)
2 rules 1 TTPA missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.
Lucky Pasta Shellcode Loader for Windows
2 rules 3 TTPs 2 IOCsA shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.
JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow
2 rules 2 TTPs 5 IOCsJetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.
Crunchyroll Data Breach via Telus Supply Chain Compromise
2 rules 3 TTPs 1 IOCCrunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.
Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)
2 rules 1 TTP 1 IOCConnect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.
Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)
2 rules 2 TTPsCVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.
Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability
2 rules 2 TTPsA remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.
OpenSSH Vulnerabilities Allow Local Code Execution
2 rules 1 TTPA local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.
PostgreSQL JDBC Driver SQL Injection Vulnerability
2 rules 1 TTPAn anonymous, remote attacker can exploit a vulnerability in the PostgreSQL JDBC Driver to perform SQL injection attacks.
Apache CXF Multiple Vulnerabilities Allow Information Disclosure and SSRF
2 rules 1 TTPA remote attacker can exploit multiple vulnerabilities in Apache CXF to disclose information and perform Server-Side Request Forgery (SSRF) attacks.
Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.
Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation
2 rules 3 TTPsA local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.
Out-of-bounds Write Vulnerability in DualSenseY-v2
2 rules 3 TTPsCVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.
doslib Memory Buffer Overflow Vulnerability (CVE-2026-33851)
2 rules 3 TTPsAn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in joncampbell123's doslib before version doslib-20250729, potentially leading to arbitrary code execution.
linkingvision rapidvms Improper Memory Buffer Restriction Vulnerability (CVE-2026-33847)
2 rules 2 TTPs 1 IOCAn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms before PR#96 could lead to arbitrary code execution.
Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)
2 rules 1 TTPCVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.
Galaxy Software Services Vitals ESP Missing Authentication Vulnerability (CVE-2026-4640)
2 rules 1 TTP 3 IOCsVitals ESP developed by Galaxy Software Services suffers from a missing authentication vulnerability (CVE-2026-4640), enabling unauthenticated remote attackers to execute functions and obtain sensitive information.
SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)
2 rules 1 TTPCVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.
D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)
2 rules 2 TTPsCVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.
SourceCodester Online Admission System 1.0 SQL Injection Vulnerability
2 rules 1 TTP 6 IOCsA SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.
DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability
2 rules 10 TTPsA server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.
Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)
2 rules 1 TTPA use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.
Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)
2 rules 1 TTP 1 IOCA remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.
Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)
2 rules 1 TTPA use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)
2 rules 3 TTPsA remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.
Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)
2 rules 1 TTP 2 IOCsA remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.
Spring Cloud Config Server Path Traversal Vulnerability (CVE-2026-22739)
2 rules 1 TTP 1 IOCA path traversal vulnerability exists in Spring Cloud Config Server versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2, allowing unauthenticated remote attackers to access files outside configured search directories when using the native file system backend.
SourceCodester E-Commerce Site SQL Injection Vulnerability (CVE-2026-4613)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-4613) exists in SourceCodester E-Commerce Site 1.0 within the /products.php file due to improper input sanitization of the 'Search' argument, potentially allowing attackers to read or modify sensitive database information.
Go MCP SDK Vulnerable to Cross-Site POST Requests (CVE-2026-33252)
1 rule 1 TTPThe Go MCP SDK before v1.4.1 is vulnerable to cross-site POST requests due to insufficient origin validation and content type enforcement, potentially leading to arbitrary tool execution on local servers in stateless or sessionless deployments.
Salvo Web Framework Path Traversal Vulnerability
2 rules 1 TTPSalvo web framework versions 0.39.0 through 0.89.2 are vulnerable to Path Traversal and Access Control Bypass, allowing unauthenticated external attackers to bypass proxy routing constraints and access unintended backend paths.
Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability
2 rules 1 TTPA DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.
TeamPCP Compromise of KICS GitHub Action Supply Chain
2 rules 4 TTPsTeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.
WWBN AVideo Privilege Escalation via Moderator Account
2 rules 1 TTPWWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.
Schneider Electric Modicon PLC Denial-of-Service Vulnerability
2 rules 1 TTP 2 IOCsTeam82 disclosed vulnerabilities in Schneider Electric Modicon Controllers M241, M251, and M262 PLC lines, which can allow an attacker to cause a denial-of-service condition and affect controller availability.
Erupt Framework SQL Injection Vulnerability (CVE-2026-4594)
2 rules 1 TTPA SQL injection vulnerability (CVE-2026-4594) exists in erupts erupt up to version 1.13.3, allowing remote attackers to execute arbitrary SQL commands by manipulating the sort.field argument in the geneEruptHqlOrderBy function.
WWBN AVideo Unauthorized File Access and Deletion Vulnerability
2 rules 2 TTPsWWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.
cgltf Integer Overflow Vulnerability in Sparse Accessor Validation
2 rules 2 TTPscgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors, allowing attackers to trigger out-of-bounds reads via crafted glTF/GLB files, leading to denial of service and potential memory disclosure.
Notepad2 PROPSYS.dll Uncontrolled Search Path Vulnerability (CVE-2026-4545)
2 rules 1 TTPCVE-2026-4545 describes a vulnerability in Flos Freeware Notepad2 4.2.25, where manipulating PROPSYS.dll leads to an uncontrolled search path, potentially allowing a local attacker to execute arbitrary code with elevated privileges.
FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)
2 rules 1 TTPFTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.
EquityPandit 1.0 Insecure Logging Vulnerability (CVE-2019-25605)
2 rules 1 TTPEquityPandit 1.0 contains an insecure logging vulnerability (CVE-2019-25605) that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge, specifically exposing plaintext passwords during the forgot password function.
Admin Express 1.2.5.485 Local SEH Buffer Overflow Vulnerability
2 rules 2 TTPsAdmin Express 1.2.5.485 is susceptible to a local structured exception handling buffer overflow vulnerability, enabling local attackers to execute arbitrary code via a crafted payload in the Folder Path field of the System Compare feature.
DVDXPlayer Pro 5.5 Local Buffer Overflow Vulnerability (CVE-2019-25604)
2 rules 2 TTPsDVDXPlayer Pro 5.5 is vulnerable to a local buffer overflow, allowing local attackers to execute arbitrary code by crafting malicious playlist files.
Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking
2 rules 1 TTP 2 IOCsA supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.
Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)
2 rules 1 TTPA guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.
Jsrsasign < 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)
2 rules 1 TTPJsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.
Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)
2 rules 1 TTPJsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.
WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)
2 rules 1 TTPThe WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.
TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise
2 rules 3 TTPsTeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.
Trivy Scanner Compromised in Supply Chain Attack
2 rules 3 TTPsThe widely used Trivy scanner has been compromised in an ongoing supply chain attack, potentially impacting numerous organizations using the tool for vulnerability management.
GhostLoader Malware Targeting macOS via GitHub and AI Workflows
2 rules 1 TTPGhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.
Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft
2 rules 4 TTPsAttackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.
Claude Code Workspace Trust Dialog Bypass via Settings Loading Order (CVE-2026-33068)
2 rules 1 TTPA maliciously crafted `.claude/settings.json` file in a Claude Code repository (versions prior to 2.1.53) can bypass the workspace trust confirmation dialog by exploiting a configuration loading order defect, allowing for arbitrary code execution within a supposedly untrusted workspace.
Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration
2 rules 1 TTPThe Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.
China-Nexus Campaign Using Google Calendar as C2
2 rules 4 TTPsA China-nexus threat actor is utilizing Google Calendar as a command and control (C2) infrastructure to conduct stealthy operations.
Potential snap-confine Privilege Escalation via CVE-2026-3888
2 rules 1 TTPAn unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.
Disruption of Large IoT DDoS Botnets
2 rules 1 TTPLaw enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.
VoidStealer Steals Secrets by Debugging Chrome
2 rules 1 TTPVoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.
Operation GhostMail: Russian APT Exploiting Zimbra XSS to Target Ukraine Government
2 rules 1 TTPA Russian APT group is exploiting a Zimbra XSS vulnerability (details unspecified) to target the Ukrainian government in an operation dubbed 'GhostMail'.
SnappyClient Malware Delivered via HijackLoader
2 rules 3 TTPsSnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.
Vulnerabilities in Paxton Net2 Access Control Units
2 rules 8 TTPs 1 IOCVulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.
CISA Urges Endpoint Management System Hardening After Cyberattack
2 rules 5 TTPsCISA is urging hardening of endpoint management systems following a cyberattack against a US organization, highlighting the potential for significant impact via compromised management infrastructure.
DarkSword iOS Exploit Used in Infostealer Attack
2 rules 3 TTPsA new exploit dubbed 'DarkSword' is being actively exploited in infostealer campaigns targeting iPhones, potentially leading to unauthorized data access and device compromise.
Memory Exhaustion Vulnerability in Widely Used Python Library
2 rules 1 TTPA memory exhaustion vulnerability (CVE-2026-33155) exists in a widely used Python library, affecting services like SageMaker, DataHub, and acryl-datahub due to an incomplete patch for CVE-2025-58367, requiring pinning to version 8.6.2.
North Korean IT Worker Operation Infiltration Techniques
2 rules 2 TTPs 1 IOCAnalysis of North Korean IT workers reveals techniques for infiltrating Western tech companies, including fake identity creation, internal training, and recruitment of collaborators.
MOTW Bypass via CAB, TAR, and 7-Zip Chaining
2 rules 2 TTPs 1 IOCA newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.
Vulnerabilities Disclosed in IP KVM Devices from Multiple Vendors
2 rules 2 TTPsResearchers have disclosed unspecified vulnerabilities in IP KVM devices from four manufacturers, potentially allowing attackers to gain unauthorized access to connected systems.
CVE-2026-22729: JSONPath Injection Vulnerability in Spring AI's PgVectorStore
2 rules 1 TTPCVE-2026-22729 is a JSONPath Injection vulnerability found in Spring AI's PgVectorStore, potentially allowing for unauthorized data access or modification.
CISA Urges Securing Microsoft Intune Systems Following Stryker Breach
2 rules 6 TTPsCISA is urging US organizations to secure their Microsoft Intune systems due to a breach at Stryker, highlighting potential vulnerabilities in cloud-based device management that could lead to unauthorized access and control over managed devices.
Kimsuky Malware Using Dropbox API for Command and Control
2 rules 2 TTPsKimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.
DarkSword iOS Exploit Chain Proliferation
1 rule 2 TTPsThe DarkSword exploit chain targets iOS versions 18 and under by exploiting a WebKit vulnerability, and is being adopted by multiple threat actors for initial access and execution.
CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection
2 rules 6 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0) to protect AI agents from prompt injection, data exposure, and unauthorized actions, enabling safer deployment of AI applications.
Interlock Ransomware Campaign Targeting Enterprise Firewalls
2 rules 3 TTPsThe Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.
ScreenConnect 26.1 Cryptographic Material Protection Vulnerability
2 rules 1 TTPScreenConnect version 26.1 has a vulnerability related to the insufficient protection of server-level cryptographic material, potentially allowing unauthorized access and data compromise.
RegPwnBOF Registry Symlink Race Condition Exploit
2 rules 2 TTPsRegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.
EmEditor Supply Chain Compromise Delivering Infostealer
2 rules 1 TTPA trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.
Entra ID Federated Identity Credential Issuer Modified
2 rules 2 TTPsModification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.
DarkSword iOS Exploit Kit Targeting iOS Devices
2 rules 3 TTPsThe DarkSword exploit kit targets iOS devices, leveraging unknown vulnerabilities to compromise devices.
Credential Guard Bypass and Detection Strategies
2 rules 2 TTPs 1 IOCThis brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.
Angular Cross-Site Scripting (XSS) Vulnerability
2 rules 5 TTPsA cross-site scripting (XSS) vulnerability exists in Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, allowing attackers to execute arbitrary code within the context of the vulnerable application, potentially leading to session hijacking, data exfiltration, and unauthorized actions.
GlassWorm Threat: DLL Injection and Chrome Hijacking
2 rules 2 TTPsThe GlassWorm threat involves DLL injection and Chrome hijacking via COM abuse, confirming a full supply chain loop, potentially leading to data theft and system compromise.
Unscoped API Keys in AI Agent Frameworks
2 rules 1 TTP 2 IOCsA research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.
Mirai C2 Remote Denial-of-Service Vulnerability (CVE-2024-45163)
2 rules 1 TTPCVE-2024-45163 is a remote denial-of-service vulnerability affecting Mirai command and control (C2) infrastructure, potentially disrupting botnet operations and related malicious activities.
PylangGhost RAT Observed on npm Registry
2 rules 1 TTPA new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.
Fileless Multi-Stage Remcos RAT via Phishing
2 rules 4 TTPsA fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.
Malware Spreading Through Fake 'Claude Code' Google Ads
2 rules 1 TTPMalware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.
Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories
3 rules 4 TTPs 1 IOCThe Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.
Phishing Campaign Abusing Google Cloud Storage Redirectors
2 rules 1 TTP 2 IOCsA phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.
Multiple Network Intrusion Attempts Detected
3 rules 2 TTPs 8 IOCsMultiple network-based intrusion attempts were detected on 2026-03-14, targeting PHP information exposure, Fortigate VPN exploitation, sensitive file access, and credential exposure.
CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog
2 rules 3 TTPsCISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.
RegPwn Windows Local Privilege Escalation Vulnerability
2 rules 1 TTPRegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.
Fortigate VPN CVE-2023-27997 Exploitation Attempt
2 rules 1 TTP 1 IOCIDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.
Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution
2 rules 3 TTPsMultiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.
Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability
2 rules 1 TTPAn authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.
Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent
3 rules 2 TTPs 3 IOCsMultiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.
LiteLLM Server-Side Template Injection Vulnerability
2 rules 1 TTPA server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.
WDAC Policy File Creation by Unusual Process
2 rules 1 TTPAdversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.
Untrusted DLL Loaded by Azure AD Connect Authentication Agent
2 rules 1 TTPThe loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.
MemProcFS Usage for Memory Dump Mounting and Credential Access
2 rules 3 TTPsAdversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.
GitHub Security Feature Disablement
3 rules 3 TTPsAn administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.
OpenCanary HTTPPROXY Login Attempt Detection
2 rules 1 TTPDetection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.
OpenCanary Telnet Login Attempt
1 rule 2 TTPsThe OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.
Linux Shell Invocation via Env Command
2 rules 1 TTPThe 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.
Evolver Path Traversal Vulnerability in `fetch` Command
2 rules 2 TTPsA path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.
GitHub Secret Scanning Feature Disabled
2 rules 1 TTPDetection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.
Malicious Usage of AWS IMDS Credentials Outside of Expected Services
2 rules 3 TTPsCompromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.
Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing
2 rules 1 TTPA high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.
Detecting Potential PowerShell Pass-the-Hash/Relay Scripts
2 rules 2 TTPsThis rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.
Suspicious Registry Hive Access via RegBack
2 rules 1 TTPThis rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.
SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation
2 rules 1 TTP 1 CVEA missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.
Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)
3 rules 1 TTP 1 CVECVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.
Windows Parent Process PID Spoofing Detection
3 rules 1 TTPAdversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.
OpenCanary SSH Connection Attempt
2 rules 1 TTPAn SSH connection attempt to an OpenCanary node indicates a potential adversary probing for vulnerable services or attempting unauthorized access within a network.
Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability
2 rules 1 TTPThe Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.
Potential ADIDNS Poisoning via Wildcard Record Creation
2 rules 1 TTPAttackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.
GitHub Push Protection Disabled
2 rules 1 TTPAn administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.
OpenCanary SSH Login Attempt Detection
2 rules 1 TTPDetects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.
Okta Admin Console Unusual Behavior Detection
2 rules 4 TTPsThis brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.
Grafana Privilege Escalation Vulnerability
2 rules 1 TTPA remote, authenticated attacker can exploit a vulnerability in Grafana to escalate privileges.
Okta Password Entered in AlternateID Field
2 rules 1 TTPOkta logs may contain user passwords if a user mistakenly enters their password into the username field during login, potentially exposing credentials in logs.
Azure Identity Protection Suspicious Browser Activity
2 rules 6 TTPsA suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.
Wireless Credential Dumping via Netsh
2 rules 2 TTPsAdversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.
TYPO3 CMS 14.2.0 Stores Passwords in Cleartext
1 rule 1 TTPTYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.
Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation
2 rules 1 TTPA vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.
PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)
2 rules 1 TTP 1 CVEPrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.
Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)
2 rules 1 TTP 1 CVEKentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.
CI4MS Authenticated Remote Code Execution via Theme Upload
2 rules 2 TTPsCI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.
changedetection.io XXE Vulnerability
2 rules 1 TTPA vulnerability in changedetection.io versions 0.54.9 and earlier allows a remote attacker to perform XML External Entity (XXE) attacks, potentially exposing sensitive local files.
Azure AD Sign-In with Unfamiliar Properties
2 rules 4 TTPsThis alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.
Azure AD Sign-in from New Country/Region
2 rules 1 TTPDetection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.
Suspicious Managed Code Hosting Process
2 rules 1 TTPThis rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.
rust-openssl AES Key Wrap Out-of-Bounds Write Vulnerability
2 rulesThe rust-openssl package is vulnerable to an out-of-bounds write due to an incorrect bounds assertion in the `aes::unwrap_key()` function, potentially leading to arbitrary code execution if attacker-controlled buffer sizes are permitted.
AWS Identity API Access from Rare ASN Organizations
2 rules 1 TTPThis rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.
Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.
Potential Remote Install via MsiExec
2 rules 1 TTPThis rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.
AMSI Enable Registry Key Modification for Defense Evasion
2 rules 1 TTPAdversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.
Suspicious Alternate Data Stream (ADS) File Creation
2 rules 1 TTPDetects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.
xmldom XML Node Injection via Comment Serialization
2 rules 1 TTPThe xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.
S3Browser IAM Policy Creation with Default Bucket Name
2 rules 3 TTPsAn AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.
Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)
2 rules 1 TTP 1 CVECVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.
PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access
2 rules 1 TTPDetection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.
Potential Kerberos Coercion via DNS-Based SPN Spoofing
2 rules 1 TTPAdversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.
i18next-http-middleware Prototype Pollution and Path Traversal Vulnerability
2 rules 2 TTPsVersions of i18next-http-middleware before 3.9.3 are vulnerable to prototype pollution, path traversal, and server-side request forgery (SSRF) due to improper validation of user-controlled language and namespace parameters, potentially leading to denial of service or remote code execution.
Azure AD Device Registration Policy Changes Detected
2 rules 1 TTPMonitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.
CVE-2026-3229 Integer Overflow in Certificate Chain Allocation
2 rules 1 CVECVE-2026-3229 is an integer overflow vulnerability in certificate chain allocation affecting a Microsoft product, potentially leading to denial of service or arbitrary code execution.
Suspicious Microsoft Diagnostics Wizard Execution
3 rules 1 TTPThis rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.
Unusual Executable File Creation by a System Critical Process
2 rules 1 TTPThe rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.
i18next-fs-backend Path Traversal Vulnerability
2 rules 1 TTPi18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.
First Time Seen Account Performing DCSync
2 rules 1 TTPDetection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.
CVE-2026-41445 KissFFT Integer Overflow leads to Heap Buffer Overflow
1 rule 1 TTP 1 CVECVE-2026-41445 is a reported integer overflow vulnerability in the KissFFT library that could lead to a heap buffer overflow.
radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.
NocoBase SQL Injection via Missing Validation on Update Endpoint
2 rules 1 TTPA SQL injection vulnerability exists in nocobase plugin-collection-sql versions 2.0.32 and earlier due to missing validation on the sqlCollection:update endpoint, allowing attackers with collection management permissions to execute arbitrary SQL queries and exfiltrate data.
Multiple Alerts in Different ATT&CK Tactics by Host
3 rules 3 TTPsThis rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.
Icinga Web Reflected XSS Vulnerability via Malformed Search Requests
2 rules 1 TTPA reflected cross-site scripting (XSS) vulnerability exists in Icinga Web versions 0.13.0 and earlier, allowing attackers to inject malicious JavaScript into a victim's browser through malformed search requests, potentially leading to arbitrary code execution within the Icinga Web context.
engramx vulnerable to CSRF enabling graph exfiltration and prompt injection
2 rules 2 TTPsThe engramx HTTP server, enabled by default and binding to 127.0.0.1:7337, is vulnerable to CSRF and prompt injection attacks, allowing a malicious website to exfiltrate the local knowledge graph and inject persistent prompt-injection payloads.
CVE-2026-31611: ksmbd Sub-Authority Validation Vulnerability
2 rules 1 TTP 1 CVECVE-2026-31611 is a vulnerability in ksmbd, requiring at least three sub-authorities before reading sub_auth[2], potentially leading to unauthorized access or code execution.
Credential Acquisition via Registry Hive Dumping
2 rules 1 TTPDetects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.
CoreDNS TSIG Authentication Bypass Vulnerability
2 rules 1 TTPCoreDNS versions prior to 1.14.3 are vulnerable to TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports, allowing unauthenticated network attackers to bypass authentication and potentially access TSIG-protected zone data or submit dynamic DNS updates.
Azure AD Threat Intelligence Detection
2 rules 1 TTPThis brief focuses on detecting unusual user activity and sign-in patterns flagged by Azure AD Threat Intelligence, which may indicate stealthy attacks, persistence attempts, privilege escalation, or initial access.
Potential Process Injection via PowerShell
2 rules 2 TTPsThis detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.
Multiple Alerts Involving a User Detection
2 rules 3 TTPsThis rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.
Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection
2 rules 2 TTPsDetection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.
Renamed Automation Script Interpreter
2 rules 1 TTPDetects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.
GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks
2 rules 1 TTP 1 CVEA vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.
BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.
Qualcomm Camera Sensor Memory Corruption Vulnerability
2 rules 1 CVECVE-2025-47405 is a memory corruption vulnerability in Qualcomm products related to processing camera sensor input/output control codes with invalid output buffers, potentially leading to arbitrary code execution.
Azure Privileged Identity Management (PIM) Invalid License Detection
2 rules 1 TTPDetection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).
Admidio Inverted 2FA Reset Allows Privilege Escalation
2 rules 2 TTPsA logic error in Admidio's two-factor authentication reset inverts the authorization check, allowing non-admin users to remove other users' TOTP, including administrators, reducing their security to password-only authentication in versions 5.0.8 and earlier.
Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)
2 rules 1 TTP 1 CVECisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.
NetExec File Creation Detection
2 rules 3 TTPsThis brief covers the detection of NetExec, a post-exploitation and lateral movement tool, through monitoring for unique file creation patterns associated with its execution and file extraction in Windows environments.
PowerShell Kerberos Ticket Request via KerberosRequestorSecurityToken
2 rules 1 TTPThis rule detects PowerShell scripts that request Kerberos service tickets using KerberosRequestorSecurityToken, potentially indicating Kerberoasting attacks for offline password cracking of service accounts.
Detecting External RPC Traffic for Initial Access
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.
Microsoft Build Engine Started by an Office Application
2 rules 1 TTPThe Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.
Potential Antimalware Scan Interface Bypass via PowerShell
3 rules 1 TTPThis rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.
PowerShell Share Enumeration via ShareFinder or Native APIs
2 rules 1 TTPDetection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.
Azure AD Activity From Anonymous IP Address
2 rules 4 TTPsDetection of user activity originating from an IP address identified as an anonymous proxy, potentially indicating unauthorized access, privilege escalation, or persistence within an Azure Active Directory environment.
PowerShell Invoke-NinjaCopy Script Detection
2 rules 1 TTPThe Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.
Windows EventLog Autologger Session Disabled via Registry Modification
2 rules 1 TTPAdversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.
Potential Local NTLM Relay via HTTP
2 rules 1 TTPAdversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.
Suspicious LSASS Access via Malicious Secondary Logon Service
3 rules 1 TTPAn attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.
OpenClaw MCP Loopback Token Spoofing Vulnerability
2 rules 1 TTPA vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.
liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.
Contour HTTPProxy Lua Code Injection via Cookie Path Rewrite
2 rules 3 TTPsContour's Cookie Rewriting feature is vulnerable to Lua code injection; an attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in the `spec.routes[].cookieRewritePolicies[].pathRewrite.value` or `spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value` fields, resulting in arbitrary code execution in the Envoy proxy.
Potential LSASS Clone Creation via PssCaptureSnapShot
2 rules 1 TTPDetection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.
Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.
GitPython Command Injection Vulnerability
2 rules 1 TTPGitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.
Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)
2 rules 1 TTPAdversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.
rust-openssl Deriver::derive and PkeyCtxRef::derive Buffer Overflow Vulnerability (CVE-2026-41676)
2 rules 1 CVECVE-2026-41676 is a buffer overflow vulnerability in rust-openssl's Deriver::derive and PkeyCtxRef::derive functions when used with OpenSSL 1.1.1, potentially leading to denial of service or arbitrary code execution.
Royal Elementor Addons Plugin SSRF Vulnerability
2 rules 1 TTP 1 CVEThe Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.
Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment
2 rules 3 TTPs 1 CVEExploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.
Detection of Wevtutil.exe Used to Disable Event Logs
2 rules 1 TTPThe execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.
Azure PIM Account Stale Sign-in Alert
2 rules 1 TTPDetection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.
Azure PIM Elevation Approved or Denied
2 rules 3 TTPsDetection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.
Azure AD User Added to Global or Device Admin Role
2 rules 3 TTPsAn attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.
WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)
2 rules 1 TTP 1 CVEThe Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.
PowerShell P/Invoke Process Injection API Chain Detection
2 rules 8 TTPsThis analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.
Kubernetes RBAC Wildcard Elevation on Existing Role
2 rules 1 TTPThe rule detects when a Kubernetes Role or ClusterRole is patched or updated to grant wildcard verbs and resources, effectively granting cluster-admin-like privileges, which is often a deliberate privilege expansion and could indicate malicious activity.
Azure PIM Role Activation Without MFA
2 rules 1 TTPDetection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.
Browser Process Spawned from an Unusual Parent
2 rules 1 TTPAttackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.
Suspicious PowerShell Script Using Cryptography Namespace
2 rules 1 TTPThe analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.
PowerShell Suspicious Payload Encoded and Compressed
2 rules 1 TTPDetects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.
itsourcecode Electronic Judging System SQL Injection Vulnerability (CVE-2026-7555)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-7555) exists in itsourcecode Electronic Judging System 1.0 via manipulation of the Username argument in the /intrams/login.php file, potentially leading to unauthorized data access and modification.
AWS GuardDuty Detector Deletion or Disablement
3 rulesAttackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.
Detect Application AppID URI Configuration Changes in Azure
2 rules 2 TTPsDetection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.
SeEnableDelegationPrivilege Assignment Detection
3 rules 2 TTPsDetection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.
Mimikatz MemSSP Log File Detection
2 rules 1 TTP 1 IOCThis rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.
Long Base64 Encoded Command via Scripting Interpreter
2 rules 5 TTPsDetection of oversized command lines used by Python, PowerShell, Node.js, or Deno interpreters containing base64 decoding or encoded-command patterns, indicating potential evasion and malicious execution.
Detection of Invoke-Obfuscation via Standard Input
2 rules 2 TTPsThis brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.
Azure AD Temporary Access Pass Added to Account
2 rules 4 TTPsDetection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.
Adversaries Disabling Important Scheduled Tasks
2 rules 1 TTPAdversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.
Non-Firefox Process Accessing Firefox Profile Directory
2 rules 1 TTPThis analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.
Windows Service Security Descriptor Tampering via sc.exe
2 rules 2 TTPsAdversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.
Windows AutoLogger Session Tampering Detection
3 rules 1 TTPAttackers may disable AutoLogger sessions by modifying specific registry values to evade detection and prevent security monitoring of early boot activities and system events, a technique observed in intrusions involving IcedID and XingLocker ransomware.
Suspicious Process Access via Direct System Call
2 rules 3 TTPsDetects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.
Suspicious MSIExec Remote Download
2 rules 2 TTPsThe analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.
Suspicious Child Processes Spawned by WScript or CScript
2 rules 3 TTPsDetects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.
Suspicious Antimalware Scan Interface DLL Creation
2 rules 1 TTPAn adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.
SourceCodester Hotel Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.
Script Execution via Microsoft HTML Application
3 rules 1 TTPDetects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.
PowerShell Obfuscation via Concatenated Dynamic Command Invocation
2 rules 1 TTPThis rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.
Potential Remote Credential Access via Registry
2 rules 2 TTPsDetects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.
Potential NTLM Relay Attack against a Computer Account
2 rulesThis rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.
Okta Alerts Following Unusual Proxy Authentication
2 rules 1 TTPAttackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.
Nsenter to PID Namespace via Auditd
2 rules 1 TTPThis rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.
Detection of Azure Subscription Permission Elevation
2 rules 1 TTPDetection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.
Conhost Proxy Execution for Defense Evasion
3 rules 1 TTPAdversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.
AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity
2 rules 4 TTPsThis rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.
Potential Shadow Credentials added to AD Object
2 rules 2 TTPsThis rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.
Detection of NetExec Hacktool Execution
2 rules 2 TTPsThe threat brief details the detection of NetExec (formerly CrackMapExec), a post-exploitation tool used for Active Directory penetration testing and network enumeration, often employed by threat actors for lateral movement and credential harvesting.
Unusual Process Loading Mozilla NSS/Mozglue Module
2 rules 1 TTPDetection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.
System Restore Disabled via Registry Modification
1 rule 1 TTPAttackers may attempt to disable system restore via registry modifications through the command line to prevent recovery after malicious activity.
Suspicious Script Interpreter Execution from Environment Variable Folders
2 rules 1 TTPMalware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.
Nginx-UI SSRF Vulnerability via Cluster Node Proxy
2 rules 1 TTP 1 IOCNginx-UI version 2.3.4 and earlier is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users to access internal services by manipulating cluster node configurations.
Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting
3 rules 2 TTPsThis rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.
Invoke-Obfuscation via Clip.exe
2 rules 2 TTPsThe use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.
Excessive Global Administrator Accounts in Azure PIM
2 rules 3 TTPsDetection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.
Detection of Python One-Liners with Base64 Decoding
2 rules 2 TTPsThis brief outlines a method to detect malicious use of Python one-liners employing base64 decoding to execute obfuscated payloads, a common tactic for evading traditional security measures.
Detection of Privileged Identity Management (PIM) Settings Modifications
2 rules 4 TTPsDetects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.
AWS SecurityHub Findings Evasion via API Calls
3 rules 2 TTPsAttackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.
AWS Identity Center Identity Provider Modification
2 rules 1 TTPAn adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.
AWS IAM User or Access Key Creation via S3 Browser
2 rules 2 TTPsThe use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.
Detecting RPC Traffic to the Internet
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.
Suspicious Process Accessing Browser Password Store
2 rules 1 TTPDetection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.
Proxy Execution via Windows OpenSSH Client
2 rulesDetection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.
Azure Application URI Configuration Modification
3 rules 4 TTPsDetection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.
xmldom XML Injection Vulnerability
2 rules 1 TTPThe xmldom package is vulnerable to XML injection. The package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. To address this applications that pass untrusted data to createDocumentType() or write untrusted values directly to a DocumentType node's publicId, systemId, or internalSubset properties should audit all serializeToString() call sites and add the option.
WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106
2 rules 1 TTP 1 CVEHighland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.
Windows Remote Desktop Network Bruteforce Attempt
2 rules 1 TTPThis detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.
Windows Files and Dirs Access Rights Modification via Icacls
2 rules 1 TTPDetection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.
Unsecured Outlook Credentials Access in Windows Registry
2 rules 1 TTPAn attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.
Unauthorized Access to Chrome Local State File
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.
Suspicious SUID Binary Execution on Linux
3 rules 2 TTPsThis rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.
Suspicious Script Interpreter Execution from Environment Variable Folders
2 rules 1 TTPAdversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.
Suspicious Process Execution from Unusual File Paths
2 rules 2 TTPsAttackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.
Suspicious Process Accessing Sensitive Identity Files via Auditd
3 rules 2 TTPsThis rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.
Suspicious Microsoft Antimalware Service Executable Execution
3 rules 1 TTPDetects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.
Signal K Server WebSocket Login Brute-Force Vulnerability
1 rule 1 TTPThe Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.
Server-Side Request Forgery in mcp-data-vis
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in AlejandroArciniegas' mcp-data-vis due to improper handling of HTTP requests, potentially allowing remote attackers to make arbitrary requests through the vulnerable server.
rust-openssl Stack Buffer Overflow Vulnerability
2 rulesThe rust-openssl crate is vulnerable to a stack-based buffer overflow (CVE-2026-41681) where the `EVP_DigestFinal()` function writes beyond the allocated buffer, potentially corrupting the stack, affecting versions >= 0.10.39 and < 0.10.78.
Regsvr32 Silent and Install Parameter DLL Loading
2 rules 2 TTPsDetection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.
pyp2spec Code Injection Vulnerability
3 rules 1 TTPpyp2spec before 0.14.1 is vulnerable to code injection by writing PyPI package metadata into generated spec files without escaping RPM macro directives, allowing malicious packages to execute arbitrary commands on the build machine.
pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber
2 rules 1 TTPpygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.
pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider
2 rules 1 TTPA path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.
Privileged Identity Management (PIM) Alerting Disabled
2 rules 1 TTPAn adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.
Print.exe Used to Dump Sensitive Files for Credential Access
2 rules 2 TTPsAttackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.
PowerShell Token Obfuscation via Process Creation
3 rules 1 TTPAdversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.
PowerShell P/Invoke API Chain for Process Injection
3 rules 7 TTPsThis brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.
PowerShell Obfuscation via String Concatenation
2 rules 1 TTPThis rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.
PowerShell Obfuscation via Character Array Reconstruction
2 rules 1 TTPDetects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.
PowerShell MiniDump Script Detection
2 rules 1 TTPThis brief detects PowerShell scripts that reference MiniDumpWriteDump or full-memory minidump types, potentially used to capture process memory from credential-bearing processes like LSASS.
Potential Vcruntime140 DLL Sideloading
2 rules 3 TTPsDetects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library, often used by threat actors like APT29 (via WinELOADER) to load malicious payloads under the guise of legitimate applications, leading to defense evasion, persistence, and privilege escalation.
Potential Machine Account Relay Attack via SMB
2 rules 2 TTPsThe rule identifies potential relay attacks against a machine account by detecting network share access events originating from a remote source IP but utilizing the target server's computer account, which may indicate an SMB relay attack.
Potential Kerberos Relay Attack via Coerced Authentication against a Computer Account
3 rules 1 TTP 1 CVEDetects potential Kerberos relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host, indicating an attacker has captured and relayed Kerberos authentication material to execute code on behalf of the compromised system.
Potential Credential Access via Windows Utilities
3 rules 3 TTPsThis rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.
Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.
Outbound SMB Traffic Detection
2 rules 1 TTPThis analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.
OpenMRS ModuleResourcesServlet Path Traversal Vulnerability
2 rules 1 TTPOpenMRS Core versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, contain a path traversal vulnerability in the ModuleResourcesServlet, allowing an unauthenticated attacker to read arbitrary files from the server filesystem by manipulating the URL.
OpenClaw Plugin Trust Verification Bypass via Environment Variable Override
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 allows attackers with control over workspace configuration to inject malicious plugins by overriding the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable through workspace .env files, compromising plugin trust verification.
Okta FastPass Phishing Attempt Detection
2 rules 1 TTPOkta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.
Non-Chrome Process Accessing Chrome Login Data
2 rules 1 TTPThis analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.
Newly Observed High Severity Detection Alert in Elastic SIEM
3 rulesThis rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.
n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay
2 rules 1 TTPA credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.
Multiple Alerts in Same ATT&CK Tactic by Host
2 rules 4 TTPsThis rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.
MiroFish Command Injection Vulnerability (CVE-2026-7058)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.
Microsoft IIS Connection String Decryption via aspnet_regiis
3 rules 1 TTPAn attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.
MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name
2 rules 2 TTPsMCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.
mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)
2 rules 1 TTP 1 CVEAn OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.
LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints
2 rules 1 TTPAuthenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.
Kubernetes Secret Access with Suspicious User Agent
2 rules 1 TTPDetects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.
Kubernetes Rapid Secret GET Activity Against Multiple Objects
2 rules 1 TTPDetects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.
Kirby CMS Missing Authorization Vulnerability
3 rules 1 TTPKirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.
Kata Containers CopyFile Policy Subversion via Symlinks
3 rules 2 TTPs 1 CVEAn oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.
JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability
2 rules 1 TTP 1 CVEA server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.
Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell
2 rules 2 TTPsAttackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.
Heimdall Authorization Bypass via Case-Sensitive URL-Encoded Slash Handling
2 rules 1 TTPHeimdall versions before 0.17.14 are vulnerable to inconsistent path interpretation due to case-sensitive handling of URL-encoded slashes; when `allow_encoded_slashes` is set to `off` (the default), the lowercase `%2f` is not recognized, potentially leading to authorization bypass if the default rule is overly permissive and the upstream service interprets `%2f` as a path separator.
Heap/Stack Overflow in rust-openssl with OpenSSL 1.1.x
2 rulesThe rust-openssl crate's `Deriver::derive` and `PkeyCtxRef::derive` functions can cause heap/stack overflows when used with OpenSSL 1.1.x due to insufficient buffer length validation in X25519, X448, DH, and HKDF-extract, affecting rust-openssl versions >= 0.9.27 and < 0.10.78.
GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)
2 rules 1 TTP 1 CVEA heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.
Frequent Azure PIM Role Activation Detected
2 rules 3 TTPsDetection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.
florensiawidjaja BioinfoMCP Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.
Executable or Script Creation in Temporary Paths
2 rules 1 TTPAdversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.
Disabling LSA Protection via Registry Modification
2 rules 1 TTPAdversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.
Detection of Python Base64 Encoded Execution on Linux
2 rules 2 TTPsThis brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.
Detection of Important Scheduled Task Deletion or Disablement
2 rules 1 TTPAdversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.
Deletion of Critical Scheduled Tasks
2 rules 1 TTPAdversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.
CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine
2 rules 1 TTP 1 CVECVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).
Command Obfuscation via Unicode Modifier Letters
2 rules 1 TTPAdversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.
CKAN Unauthenticated SQL Injection in datastore_search_sql
2 rules 1 TTPAn unauthenticated SQL injection vulnerability in CKAN's `datastore_search_sql` function allows attackers to access private resources and PostgreSQL system information, affecting versions prior to 2.10.10 and versions 2.11.0 through 2.11.4.
Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability
2 rules 1 TTP 1 CVEA vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.
ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)
2 rules 1 TTP 1 CVEChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.
Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection
2 rules 1 TTP 1 CVEBeghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.
Azure Subscription Permission Elevation via Activity Logs
2 rules 1 TTPAn attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.
AWS VPC Flow Logs Deletion for Defense Evasion
2 rules 1 TTPAn adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.
AWS STS GetFederationToken with AdministratorAccess in Request
2 rules 2 TTPsDetection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.
AWS EC2 Stop, Start, and User Data Modification Correlation
3 rules 2 TTPsDetection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.
AWS EC2 Instance Profile Associated with Running Instance
2 rules 2 TTPsAn attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.
AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN
2 rules 1 TTPDetects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.
Avo Framework Broken Access Control Vulnerability
2 rules 1 TTPAvo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.
ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)
2 rules 1 TTP 1 CVEA time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (<= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.
Arcane Unauthenticated Compose Template Content Disclosure
2 rules 1 TTPArcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.
Appsmith SQL Injection Vulnerability in FilterDataService
2 rules 1 TTPA SQL injection vulnerability exists in Appsmith's FilterDataServiceCE.java in versions 1.98 and earlier where the dropTable method constructs a SQL DROP TABLE statement using string concatenation with the table name, allowing arbitrary SQL command execution, leading to potential data loss, exfiltration, or modification.
Aider-MCP Command Injection Vulnerability (CVE-2026-7316)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.
666ghj MiroFish REST API Authentication Bypass (CVE-2026-7042)
2 rules 1 TTP 1 CVEA missing authentication vulnerability (CVE-2026-7042) exists in 666ghj MiroFish up to version 0.1.2, allowing remote attackers to bypass authentication via manipulation of the REST API Endpoint's create_app function.
Windows Proxy Execution of .NET Utilities via Scripts
2 rules 2 TTPsDetects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.
Unusual Child Processes of RunDLL32 Execution Without Arguments
2 rules 1 TTPThe execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.
Suspicious DNS Queries to Telegram API by Non-Telegram Processes
2 rules 2 TTPs 1 IOCDetection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.
PowerShell Loading .NET Assemblies via Reflection
2 rules 1 TTPThis analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.
PowerShell Execution via Environment Variables
2 rules 1 TTPAdversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.
Non-Chrome Process Accessing Chrome Default Directory
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.
Logon Script Registry Modification for Persistence and Privilege Escalation
2 rules 2 TTPsThis brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.
IIS HTTP Logging Disabled via AppCmd
2 rules 1 TTPAn attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.
Executable or Script Creation in Suspicious Paths
2 rules 1 TTPThis analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.
Detects Kirbi File Creation
2 rules 1 TTPDetects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.
CoreDNS Transfer Plugin ACL Bypass Vulnerability
2 rules 1 TTPCoreDNS' transfer plugin prior to version 1.14.3 can select the wrong ACL stanza due to lexicographic comparison, leading to unauthorized zone transfers by clients intended to be denied by subzone-specific transfer policies.
Braodo Stealer Screen Capture in TEMP Directory
2 rules 1 TTPThis analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.
Azure Identity Protection Atypical Travel Anomaly
2 rules 1 TTPThe Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.
Azure AD Privileged Role Assignment
2 rules 2 TTPsDetection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.
Azure AD Account Created and Deleted Within a Close Time Frame
2 rules 3 TTPsDetection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.
Suspicious CSC.exe Parent Process
3 rules 3 TTPsThe Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.
Control Panel Process with Unusual Arguments
2 rules 1 TTPAdversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.
Suspicious Script Execution from Temporary Directory
2 rules 1 TTPThis brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.
Detection of Suspicious Inbox Manipulation Rules in Azure
2 rules 2 TTPsThis brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.
WScript or CScript Dropper
2 rules 2 TTPsThe WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.
WeKan SSRF Vulnerability in Webhook Integration
2 rules 1 TTP 1 CVEWeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.
Unusual Child Process from a System Virtual Process
2 rules 1 TTPA suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.
TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)
2 rules 1 CVEA server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.
Suspicious PowerShell Reconnaissance via WMI Queries
2 rules 2 TTPsDetection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.
Suspicious Microsoft HTML Application Child Process
2 rules 1 TTPMshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.
S3 Browser Used to Create IAM Login Profiles
2 rules 2 TTPsThe S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.
RustFS Notification Target Admin API Authorization Bypass
2 rules 3 TTPsA vulnerability in RustFS allows a non-admin user to overwrite a shared admin-defined notification target, leading to event interception and audit evasion due to missing admin-action authorization on notification target admin API endpoints.
Remote Registry Lateral Movement via RPC Firewall
2 rules 3 TTPsThis brief details detection of lateral movement attempts using remote RPC calls to modify the registry, potentially leading to code execution, detected via RPC Firewall logs.
Potential Masquerading as Svchost
2 rules 1 TTPAttackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.
Potential Credential Access via Renamed COM+ Services DLL
2 rules 3 TTPs 1 IOCDetection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.
Potential Credential Access via MSBuild Loading Credential Management DLLs
2 rules 1 TTPThe detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.
OpenRemote Improper Access Control Leads to Privilege Escalation
2 rules 1 TTPOpenRemote is vulnerable to privilege escalation, allowing an attacker with write:admin privileges in one Keycloak realm to gain administrator access to the master realm by manipulating Keycloak realm roles due to missing authorization checks in the updateUserRealmRoles function.
OpenClaw Symlink Race Condition Allows Sandbox Escape
1 rule 1 TTPA time-of-check/time-of-use (TOCTOU) race condition in OpenClaw versions 2026.4.21 and earlier allows a symlink swap to redirect filesystem writes outside the intended sandbox mount root, potentially leading to arbitrary file modification.
Okta User Session Start via Anonymizing Proxy Service
2 rules 1 TTPDetection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.
Nsenter Execution with Target Flag Inside Container
2 rules 1 TTPThe rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.
Modification of WDigest Security Provider
2 rules 1 TTPThe rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.
MLOps_MCP Path Traversal Vulnerability (CVE-2026-7213)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in ef10007 MLOps_MCP version 1.0.0, allowing a remote attacker to manipulate the 'filename/destination' argument in the 'save_file Tool' component's 'fastmcp_server.py' file.
locize Client SDK Cross-Origin DOM XSS and Handler Hijack Vulnerability
2 rules 1 TTPThe locize client SDK versions prior to 4.0.21 are vulnerable to cross-origin DOM XSS and handler hijack due to missing origin validation in the InContext Editor, allowing attackers to inject malicious code and exfiltrate data via crafted postMessage events.
Kubernetes Secrets Enumeration from Non-Loopback Client
2 rules 2 TTPsDetection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.
Impossible Travel Detection in Azure AD
2 rules 1 TTPThis brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.
Heimdall Host Matching Case-Sensitivity Vulnerability
2 rules 1 TTPHeimdall performs case-sensitive host matching, which can lead to policy bypass because HTTP hostnames are case-insensitive, potentially leading to unauthorized access, data modification, or privilege escalation if the request host is part of the rule.
Heimdall Authorization Bypass via Path Normalization Mismatch
2 rules 2 TTPsHeimdall is vulnerable to an authorization bypass due to a path normalization mismatch between Heimdall and downstream components, potentially leading to unauthorized access and privilege escalation.
GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.
geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.
FastlyMCP Command Injection Vulnerability (CVE-2026-7220)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.
Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)
2 rules 1 TTPAdversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.
Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)
2 rules 1 TTP 1 CVEDetect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.
D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd
2 rules 1 TTP 1 CVEA buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.
CVE-2018-0735 ECDSA Signature Generation Timing Attack
2 rules 1 TTP 1 CVECVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.
Creation or Modification of Domain Backup DPAPI Private Keys
3 rules 1 TTPDetection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.
choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)
3 rules 1 TTP 1 CVEThe choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.
Budibase XSS Leads to Account Takeover via JWT Theft
2 rules 1 TTPThe `budibase:auth` cookie in Budibase is set without the `httpOnly` flag, enabling attackers with XSS to steal JWTs and gain persistent access to user accounts.
BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.
Azure PIM - Role Assignment Outside of Privileged Identity Management
2 rules 4 TTPsDetection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.
AWS GuardDuty IP Set Manipulation for Defense Impairment
2 rules 1 TTPAn attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.
PowerShell Obfuscation via Backtick-Escaped Variable Expansion
2 rules 1 TTPPowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.
NTDS or SAM Database File Copied
2 rules 1 TTPDetects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.
Detection of IIS HTTP Logging Disabled via AppCmd.exe
2 rules 2 TTPsThis analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.