Tag
Meridian Library Multiple Defense-in-Depth Gaps
3 rules 5 TTPsMultiple defense-in-depth gaps exist in Meridian versions prior to 2.1.1, including high severity issues related to bypassing safety caps on collection mapping that can lead to resource exhaustion, along with medium and low severity issues affecting constructor selection, telemetry, retry mechanisms, and exception handling.
.NET Uncontrolled Resource Consumption Vulnerability (CVE-2026-26171)
1 rule 1 CVECVE-2026-26171 is a vulnerability in .NET that allows an unauthorized attacker to perform a denial-of-service attack over a network due to uncontrolled resource consumption.
.NET Spoofing Vulnerability (CVE-2026-32178)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.
Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion
2 rules 1 TTP 1 CVETmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.
PowerShell Loading .NET Assemblies via Reflection
2 rules 1 TTPThis analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.