Tag
Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE
2 rules 3 TTPs 3 CVEsMultiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.
Multiple Vulnerabilities in n8n Workflow Automation Tool
3 rules 5 TTPs 1 CVEMultiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.
Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)
2 rules 1 TTP 1 CVEAuth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.
Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking
2 rules 1 TTP 2 CVEsUnauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.
Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.
Checkmk Vulnerability Allows Session Hijacking
2 rules 1 TTPAn authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.
Citrix Systems NetScaler Vulnerabilities Allow Information Disclosure and Session Hijacking
2 rules 2 TTPsAn anonymous or authenticated remote attacker can exploit multiple vulnerabilities in Citrix Systems NetScaler to disclose information and take over a user session.
Okta Session Hijacking via Multiple Device Token Hashes
2 rules 2 TTPsDetection of multiple device token hashes and source IPs for a single Okta session, indicating potential session hijacking and unauthorized access to Okta resources.