Skip to content
Threat Feed

Type

Advisory

2424 briefs RSS
high advisory

Pillow Out-of-Bounds Write Vulnerability in PSD Processing (CVE-2026-42311)

Pillow versions 10.3.0 through 12.1.1 are vulnerable to an out-of-bounds write in PSD image decoding/encoding due to an integer overflow when computing tile extent sums, potentially leading to arbitrary code execution.

Pillow oob-write integer-overflow psd memory-corruption
2r 1t 1c
high advisory

Argo Workflows Credentials Exposed in Pod Logs

Argo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.

argo-workflows credential-access kubernetes
2r 1t 1c
high advisory

Argo Workflows Template Referencing Restriction Bypass

Argo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.

argo-workflows kubernetes privilege-escalation defense-evasion
3r 2t 1c
medium advisory

Argo Workflows Webhook Interceptor Vulnerable to Unauthenticated Memory Exhaustion (CVE-2026-42294)

Argo Workflows is vulnerable to a denial-of-service (DoS) attack due to unbounded memory allocation in the Webhook Interceptor component.

Argo Workflows < 3.7.14 +2 denial-of-service argo-workflows cloud
2r 1t
medium advisory

Gotenberg ExifTool Tag Blocklist Bypass via Group-Prefixed Tag Names

Gotenberg is vulnerable to an ExifTool tag blocklist bypass, allowing unauthenticated attackers to rename, move, and modify permissions of files within the container by using group-prefixed tag names like 'System:FileName' or the 'FilePermissions' tag in HTTP requests.

gotenberg/gotenberg/v8 exiftool file-manipulation cve-2026-40893
2r 1t
medium advisory

Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability

The Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.

Contact Form 7 WordPress plugin wordpress resource-exhaustion denial-of-service cve-2026-25863
2r 1t 1c
critical advisory

Arelle Unauthenticated Remote Code Execution Vulnerability

Arelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.

Arelle rce vulnerability
2r 1t 1c
high advisory

WordPress Easy PayPal Events & Tickets Plugin Information Disclosure Vulnerability

An information disclosure vulnerability in the Easy PayPal Events & Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.

Easy PayPal Events & Tickets plugin wordpress info-disclosure cve-2026-41471 unauthenticated enumeration
2r 1t 1c
high advisory

WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability

An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.

Easy PayPal Events & Tickets plugin wordpress authentication bypass vulnerability
2r 1t 1c 1i
critical advisory

BusyBox DHCPv6 Client Heap Buffer Overflow Vulnerability (CVE-2026-29004)

A heap buffer overflow vulnerability in BusyBox's DHCPv6 client allows network-adjacent attackers to trigger memory corruption, denial of service, or arbitrary code execution via crafted DHCPv6 responses.

BusyBox heap-overflow dhcpv6 cve-2026-29004 denial-of-service
2r 2t 1c
critical advisory

OpenMRS Module Upload Path Traversal Vulnerability

OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.

openmrs-web +1 path-traversal zip-slip rce openmrs web-application
2r 1t
high advisory

Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters

Quarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.

Quarkus Vertx HTTP +3 authentication-bypass authorization-bypass web-application
2r 2t
critical advisory

Qualcomm PLC FW Buffer Overflow via Incorrect Authorization (CVE-2026-25293)

CVE-2026-25293 is a critical buffer overflow vulnerability in Qualcomm PLC FW due to incorrect authorization, potentially allowing unauthorized access and control over programmable logic controllers.

PLC FW plc buffer-overflow industrial-control-systems cve-2026-25293
2r 2t 1c
critical advisory

NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)

NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.

NetBox rce template-injection cve-2026-29514
2r 1t 1c
high advisory

Qualcomm Driver IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability, CVE-2025-47408, exists in Qualcomm drivers when another driver calls an IOCTL with an invalid input/output buffer, potentially leading to code execution or denial of service.

memory corruption ioctl driver vulnerability cve-2025-47408
2r 1t 1c
high advisory

Memory Corruption Vulnerability in Digital Signal Processor (CVE-2025-47407)

CVE-2025-47407 describes a memory corruption vulnerability affecting the digital signal processor due to allocation failure at the kernel level, potentially leading to arbitrary code execution with elevated privileges on affected systems.

memory-corruption dsp qualcomm cve-2025-47407
2r 1t 1c
high advisory

Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise

A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.

Microsoft Defender for Office 365 phishing credential-theft AiTM token-compromise
2r 2t 2i
low advisory

Potential PowerShell Obfuscated Script via High Entropy

This detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.

Microsoft Intune Management Extension +2 defense-evasion powershell obfuscation
2r 3t
medium advisory

Windows Port Forwarding Rule Addition via Registry Modification

An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.

Elastic Defend +3 port-forwarding registry-modification command-and-control defense-evasion windows
2r 3t
medium advisory

Suspicious Zoom Child Process Execution

A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.

Microsoft Defender XDR +1 defense-evasion execution windows
2r 6t
medium advisory

Suspicious Windows PowerShell Arguments Detected

This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.

Elastic Defend +5 powershell malware execution
3r 4t
medium advisory

Suspicious Execution via Windows Command Debugging Utility

Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.

Microsoft Defender XDR +5 lolbas defense-evasion windows
2r 2t
medium advisory

SIP Provider Modification for Defense Evasion

This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.

Microsoft Defender XDR +2 defense-evasion windows registry-modification
2r 1t
medium advisory

Service DACL Modification via sc.exe

Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.

Microsoft Defender XDR +2 defense-evasion persistence windows
2r 2t
medium advisory

Remote Desktop File Opened from Suspicious Path

Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.

M365 Defender +4 initial-access rdp phishing windows
2r 2t
medium advisory

Potential WSUS Abuse for Lateral Movement via PsExec

Adversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.

Windows Server Update Services lateral-movement wsus psexec windows
2r 2t
medium advisory

Potential WPAD Spoofing via DNS Record Creation

Detection of a Windows DNS record creation event (5137) with an ObjectDN attribute containing 'DC=wpad', which indicates a potential WPAD spoofing attack to enable privilege escalation and lateral movement.

credential-access wpad-spoofing windows
2r 1t
low advisory

Potential Secure File Deletion via SDelete Utility

This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.

Microsoft Defender XDR +3 defense evasion impact windows
2r 2t
low advisory

Potential Remote File Execution via MSIEXEC

The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.

Windows Installer msiexec remote-file-execution initial-access defense-evasion windows
2r 3t
medium advisory

Potential Pass-the-Hash (PtH) Attempt Detection

This rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.

Windows lateral-movement threat-detection
2r 1t
medium advisory

Potential NetNTLMv1 Downgrade Attack via Registry Modification

This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.

Microsoft Defender XDR +2 defense-evasion ntlm registry-modification windows
2r 2t
medium advisory

Potential Evasion via Windows Filtering Platform Blocking Security Software

Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.

Windows Filtering Platform +2 defense-evasion windows-filtering-platform endpoint-security
2r 2t
medium advisory

Potential DLL Side-Loading via Trusted Microsoft Programs

This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.

WinWord.exe +4 defense-evasion execution dll-side-loading windows
2r 2t
medium advisory

Potential Data Exfiltration via Rclone

Attackers are abusing the legitimate file synchronization tool rclone, often renamed to masquerade as legitimate software, to exfiltrate data to cloud storage or remote endpoints.

Elastic Defend data-exfiltration rclone masquerading
2r 3t
medium advisory

Potential Computer Account NTLM Relay Activity

Detection of potential NTLM relay attacks targeting computer accounts by identifying authentication events originating from hosts other than the account's owner, indicating possible credential theft and misuse.

credential-access threat-detection windows
2r 2t
medium advisory

Potential Active Directory Replication Account Backdoor

Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.

Active Directory credential-access persistence active-directory dcsync
2r 2t
medium advisory

Potential Account Takeover - Logon from New Source IP

The rule identifies a user account that normally logs in with high volume from one source IP suddenly logging in from a different source IP, potentially indicating account takeover or use of stolen credentials from a new location.

Elastic Security account-takeover credential-access windows
2r 1t
medium advisory

Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement

Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.

Elastic Defend +3 defense-evasion lateral-movement persistence registry-modification
2r 4t
low advisory

Enumerating Domain Trusts via DSQUERY.EXE

Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.

Microsoft Defender XDR discovery domain-trust windows
2r 2t
medium advisory

Detection of VScode Remote Tunneling for Command and Control

The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.

Microsoft Defender XDR +3 command-and-control vscode remote-access-tools windows
2r 1t
low advisory

Command Shell Activity Started via RunDLL32

This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.

M365 Defender +2 execution command-shell rundll32
2r 4t
medium advisory

Code Signing Policy Modification Through Built-in Tools

Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.

M365 Defender +1 defense-evasion code-signing windows
2r 1t
high advisory

AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)

CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.

AAP cve-2026-6266 account-hijacking authentication-bypass
2r 1t 1c
high advisory

Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)

A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.

Norton Secure VPN privilege-escalation windows vulnerability
2r 1t 1c
critical advisory

SambaBox OS Command Injection Vulnerability (CVE-2026-3120)

SambaBox versions 5.1 to before 5.3 are vulnerable to OS command injection via improper control of code generation (CVE-2026-3120), potentially allowing attackers with high privileges to execute arbitrary commands on the underlying system.

SambaBox code-injection os-command-injection cve-2026-3120
2r 1t 1c
critical advisory

Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration

A remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.

Bitwarden CLI supply-chain credential-theft exfiltration npm
2r 2t
critical advisory

Rancher Vulnerability Allows Remote Code Execution and File Manipulation

An authenticated, remote attacker can exploit a vulnerability in Rancher to execute arbitrary program code and manipulate files, potentially leading to privilege escalation and system compromise.

Rancher code-execution file-manipulation
2r 2t
critical advisory

OPNsense Multiple Vulnerabilities Leading to Remote Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.

OPNsense vulnerability rce firewall
2r 1t
critical advisory

Langflow Multiple Vulnerabilities Allow Code Execution

An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.

Langflow code-execution web-application
2r 1t
high advisory

Multiple Vulnerabilities in Progress Software MOVEit Automation

Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.

MOVEit Automation vulnerability privilege-escalation defense-evasion
2r 2t
high advisory

Totolink N300RH Buffer Overflow Vulnerability in setWanConfig

A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.

N300RH 3.2.4-B20220812 buffer-overflow router cve-2026-7749
2r 1t 1c
critical advisory

Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)

A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.

N300RH 3.2.4-B20220812 buffer-overflow router cve webserver
2r 1t 1c
medium advisory

libexif Vulnerability Allows Code Execution

A local attacker can exploit a vulnerability in libexif to potentially execute arbitrary code, cause a denial of service, or disclose sensitive information.

libexif vulnerability code-execution denial-of-service
2r 2t
critical advisory

GNU InetUtils Multiple Vulnerabilities Allow Code Execution and Information Disclosure

Multiple vulnerabilities in GNU InetUtils allow a remote attacker to execute arbitrary code and disclose sensitive information.

InetUtils code-execution information-disclosure
2r 2t
medium advisory

Grafana Multiple Vulnerabilities Leading to XSS and Information Disclosure

Multiple vulnerabilities in Grafana allow a remote, anonymous attacker to conduct a Cross-Site Scripting attack or disclose information.

Grafana xss information-disclosure cloud
2r 1t
critical advisory

XZ Utility Vulnerability Allows Remote Code Execution

A remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.

xz code-execution linux
2r 1t
high advisory

MariaDB Vulnerability Allows Denial of Service and Potential Code Execution

A remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.

MariaDB denial-of-service code-execution
2r 2t
medium advisory

Tegsoft Online Support Application Reflected XSS Vulnerability (CVE-2025-14320)

CVE-2025-14320 is a reflected cross-site scripting (XSS) vulnerability in Tegsoft Online Support Application versions V3 through 31122025, allowing attackers to inject arbitrary web scripts into user browsers.

Online Support Application xss reflected-xss cve-2025-14320
2r 1t 1c
medium advisory

Multiple Vulnerabilities in Rapid7 Velociraptor

Multiple vulnerabilities in Rapid7 Velociraptor could allow an attacker to disclose information or cause a denial of service.

Velociraptor vulnerability denial-of-service information-disclosure
2r 3t
medium advisory

osrg GoBGP Integer Underflow Vulnerability

osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.

GoBGP cve vulnerability integer underflow bgp
2r 1t 1c
high advisory

GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.

GoBGP cve-2026-7735 buffer-overflow bgp
2r 1c
high advisory

Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)

Funadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.

funadmin <= 7.1.0-rc6 cve unrestricted file upload remote code execution
2r 1t 1c
high advisory

Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability

Shandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.

PDM Product Data Management System sql-injection cve-2026-7727 webserver
2r 1t 1c
critical advisory

Totolink WA300 Buffer Overflow Vulnerability (CVE-2026-7719)

A buffer overflow vulnerability exists in Totolink WA300 version 5.2cu.7112_B20190227 within the loginauth function of the /cgi-bin/cstecgi.cgi file, specifically affecting the POST Request Handler component, triggerable via manipulation of the http_host argument, and remotely exploitable with a publicly available exploit.

WA300 5.2cu.7112_B20190227 buffer overflow remote code execution cve-2026-7719 totolink
2r 1t 1c
high advisory

YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)

YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.

yudao-cloud <= 3.8.0 +1 authentication bypass cve-2026-7710 web application
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach

Multiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.

Thunderbird ESR +1 vulnerability rce databreach securitybypass
2r 4t 5c
high advisory

AV Stumpfl Pixera Two Media Server Code Injection Vulnerability

A remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.

Pixera Two Media Server code-injection websocket cve-2026-7703
2r 1t 1c
critical advisory

Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability

CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.

Easy7 Integrated Management Platform cve-2026-7698 command-injection web-application
2r 1t 1c
high advisory

Acrel ECEMS SQL Injection Vulnerability

A SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.

ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 sql-injection cve-2026-7694 webserver
2r 1t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-37555

CVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.

vulnerability microsoft cve-2026-37555
2r 1c
low advisory

Microsoft CVE-2026-30656 Information Published

Microsoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.

vulnerability microsoft
1c
critical advisory

Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)

A remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.

BR-6428nC buffer overflow cve-2026-7684 webserver
2r 1t 1c
critical advisory

Edimax BR-6208AC Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Edimax BR-6208AC devices (<= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.

BR-6208AC buffer overflow cve-2026-7685 router webserver
2r 1t 1c
medium advisory

NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)

The NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.

NEX-Forms – Ultimate Forms Plugin for WordPress plugin <= 9.1.11 wordpress xss stored-xss cve-2026-5063
2r 1t 1c
high advisory

code-projects Online Hospital Management System SQL Injection Vulnerability

CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.

Online Hospital Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion

The WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.

WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin <= 6.7.25 idor wordpress woocommerce account-deletion
2r 1t 1c
high advisory

Potential Chroot Container Escape via Mount

The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.

Elastic Defend +2 container-escape privilege-escalation linux
2r
high advisory

Chroot Execution in Container Context on Linux

Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.

Elastic Defend +1 container-escape privilege-escalation linux chroot
2r 1t
high advisory

Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability

The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.

Salon Booking System – Free Version plugin for WordPress <= 10.30.25 arbitrary-file-read wordpress plugin-vulnerability cve
2r 1t 1c
high advisory

Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification

The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.

Paid Memberships Pro plugin wordpress stripe webhook vulnerability plugin
2r 3t 1c
high advisory

Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)

The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.

Geo Mashup plugin <= 1.13.18 sqli wordpress plugin
2r 1t 1c
high advisory

Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)

A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (<= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.

Geo Mashup plugin sql-injection wordpress plugin
2r 1t 1c
critical advisory

OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)

A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.

p_69_branch_monkey_mcp command-injection web-application cve
2r 1t 1c
high advisory

Zyosoft School App Insecure Direct Object Reference Vulnerability

Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.

School App idor vulnerability web application cve-2026-7491
2r 3t 1c
high advisory

Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)

A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

CTMS +1 arbitrary-file-upload web-shell code-execution
2r 3t 1c
high advisory

Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)

Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.

CTMS sqli cve-2026-7489 web-application
2r 1t 1c
medium advisory

TRENDnet TEW-821DAP Firmware Update Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in TRENDnet TEW-821DAP version 1.12B01, allowing a remote attacker to execute arbitrary code by manipulating the 'str' argument in the auto_update_firmware function of the Firmware Update component.

TEW-821DAP buffer-overflow firmware-update network-device
2r 1t 1c
critical advisory

WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)

The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.

The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin <= 4.2.2 wordpress rce plugin
2r 1t 1c
medium advisory

Gravity Forms Plugin Stored XSS Vulnerability (CVE-2026-5113)

The Gravity Forms plugin for WordPress is vulnerable to stored cross-site scripting (XSS) via Consent field hidden inputs, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the entries list page.

Gravity Forms plugin <= 2.10.0 xss wordpress gravityforms cve-2026-5113 stored-xss
2r 2t 1c
high advisory

WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.

WP Mail Gateway plugin wordpress privilege-escalation plugin-vulnerability
2r 1t 1c
high advisory

WordPress Import and Export Users Plugin Privilege Escalation Vulnerability

A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.

Import and export users and customers plugin privilege-escalation wordpress cloud
2r 1t 1c
critical advisory

WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability

The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.

User Registration Advanced Fields plugin <= 1.6.20 wordpress file-upload rce
2r 1t 1c
critical advisory

CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.

Amazon Linux 2023 +3 privilege-escalation linux kernel
2r 1t 1c
high advisory

Expanding Detection Beyond Endpoints to Counter Evolving Threats

Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.

Cortex XDR +8 cloud-security iam incident-response threat-detection
3r 6t
high advisory

GenAI Tools Accessing Sensitive Files for Credential Access and Persistence

This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.

Elastic Endpoint Security genai credential-access persistence collection
2r 4t
medium advisory

libssh2 Integer Overflow Vulnerability (CVE-2026-7598)

An integer overflow vulnerability exists in libssh2 versions up to 1.11.1 within the userauth_password function of src/userauth.c, which can be triggered remotely by manipulating username_len/password_len arguments.

libssh2 <= 1.11.1 cve integer_overflow libssh2
2r 1t 1c
high advisory

Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability

CVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.

command-executor-mcp-server cve-2026-7593 command-injection webserver
2r 1t 1c
high advisory

Flux159 mcp-game-asset-gen Path Traversal Vulnerability

A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.

mcp-game-asset-gen 0.1.0 path-traversal vulnerability web-application
2r 1t 1c
medium advisory

AWS SSM Session Manager Child Process Execution Abuse

Adversaries abuse AWS Systems Manager (SSM) Session Manager to gain remote execution and lateral movement within AWS environments by spawning malicious child processes from the SSM session worker, leveraging legitimate AWS credentials and IAM permissions.

AWS Systems Manager Session Manager aws ssm session-manager execution cloud
2r 3t
high advisory

AWS IAM Privilege Operations via Lambda Execution Role

Detection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.

AWS IAM +1 aws iam lambda privilege-escalation persistence
2r 3t
medium advisory

AWS EC2 Role GetCallerIdentity from New Source AS Organization

The rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.

Amazon Web Services cloud aws getcalleridentity ec2 discovery
2r 1t
medium advisory

AWS Discovery API Calls from VPN ASN by New Identity

This rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.

Amazon Web Services cloud aws discovery vpn
2r 1t
high advisory

SQL Injection Vulnerability in itsourcecode Courier Management System

itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.

Courier Management System sql-injection web-application cve
2r 1t 1c
low advisory

Rapid Enumeration of AWS S3 Buckets

An AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.

AWS S3 +1 aws s3 cloudtrail discovery enumeration reconnaissance
2r 4t
low advisory

AWS Discovery API Calls via CLI from a Single Resource

This rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.

cloud aws cloudtrail discovery
2r 2t
high advisory

Potential Kerberos SPN Spoofing via Suspicious DNS Query

Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.

Elastic Defend credential-access kerberos spn-spoofing dns windows
2r 1t
medium advisory

Prosody Memory Exhaustion Vulnerability (CVE-2026-43506)

Prosody versions before 0.12.6, versions 1.0.0 through 13.0.0, and before version 13.0.5 are vulnerable to a denial of service due to memory leaks from unauthenticated connections, leading to memory exhaustion.

Prosody denial-of-service memory exhaustion
2r 1t 1c
high advisory

WP Editor Plugin CSRF Vulnerability

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.

WP Editor plugin <= 1.2.9.2 csrf wordpress plugin vulnerability
2r 1t 1c
critical advisory

WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)

The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.

Temporary Login plugin authentication bypass wordpress plugin vulnerability cve-2026-7567 cloud
2r 1t 1c
high advisory

Potential Root Effective Shell from Non-Standard Path via Auditd

This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.

Auditd Manager privilege-escalation linux auditd
2r 1t
high advisory

Malware Distribution via Hugging Face and ClawHub

Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.

Atomic macOS Stealer malware social-engineering ai-platforms
2r 1t
medium advisory

Microsoft Product Vulnerability CVE-2026-41526

CVE-2026-41526 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon patch release for exploitation details.

vulnerability microsoft
1c
medium advisory

Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)

CVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.

libssh denial-of-service CVE-2026-0967 defense-evasion
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application cve-2026-7550
2r 1t 1c
critical advisory

Totolink NR1800X Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.

NR1800X 9.1.0u.6279_B20210910 cve remote code execution buffer overflow router
2r 1t 1c
critical advisory

Totolink NR1800X Command Injection Vulnerability

A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.

NR1800X 9.1.0u.6279_B20210910 command-injection router network
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)

A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.

Chrome +1 use-after-free chromium edge cve-2026-7359
2r 1c
critical advisory

CVE-2026-7339: Heap Buffer Overflow in WebRTC

A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.

Chrome +1 webrtc heap-overflow code-execution cve-2026-7339
2r 1c
high advisory

Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)

CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.

Chrome +1 use-after-free chromium cve-2026-7355 browser
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)

CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium edge
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)

CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free vulnerability browser
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)

CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free browser chromium
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)

CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free edge cve-2026-7338 remote code execution
2r 1c
critical advisory

Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)

CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.

Chrome +1 heap overflow chromium cve-2026-7353
2r 2t 1c
high advisory

SourceCodester Advanced School Management System SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.

Advanced School Management System 1.0 sqli vulnerability web-application
2r 1t 1c
high advisory

Fujian Apex LiveBOS Path Traversal Vulnerability

A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.

LiveBOS path-traversal web-application cve-2026-7519
2r 1t 1c
critical advisory

Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials

Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.

pytorch-lightning supply-chain pypi credential-theft malware
2r 2t
high advisory

nextlevelbuilder GoClaw and GoClaw Lite Improper Authorization Vulnerability

nextlevelbuilder GoClaw and GoClaw Lite versions up to 3.8.5 are vulnerable to improper authorization in the RPC Handler component, potentially allowing remote attackers to bypass security controls.

GoClaw +1 improper-authorization rpc-handler
2r 1t 1c
critical advisory

HKUDS OpenHarness Remote Code Execution via /bridge Slash Command (CVE-2026-7551)

HKUDS OpenHarness contains a remote code execution vulnerability (CVE-2026-7551) in the /bridge slash command, allowing remote attackers to execute arbitrary operating system commands by injecting malicious commands via the /bridge spawn command, leading to unauthorized shell access and data exposure.

OpenHarness rce vulnerability injection
2r 1t 1c
critical advisory

IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)

IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.

Turbonomic Application Resource Management +1 privilege-escalation credential-access kubernetes vulnerability
2r 2t 1c
critical advisory

code-projects Plugin 4.1.2cu.5137 Buffer Overflow Vulnerability

A buffer overflow vulnerability (CVE-2026-7503) exists in code-projects Plugin 4.1.2cu.5137, allowing a remote attacker to execute arbitrary code by manipulating the 'wepkey2' argument in the 'setWiFiMultipleConfig' function of the '/lib/cste_modules/wireless.so' library, posing a critical risk due to publicly available exploits.

Plugin 4.1.2cu.5137 buffer-overflow remote-code-execution cve-2026-7503
2r 2t 1c
critical advisory

SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag

SSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.

SSCMS 7.4.0 sqli cve-2026-7435 web-application
2r 1t 1c
medium advisory

IBM Langflow Desktop Unauthenticated Image Access via IDOR

IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to an indirect object reference (IDOR) vulnerability (CVE-2026-4503), allowing unauthenticated users to view other users' images due to a user-controlled key.

Langflow Desktop idor vulnerability privilege-escalation
2r 1t 1c
high advisory

Kirby CMS Missing Authorization Vulnerability

A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.

cms +3 authorization web-application
2r 2t
high advisory

Contrast CLI CopyFile Policy Subversion via Symlinks Allows Guest Root Filesystem Writes

A vulnerability in the CopyFile verification of Kata agent policies generated by the Contrast CLI allows arbitrary writes to the guest root filesystem, potentially leading to a full guest takeover.

Contrast CLI +2 kata-containers container-security privilege-escalation
2r 2t
medium advisory

Sentry SAML SSO Improper Authentication Allows User Identity Linking

A critical vulnerability (CVE-2026-42354) exists in Sentry's SAML SSO implementation that allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance, affecting self-hosted users with multiple organizations configured if a malicious user has permissions to modify SSO settings, while Sentry SaaS was patched in April and self-hosted users are advised to upgrade to version 26.4.1 or higher.

sentry +1 authentication saml sso account takeover vulnerability
2r 1t
high advisory

Clerk Authorization Bypass Vulnerability

Clerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.

@clerk/shared +16 authorization bypass clerk cve-2026-42349
2r 1t
high advisory

GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)

A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.

GnuTLS cve denial-of-service information-disclosure
2r 3t 1c
high advisory

n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass

The n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.

n8n-mcp ssrf cwe-918
2r 1t
medium advisory

Hickory DNS Recursor Cache Poisoning via Sibling Zone Delegation

The experimental `hickory-recursor` crate in Hickory DNS is vulnerable to cross-zone cache poisoning due to storing DNS records keyed by record name/type instead of query, enabling an attacker to redirect queries for a victim zone to an attacker-controlled nameserver.

hickory-recursor +1 dns cache-poisoning zone-delegation
2r
high advisory

Jupyter Notebook Authentication Token Theft via CommandLinker XSS

A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.

@jupyter-notebook/help-extension +4 xss jupyter authentication account-takeover vulnerability
2r
high advisory

Gotenberg Unauthenticated SSRF Vulnerability

Gotenberg version 8.29.1 is vulnerable to Server-Side Request Forgery (SSRF) due to an unfiltered webhook URL, allowing unauthenticated attackers to force outbound HTTP POST requests to arbitrary destinations, enabling internal network probing and interaction with internal services.

Gotenberg ssrf cve-2026-39383
3r 1t
critical advisory

Synway SMG Gateway Management Software Unauthenticated OS Command Injection

Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.

SMG Gateway Management Software command-injection rce network
2r 1t 1c
high advisory

Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket

This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.

Auditbeat +1 privilege-escalation linux vulnerability cve-2026-31431
2r 2t 1c
medium advisory

MeWare PDKS Improper Control of Interaction Frequency Vulnerability (CVE-2026-7402)

MeWare PDKS versions V16.20200313 before VMYR_3.5.2025117 are vulnerable to improper control of interaction frequency, potentially leading to flooding attacks.

PDKS dos cve-2026-7402
1r 1c
high advisory

ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer

The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.

Microsoft Windows +2 clickfix malware social-engineering rat infostealer castleloader netsupport
2r 3t 1i
medium advisory

ABB System 800xA and Symphony Plus IEC 61850 Denial-of-Service Vulnerability

A vulnerability in ABB's IEC 61850 communication stack allows a remote attacker with access to the IEC 61850 network to cause a denial-of-service condition by sending a specially crafted packet, leading to device faults or communication driver crashes.

ABB System 800xA +5 ics denial-of-service industrial-control-system iec61850
2r 1t 1c
medium advisory

ABB PCM600 Path Traversal Vulnerability (CVE-2018-1002208)

A path traversal vulnerability in ABB PCM600 versions 1.5 to 2.13 (CVE-2018-1002208) allows a local attacker with low privileges to execute arbitrary code by sending a specially crafted message to the system node.

ABB PCM600 ics path traversal industrial control system
2r 1t 1c
critical advisory

ABB Edgenius Management Portal Authentication Bypass Vulnerability

An authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.

Edgenius Management Portal 3.2.0.0 +2 abb edgenius authentication bypass CVE-2025-10571 critical infrastructure
2r 1t 1c
high advisory

ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure

Multiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).

ABB AWIN Firmware +3 ics vulnerability industrial_control_systems
3r 1t 3c
critical advisory

ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.

ABB Ability Symphony Plus S+ Engineering 2.2 +7 vulnerability ics postgresql
2r 3t 3c
high advisory

ABB Ability OPTIMAX Authentication Bypass Vulnerability

CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.

OPTIMAX 6.1 +4 authentication bypass ics vulnerability
2r 1t 1c
critical advisory

Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution

Multiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.

FreeBSD OS vulnerability privilege-escalation code-execution
3r 3t
high advisory

Multiple Vulnerabilities in Absolute Secure Access

Multiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.

Secure Access vulnerability privilege-escalation denial-of-service information-disclosure
2r 3t 1c
high advisory

Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation

Multiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.

Cyber Protect Cloud Agent privilege-escalation acronis agent
2r 1t 2c
high advisory

Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath

A remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.

Fast Datapath redhat vulnerability denial-of-service
2r 4t
medium advisory

libsndfile Vulnerability Allows Denial of Service

A remote, unauthenticated attacker can exploit an unpatched vulnerability in libsndfile to cause a denial of service.

libsndfile denial-of-service vulnerability
2r 1t
critical advisory

Multiple Vulnerabilities in CUPS

Multiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.

CUPS vulnerability privilege-escalation execution denial-of-service
2r 4t 1c
high advisory

CUPS Vulnerability Allows Local Privilege Escalation

A local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.

CUPS privilege-escalation linux macos
2r 1t
high advisory

Sudo Privilege Escalation Vulnerabilities

Multiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.

sudo privilege-escalation linux
2r 1t 2c
critical advisory

GIMP Multiple Vulnerabilities Allow Remote Code Execution

A remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.

GIMP vulnerability rce
2r 1t 5c
high advisory

Multiple Vulnerabilities in Google Chrome

Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.

Chrome vulnerability code-execution defense-evasion information-disclosure denial-of-service
2r 5t 5c
high advisory

PackageKit Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.

PackageKit privilege-escalation linux
2r 1t
high advisory

Multiple Vulnerabilities in Xen and Citrix Systems XenServer

Multiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.

XenServer +1 vulnerability privilege-escalation denial-of-service information-disclosure
3r 7t
critical advisory

Multiple Vulnerabilities in Wazuh Allow for Code Execution and Data Manipulation

Multiple vulnerabilities in Wazuh allow an attacker to perform a denial of service attack, execute arbitrary code, manipulate data, disclose confidential information, or bypass security measures.

Wazuh vulnerability siem xdr
2r 6t 5c
medium advisory

DNSdist Multiple Vulnerabilities Leading to Denial of Service

Multiple vulnerabilities in DNSdist can be exploited by an attacker to perform a denial of service attack, impacting the availability of DNS services.

DNSdist denial-of-service vulnerability
2r 1t 1c
high advisory

OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)

CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.

path traversal cups cve-2026-34978 file write
2r 2t 1c
high advisory

CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access

CVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.

integer-underflow memory-corruption cve
2r 1c
medium advisory

CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability

CVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.

denial-of-service tls crypto/tls
2r 1t 1c
medium advisory

CVE-2026-28388 NULL Pointer Dereference in Delta CRL Processing

CVE-2026-28388 is a NULL Pointer Dereference vulnerability in an unspecified Microsoft product when processing a Delta CRL, potentially leading to a denial-of-service condition.

cve-2026-28388 denial-of-service certificate revocation list
2r 1c
info advisory

Microsoft Published Information on CVE-2026-32777

Microsoft has published information regarding CVE-2026-32777, but no further details regarding the vulnerability or its exploitation are currently available.

cve-2026-32777 vulnerability
1c
medium advisory

Microsoft Published Information on CVE-2026-32776

Microsoft published information regarding CVE-2026-32776, however, further details require JavaScript to be enabled, limiting the actionable intelligence at this time.

cve vulnerability
1c
medium advisory

Microsoft CVE-2026-32778 Vulnerability Published

Microsoft published information regarding vulnerability CVE-2026-32778, but no details regarding the vulnerability are available at this time.

cve vulnerability
2r 1c
medium advisory

CVE-2026-34073: Incomplete DNS Name Constraint Enforcement Vulnerability

CVE-2026-34073 is a vulnerability in unspecified Microsoft products due to incomplete DNS name constraint enforcement on peer names, potentially leading to certificate validation bypass.

certificate validation man-in-the-middle dns name constraint tls cve-2026-34073
2r 1c
critical advisory

CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption

CVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.

cve cryptography memory corruption aes-gcm
2r 1t 1c
critical advisory

Tenda 4G300 Stack-Based Buffer Overflow Vulnerability

A remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.

4G300 buffer-overflow tenda router cve-2026-7470
2r 2t 1c
medium advisory

1024-lab smart-admin Improper Access Control Vulnerability (CVE-2026-7468)

CVE-2026-7468 is an improper access control vulnerability in 1024-lab smart-admin up to version 3.30.0, affecting the /smart-admin-api/druid/index.html file, which can be exploited remotely.

smart-admin access-control vulnerability web-application
2r 1t 1c
high advisory

VetCoders mcp-server-semgrep OS Command Injection Vulnerability

VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.

mcp-server-semgrep 1.0.0 command-injection vulnerability mcp-server-semgrep
2r 1t 1c
medium advisory

Netgate pfSense XSS Vulnerability

A cross-site scripting (XSS) vulnerability affects Netgate pfSense CE (<= 2.8.1) and pfSense Plus (<= 26.03), potentially allowing attackers to inject malicious code.

pfSense CE +1 xss vulnerability pfSense
2r
high advisory

Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service

Multiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.

Wireshark 4.4.x +1 wireshark vulnerability rce dos
2r
medium advisory

Multiple Vulnerabilities in SonicWall Products Allow for DoS and Security Policy Bypass

Multiple vulnerabilities in SonicWall firewalls could allow an attacker to cause a remote denial of service and security policy bypass, potentially disrupting network services and compromising security controls.

SOHOW +65 sonicwall firewall dos security_bypass
2r 2t 3c
critical advisory

Multiple Vulnerabilities in Red Hat Linux Kernel

Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.

Red Hat CodeReady Linux Builder +1 vulnerability kernel redhat execution privilege-escalation denial-of-service
2r 3t 5c
high advisory

Multiple Vulnerabilities in MISP Threat Intelligence Platform

Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.

MISP < 2.5.37 misp vulnerability sqli privilege-escalation security-policy-bypass
2r 1t
high advisory

Multiple Vulnerabilities in Exim Mail Transfer Agent

Multiple vulnerabilities in Exim versions prior to 4.99.2 allow an attacker to cause a remote denial of service, a breach of data confidentiality, and an unspecified security problem.

Exim vulnerability denial-of-service information-disclosure
3r 3t
high advisory

Komari Agent Abused as SYSTEM-Level Backdoor

Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.

Defender +2 komari backdoor nssm github rat reverse shell
2r 4t 2i
critical advisory

UTT HiPER 1250GW Buffer Overflow Vulnerability (CVE-2026-7420)

A buffer overflow vulnerability in UTT HiPER 1250GW devices (versions up to 3.2.7-210907-180535) allows remote attackers to execute arbitrary code by manipulating the 'Profile' argument in the `strcpy` function of the `route/goform/ConfigAdvideo` file, due to insufficient bounds checking.

HiPER 1250GW buffer-overflow remote-code-execution iot
2r 1t 1c
critical advisory

UTT HiPER 1250GW Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in the UTT HiPER 1250GW device due to improper handling of the 'Profile' argument in the NTP configuration, potentially allowing for arbitrary code execution.

HiPER 1250GW buffer-overflow remote-code-execution cve-2026-7418
2r 1t 1c
critical advisory

PolarVista xcode-mcp-server OS Command Injection Vulnerability

PolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.

xcode-mcp-server 1.0.0 command-injection vulnerability xcode-mcp-server
2r 1t 1c
medium advisory

Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests

Admidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.

admidio saml signature-bypass authentication authorization web-application
2r 5t
critical advisory

n8n XML Node Prototype Pollution Leading to RCE

A vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.

n8n rce prototype pollution
3r 1t
high advisory

n8n MCP OAuth Client XSS Vulnerability

n8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.

n8n xss oauth CVE-2026-42235
2r 1t
critical advisory

n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE

A prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.

n8n prototype-pollution rce
2r 1t
high advisory

n8n Python Task Runner Sandbox Escape Vulnerability

A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.

n8n sandbox-escape code-execution vulnerability
2r 2t
high advisory

Relative Path Traversal Vulnerability in mcpo-simple-server

A relative path traversal vulnerability exists in getsimpletool mcpo-simple-server <= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.

mcpo-simple-server path-traversal web-application cve-2026-7404
2r 1t 1c
critical advisory

Hyperledger Fabric SDK Java Deserialization RCE

The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.

fabric-sdk-java deserialization rce java
2r 1t
critical advisory

Cockpit CMS Authenticated Remote Code Execution via Code Injection

Cockpit CMS is vulnerable to authenticated remote code execution via PHP code injection in the /cockpit/collections/save_collection endpoint, enabling attackers with collection management privileges to execute arbitrary commands on the server.

Cockpit CMS rce code-injection cockpit-cms
2r 1t 1c
critical advisory

Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)

Tenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.

W308R v2 cve-2018-25316 dns-hijacking tenda cookie-injection
2r 1t 1c
critical advisory

Tenda Router DNS Hijacking via Cookie Session Weakness

Tenda W3002R/A302/W309R routers with firmware V5.07.64_en are vulnerable to unauthenticated DNS hijacking, where attackers exploit a cookie session weakness to modify DNS settings via crafted GET requests.

W3002R/A302/W309R wireless routers cve-2018-25317 dns-hijacking router-vulnerability
2r 1t 1c
high advisory

Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)

Alloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.

Video joiner 4.6.1217 buffer-overflow code-execution cve-2018-25315 windows
2r 1t 1c
high advisory

Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)

Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.

WMV to AVI MPEG DVD WMV Converter 4.6.1217 buffer-overflow code-execution cve-2018-25314
2r 1t 1c
high advisory

SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)

SysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.

SysGauge Pro 4.6.12 vulnerability buffer_overflow privilege_escalation
2r 2t 1c
high advisory

BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion

CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.

BuddyPress Xprofile Custom Fields Type rce file-deletion wordpress
2r 1t 1c
high advisory

XATABoost CMS 1.0.0 SQL Injection Vulnerability

XATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.

xataboost cms 1.0.0 sql-injection web-application cve
2r 1t 1c
high advisory

Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)

Prime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.

Prime95 buffer-overflow code-execution cve-2018-25299
2r 1t 1c
critical advisory

Free Download Manager 2.0 Built 417 Local Buffer Overflow Vulnerability

Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation, leading to arbitrary code execution.

Free Download Manager 2.0 buffer-overflow seh-overwrite code-execution cve-2018-25304
2r 1t 1c
high advisory

Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow

Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.

Easy MPEG to DVD Burner 1.7.11 buffer overflow seh overflow cve-2018-25301
2r 1t 1c
high advisory

Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)

Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.

Allok Video to DVD Burner 2.6.1217 cve buffer overflow seh overwrite
2r 1t 1c
high advisory

Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability

Allok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.

Allok AVI to DVD SVCD VCD Converter 4.0.1217 buffer-overflow seh cve-2018-25302
1r 1t 1c
critical advisory

AgentFlow Arbitrary Code Execution via Pipeline Path Manipulation (CVE-2026-7466)

AgentFlow is vulnerable to arbitrary code execution (CVE-2026-7466) by manipulating the `pipeline_path` parameter in POST requests to `/api/runs` and `/api/runs/validate`, allowing attackers to execute arbitrary Python code.

AgentFlow cve-2026-7466 rce code-injection
2r 1t 1c
high advisory

Path Traversal Vulnerability in mail-mcp-bridge

A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.

mail-mcp-bridge path-traversal vulnerability web-application
2r 1t 1c
high advisory

EyouCMS SQL Injection Vulnerability (CVE-2026-7389)

A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.

EyouCMS sql-injection cve-2026-7389 web-application
2r 1t 1c
critical advisory

cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)

An authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.

WHM +1 cpanel authentication-bypass CVE-2026-41940 webserver
2r 1t 1c
medium advisory

OpenClaw Webhook Replay Vulnerability (CVE-2026-41395)

OpenClaw before 2026.3.28 is vulnerable to webhook replay attacks due to improper signature verification, allowing attackers to reorder query parameters and trigger duplicate voice-call processing.

OpenClaw webhook replay-attack plivo
2r 1t 1c
high advisory

OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.

OpenClaw vulnerability privilege-escalation execution
2r 1t 1c
high advisory

OpenClaw Security Bypass Vulnerability Allows Persistent Browser Profile Mutation

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows attackers to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.

openclaw security-bypass browser-automation profile-mutation
2r 1t 1c
high advisory

OpenClaw Role Bypass Vulnerability in device.token.rotate Function

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function, allowing attackers to mint tokens for unapproved roles and bypass intended approval processes.

OpenClaw role-bypass privilege-escalation cve-2026-42422
2r 1t 1c
high advisory

OpenClaw QQ Bot Media Download SSRF Vulnerability

OpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.

OpenClaw ssrf cve-2026-41914
2r 2t 1c
high advisory

OpenClaw Privilege Escalation via Trusted Proxy Authentication (CVE-2026-41404)

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation by declaring operator scopes on non-Control-UI clients.

OpenClaw privilege-escalation authentication cve-2026-41404
2r 1t 1c
high advisory

OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)

OpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.

OpenClaw vulnerability plugin integrity CVE-2026-42428
2r 1t 1c
medium advisory

OpenClaw MS Teams Webhook Resource Exhaustion Vulnerability

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to exhaust server resources by sending malicious Teams webhook payloads.

OpenClaw resource-exhaustion webhook cve-2026-41405
1r 1c
high advisory

OpenClaw Incomplete Host Environment Variable Sanitization Vulnerability (CVE-2026-41387)

OpenClaw before 2026.3.22 is vulnerable to incomplete host environment variable sanitization, allowing attackers to redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content.

OpenClaw vulnerability supply-chain environment-variable
2r 1t 1c
high advisory

OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)

OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.

OpenClaw cve-2026-41380 execution-approval-bypass privilege-escalation defense-evasion
2r 3t 1c
high advisory

OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)

OpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.

OpenClaw environment-variable-injection code-execution cve-2026-41384
2r 1t 1c
high advisory

OpenClaw Arbitrary Directory Deletion Vulnerability

OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.

OpenClaw cve-2026-41383 directory-traversal file-deletion
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE

Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.

Spring Boot spring-boot vulnerability rce authentication-bypass session-hijacking
2r 3t 3c
high advisory

Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)

A path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.

spire-pdf-mcp-server path-traversal web-application cve
2r 1t 1c
high advisory

eiceblue spire-doc-mcp-server Path Traversal Vulnerability

A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.

spire-doc-mcp-server 1.0.0 path-traversal web-application cve-2026-7314
2r 1t 1c
high advisory

Multiple Vulnerabilities in cURL

Multiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.

cURL vulnerability
2r 3t 4c
medium advisory

AI-Powered Honeypots: Deceptive Environments for Automated Threat Actors

Generative AI can be used to rapidly deploy adaptive honeypot systems that simulate diverse environments, like Linux shells or IoT devices, to trick and observe AI-driven attacks that prioritize speed over stealth.

honeypot ai deception threat-intelligence
2r 3t 1c
medium advisory

Multiple Vulnerabilities in GNU libc

A remote, anonymous attacker can exploit multiple vulnerabilities in GNU libc to execute arbitrary program code, cause a denial-of-service condition, or disclose sensitive information.

libc vulnerability glibc denial-of-service code-execution
2r 3t 5c
high advisory

Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS

Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Enterprise Linux vulnerability code-execution denial-of-service linux
2r 2t
high advisory

ProFTPD SQL Injection Vulnerability

An anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.

ProFTPD sqli linux
2r 1t
medium advisory

CVE-2025-68146 filelock TOCTOU Race Condition Enables Symlink Attacks

CVE-2025-68146 describes a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the filelock library that could allow for symlink attacks during lock file creation, potentially leading to unauthorized file access or modification.

TOCTOU symlink filelock CVE-2025-68146 race condition
2r 1c
medium advisory

rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)

CVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.

rust-openssl memory-leak tls cve
2r 1c
medium advisory

OpenTelemetry-Go Multi-Value Baggage Header Extraction DoS Vulnerability (CVE-2026-29181)

A vulnerability in OpenTelemetry-Go related to the extraction of multi-value baggage headers can lead to excessive resource allocation, resulting in a remote denial-of-service amplification.

OpenTelemetry-Go dos opentelemetry cve-2026-29181
2r 1t 1c
medium advisory

CoreDNS DoQ Server Denial-of-Service Vulnerability

CoreDNS' DNS-over-QUIC (DoQ) server can be driven into large goroutine and memory growth by a remote client that opens many QUIC streams and stalls after sending only 1 byte, leading to denial of service in versions before 1.14.3.

coredns dos denial-of-service vulnerability
2r 3t 1c
high advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-42432)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability that allows previously paired nodes to reconnect and execute privileged commands without proper authorization, potentially leading to complete system compromise.

OpenClaw privilege-escalation cve-2026-42432
2r 1t 1c
high advisory

OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.

OpenClaw privilege-escalation vulnerability
2r 1t 1c
medium advisory

OpenClaw Unauthenticated WebSocket Denial-of-Service Vulnerability

OpenClaw before 2026.3.28 is vulnerable to a denial-of-service attack by accepting unbounded concurrent unauthenticated WebSocket upgrades, allowing attackers to exhaust server resources.

OpenClaw denial-of-service websocket cve
2r 1t 1c
high advisory

OpenClaw Exec Allowlist Bypass Vulnerability (CVE-2026-41390)

OpenClaw before version 2026.3.28 contains an exec allowlist bypass vulnerability (CVE-2026-41390) that allows attackers to persist trust for wrapper binaries like /usr/bin/script to execute different underlying programs, potentially leading to privilege escalation.

OpenClaw allowlist bypass privilege escalation cve-2026-41390
2r 2t 1c
critical advisory

LLM-Based Compromised User Triage

This rule correlates multiple security alerts involving the same user, analyzes them with an LLM, and flags potentially compromised accounts based on MITRE tactics, geographic anomalies, and multi-host activity, helping analysts prioritize users exhibiting indicators of credential theft or unauthorized access.

Elastic Cloud Domain: Identity Domain: LLM Use Case: Threat Detection Use Case: Identity and Access Audit Resources: Investigation Guide Rule Type: Higher-Order Rule
2r 2t
critical advisory

D-Link DIR-825M Remote Buffer Overflow Vulnerability

D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.

DIR-825M buffer-overflow router dlink cve
2r 1t 1c
critical advisory

Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig

A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.

HG3 cve-2026-7151 buffer-overflow tenda router
2r 2t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7130
2r 1t 1c
high advisory

mkdocs-mcp-plugin Path Traversal Vulnerability

A path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.

mkdocs-mcp-plugin path-traversal mkdocs CVE-2026-7159
2r 1t 1c
medium advisory

ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.

NextChat ssrf cve-2026-7177 web-application
2r 1t 1c
high advisory

AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)

A DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.

AVACAST dll-hijacking privilege-escalation code-execution
2r 1t 1c
medium advisory

Detection of Github Delete Actions in Audit Logs

This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.

Github audit data-loss impact
2r 1t
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

Totolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.

A8000RU cve-2026-7241 command-injection router
2r 1t 1c
critical advisory

D-Link DI-8100 Remote Buffer Overflow Vulnerability

A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.

DI-8100 cve-2026-7248 buffer-overflow d-link router
2r 1t 1c
critical advisory

Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)

A critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.

A8000RU command injection router vulnerability cve-2026-7244
3r 1t 1c
critical advisory

VMware Tanzu Spring Boot Multiple Vulnerabilities

Multiple vulnerabilities in VMware Tanzu Spring Boot allow attackers to execute arbitrary code, bypass security measures, manipulate or disclose sensitive data, or hijack authenticated users.

Tanzu Spring Boot vmware spring-boot vulnerability
2r 4t
critical advisory

Multiple Vulnerabilities in Atlassian Products

Multiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, and Jira allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.

Bamboo +3 atlassian vulnerability code-execution xss
2r 4t 1c
critical advisory

Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)

CVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.

A8000RU 7.1cu.643_b20200521 cve-2026-7240 command-injection totolink router cgi
2r 1t 1c
high advisory

AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)

A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.

scaffold-mcp path-traversal cve web-application
2r 1t 1c
high advisory

BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)

A path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.

browser-operator-core path-traversal web-application cve-2026-7234
2r 1t 1c
high advisory

Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)

A remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.

N300RT buffer-overflow iot router cve-2026-7219
2r 1t 1c
high advisory

Path Traversal Vulnerability in engineer-your-data

A path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.

engineer-your-data path-traversal vulnerability
2r 1t 1c
high advisory

edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)

A path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.

notes-mcp path-traversal web-application CVE-2026-7212
2r 1t 1c
high advisory

Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)

A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.

papers-mcp-server path-traversal vulnerability web-application
2r 1t 1c
medium advisory

Google Workspace Login Attempt with Government Attack Warning

A Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.

Google Workspace googleworkspace intrusion initial-access persistence privilege-escalation
2r 1t
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)

A SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.

Pharmacy Sales and Inventory System 1.0 sql-injection cve-2026-7199 web-application
2r 1t 1c
high advisory

OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.

OpenClaw symlink file-write sandbox-escape
2r 1t 1c
medium advisory

Linux Persistence via Sudoers.d File Manipulation

Attackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.

persistence privilege-escalation linux sudoers
3r 2t
critical advisory

Tenda HG3 2.0 Command Injection Vulnerability

Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.

HG3 2.0 command-injection cve-2026-7160 tenda
2r 1t 1c
critical advisory

Apache MINA Arbitrary Code Execution Vulnerability

A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.

MINA 2.0 +2 apache-mina rce deserialization cve-2026-41635
2r 1t 1c
high advisory

Online Lot Reservation System SQL Injection Vulnerability

CVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.

Online Lot Reservation System sql-injection web-application cve
2r 1t 1c 1i
high advisory

tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)

A command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.

ssh-mcp command-injection vulnerability
2r 1t 1c
critical advisory

Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)

A buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.

F456 cve-2026-7101 buffer-overflow router tenda remote-code-execution
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7088
2r 1t 1c
critical advisory

Tenda F456 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 in the `fromGstDhcpSetSer` function, allowing remote attackers to execute arbitrary code by manipulating the 'dips' argument via a crafted HTTP request to `/goform/GstDhcpSetSer`.

F456 cve buffer_overflow router
2r 1t 1c
high advisory

itsourcecode Construction Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.

Construction Management System 1.0 sql-injection web-application cve-2026-7075
2r 1t 1c
high advisory

CodePanda Source canteen_management_system SQL Injection Vulnerability

A SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.

canteen_management_system 1.0 sql-injection cve-2026-7072 web-application
1r 1t 1c
high advisory

SQL Injection Vulnerability in code-projects Inventory Management System 1.0

A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.

Inventory Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

D-Link DIR-822 A_101 Command Injection via DHCP Hostname

A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.

DIR-822 A_101 command-injection dhcp iot
2r 1t 1c
high advisory

code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)

CVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.

Employee Management System 1.0 sqli cve-2026-7063 web-application
2r 1t 1c
high advisory

Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability

Toowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.

chatgpt-mcp-server cve-2026-7061 command-injection webserver
2r 1t 1c
high advisory

KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)

KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.

SocialMediaWebsite sql-injection vulnerability web-application
2r 1t 1c
high advisory

Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)

CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.

i9 cve-2026-7036 path-traversal tenda network
2r 1t 1c
critical advisory

Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)

CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.

MR9600 cve-2026-6992 command-injection router rce
2r 2t 1c
high advisory

Cilium `cilium-bugtool` WireGuard Private Key Exposure

The `cilium-bugtool` debugging tool in Cilium exposes WireGuard private keys, potentially allowing unauthorized access to encrypted node-to-node communication in affected versions.

Cilium wireguard key-disclosure credential-access
2r 1t 1i
critical advisory

Tenda F456 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.

F456 1.0.0.5 buffer-overflow remote-code-execution cve-2026-7033 router
2r 1t 1c
medium advisory

Typecho <= 1.3.0 Server-Side Request Forgery Vulnerability (CVE-2026-7025)

A server-side request forgery (SSRF) vulnerability exists in Typecho up to version 1.3.0, allowing remote attackers to manipulate the X-Pingback/link argument in the Service::sendPingHandle function to potentially make arbitrary HTTP requests.

Typecho ssrf cve-2026-7025
2r 1t 1c
medium advisory

CVE-2026-31622 NFC-A Cascade Depth Bounds Check Failure

CVE-2026-31622 describes a vulnerability related to an NFC bounds check issue, specifically a failure to properly validate NFC-A cascade depth in the SDD response handler within Microsoft products, potentially leading to unexpected behavior or security compromise.

nfc bounds-check-failure cve-2026-31622
2r 1t 1c
medium advisory

CVE-2026-23398 ICMP NULL Pointer Dereference

CVE-2026-23398 is a vulnerability related to a NULL pointer dereference in the ICMP protocol, potentially leading to a denial-of-service condition in affected Microsoft products.

icmp denial-of-service vulnerability cve
2r 1t 1c
high advisory

SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)

A remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.

sre authentication-bypass CVE-2026-7022
2r 1t 1c
critical advisory

Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability

A buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.

HG10 HG7_HG9_HG10re_300001138_en_xpon buffer-overflow cve-2026-6988 tenda iot
2r 1t 1c
high advisory

PicoClaw Web Launcher Management Plane Command Injection Vulnerability

PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.

PicoClaw command-injection vulnerability web-application
2r 1t 1c
critical advisory

ERB Deserialization Bypass via def_module/def_method/def_class

A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.

ERB deserialization rce ruby rails
2r 2t 1c
high advisory

Claude Code Trust Dialog Bypass via Git Worktree Spoofing

A vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.

Claude Code git code-execution trust-bypass
2r 1t
medium advisory

vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)

An improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.

vanna vulnerability authorization web application
2r 1t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-41080

CVE-2026-41080 is a vulnerability affecting a Microsoft product; the specific product, impact, and exploitation details are currently undisclosed.

CVE-2026-41080 vulnerability microsoft
2r 1c
high advisory

Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026

In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.

Azure Active Directory oauth device-code phishing initial-access
2r 1t
critical advisory

Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses

Gemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.

Gemini CLI +1 rce supply-chain github-actions
2r 1t
high advisory

k8sGPT Operator Vulnerable to Prompt Injection

k8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.

k8sgpt prompt-injection kubernetes ai vulnerability
2r 2t
critical advisory

BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2

BridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.

FileStore +1 rce cve-2026-39920 apache axis2 default credentials web service
2r 2t 1c
critical advisory

Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization

Ray Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.

Ray Data remote-code-execution parquet deserialization cloudpickle ray
2r 1t
critical advisory

Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud

A vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.

Stripe Webhook stripe webhook signature-bypass quota-fraud
2r 1t
high advisory

OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)

A remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.

OVN cve vulnerability network
2r 1t 1c
high advisory

OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)

OpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.

OpenShell cve rce
2r 2t 1c
critical advisory

OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)

OpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.

OpenClaw rce vulnerability cve-2026-41352
2r 1t 1c
medium advisory

OpenClaw Cross-Site Request Forgery Vulnerability

OpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.

OpenClaw csrf web-application vulnerability
2r 1t 1c
high advisory

OpenClaw Arbitrary Code Execution via Environment Variable Override (CVE-2026-41336)

OpenClaw before 2026.3.31 allows attackers to execute arbitrary code by overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable using a workspace .env file, enabling the loading of attacker-controlled hook code.

OpenClaw cve code-execution environment-variable-override
2r 1t 1c
critical advisory

Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)

CVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.

Marimo CVE-2026-39987 rce vulnerability
2r 1t 1c
critical advisory

Apache ActiveMQ Vulnerabilities Allow RCE and XSS

An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.

ActiveMQ rce xss apache
2r 1t 5c
high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
critical advisory

PhantomRPC: Windows RPC Privilege Escalation Vulnerability

A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.

Windows privilege-escalation rpc
2r 1t
critical advisory

Flowise Multiple Vulnerabilities

Multiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.

Flowise vulnerability code-execution information-disclosure file-manipulation
2r 3t 5c
critical advisory

Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution

Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.

ASA +4 cisco vulnerability rce authentication-bypass
2r 4t 3c
high advisory

D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability

D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.

DWM-222W USB Wi-Fi Adapter brute-force credential-access network-device
2r 1c
medium advisory

Argo Workflows Controller Denial-of-Service via Malformed Pod Annotation

A malformed `workflows.argoproj.io/pod-gc-strategy` annotation in an Argo Workflow pod can trigger an unchecked array index in the `podGCFromPod()` function, leading to a controller-wide panic and denial-of-service.

Argo Workflows argo-workflows denial-of-service kubernetes
2r 2t
high advisory

Kirby CMS Server-Side Template Injection via Double Template Resolution

A server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.

cms ssti kirby template-injection
2r 1t
high advisory

Radare2 Path Traversal Vulnerability in Project Deletion

Radare2 versions prior to 6.1.4 are vulnerable to a path traversal in project deletion, allowing local attackers to recursively delete arbitrary directories by escaping the 'dir.projects' root, leading to integrity and availability loss.

radare2 path-traversal local-privilege-escalation
2r 1t 1c
high advisory

CanisterSprawl: Self-Propagating npm Malware Campaign

The CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.

npm packages supply-chain malware npm
2r 6t
critical advisory

OpenC3 COSMOS SQL Injection Vulnerability in QuestDB Time-Series Database

A SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS, allowing an authenticated remote user to execute arbitrary SQL commands, including telemetry data disclosure and deletion.

OpenC3 sql-injection cosmos questdb telemetry
2r 3t
medium advisory

xmldom Uncontrolled Recursion DoS Vulnerability

The xmldom library is vulnerable to a denial-of-service (DoS) attack due to uncontrolled recursion in XML serialization leading to application crashes.

xmldom dos recursion javascript
2r 1t
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload

Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.

Online Toolkits cve-2026-34415 rce file-upload web-application
2r 3t 1c
high advisory

rust-openssl Unchecked Callback Length Memory Leak

The rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.

openssl rust memory leak buffer overflow
2r
critical advisory

Rclone Unauthenticated options/set Allows Runtime Auth Bypass

Rclone is vulnerable to an unauthenticated options/set vulnerability that allows runtime authentication bypass, potentially leading to sensitive operations and command execution by setting `rc.NoAuth=true` on reachable RC servers started without global HTTP authentication.

rclone auth-bypass rc-api CVE-2026-41176 command-execution
2r 3t
critical advisory

Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers

A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.

DIR-823X +1 mirai ddos rce iot
2r 4t 2c
high advisory

Daptin SQL Injection Vulnerability in Aggregate API

A SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.

Daptin sql-injection web-application
2r 1t
medium advisory

Cisco Integrated Management Controller (IMC) Multiple XSS Vulnerabilities

Multiple cross-site scripting (XSS) vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct an XSS attack against a user of the interface.

Integrated Management Controller xss cisco cimc vulnerability
2r 1t 5c
critical advisory

Multiple Vulnerabilities in n8n Workflow Automation Tool

Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.

n8n vulnerability sqli xss rce session-hijacking
3r 5t 1c
critical advisory

Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)

An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

SPM 2007 file-upload web-shell code-execution
2r 1t 1c
high advisory

WeKan Missing Authorization Vulnerability in Integration REST API

WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.

WeKan missing-authorization rest-api privilege-escalation
2r 1t 1c 4i
medium advisory

Microsoft Product Vulnerability CVE-2026-22005

CVE-2026-22005 is a newly published vulnerability affecting a Microsoft product, requiring further investigation to determine the specific product, attack vector, and potential impact.

CVE-2026-22005 vulnerability microsoft
3r 1c
medium advisory

Microsoft Discloses Information Regarding CVE-2026-22004

Microsoft has released information regarding the vulnerability CVE-2026-22004, but details about the vulnerability and its exploitation are currently unavailable.

cve-2026-22004 vulnerability microsoft
1r 1t 1c
low advisory

Microsoft CVE-2026-35236 Information Published

Microsoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.

cve vulnerability microsoft
2r
high advisory

CVE-2026-31478 Vulnerability in Microsoft ksmbd

CVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.

ksmbd cve smb memory-corruption
2r 3t 1c
medium advisory

CVE-2026-34303 Affecting Microsoft Products

CVE-2026-34303 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon disclosure of details.

vulnerability cve microsoft
2r 1c
high advisory

CVE-2026-31507 Double-Free Vulnerability in net/smc

CVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.

cve-2026-31507 double-free memory corruption denial of service
2r 2t 1c
medium advisory

IBM WebSphere Liberty Identity Spoofing Vulnerability (CVE-2026-3621)

IBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.4 are susceptible to identity spoofing when applications are deployed without proper authentication and authorization configurations, potentially leading to unauthorized access and privilege escalation.

WebSphere Application Server - Liberty cve-2026-3621 websphere identity spoofing cwe-269
2r 1t 1c
critical advisory

IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution

An unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.

Total Storage Service Console +1 cve-2026-5935 rce command injection
2r 1t 1c
high advisory

SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint

SiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.

siyuan path-traversal web-application
2r 1t 1c 1i
high advisory

Entra ID Excessive Account Lockouts Detected

A high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.

Entra ID azure entra_id credential_access brute_force
2r 3t
high advisory

AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure

Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.

AWS IAM +1 cloud aws github credential-theft initial-access lateral-movement
2r 2t
critical advisory

CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE

The CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.

ci4-cms-erp/ci4ms zip-slip rce code-injection vulnerability
2r 2t
medium advisory

Suspicious Processes Connecting to Large Language Model Endpoints

This rule detects DNS queries to known Large Language Model (LLM) domains by unsigned binaries or common Windows scripting utilities, indicating potential command and control activity leveraging LLMs for dynamic actions on compromised systems.

command_and_control malware llm
3r 1t
high advisory

GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence

This brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.

credential-access genai file-access persistence
2r 4t
high advisory

LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability

LanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.

LanSpy buffer-overflow code-execution cve-2018-25268
1r 1t 1c
critical advisory

Critical RCE Vulnerabilities in Spinnaker

Critical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.

Spinnaker rce vulnerability
2r 1t 2c
critical advisory

OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode

A critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.

openvpn-auth-oauth2 openvpn authentication-bypass vpn
2r 1t
critical advisory

InstructLab Arbitrary Code Execution via Malicious HuggingFace Model

InstructLab is vulnerable to arbitrary code execution because the `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace, allowing remote attackers to execute code by convincing a user to load a malicious model.

InstructLab cve code-execution huggingface
2r 1t 1c
high advisory

InstructLab Path Traversal Vulnerability (CVE-2026-6855)

A local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.

path-traversal instructlab cve-2026-6855
2r 1t 1c
high advisory

WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)

WWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.

path traversal cve-2026-41058 avideo webserver
2r 3t 1c
high advisory

WWBN AVideo SSRF Vulnerability (CVE-2026-41055)

WWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.

ssrf avideo cve-2026-41055
2r 1t 1c 1i
high advisory

Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL

The Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.

tekton git credential-access api-token
2r 1t 1c
high advisory

Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)

Tekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.

tekton credential-access cve-2026-40161
2r 1t 1c 4i
high advisory

Oracle Java SE, GraalVM Networking Component Denial-of-Service Vulnerability (CVE-2026-34282)

CVE-2026-34282 is a remotely exploitable vulnerability in the Networking component of Oracle Java SE and GraalVM that allows an unauthenticated attacker to cause a complete denial of service.

CVE-2026-34282 java graalvm dos denial-of-service
2r 1t 1c
high advisory

NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)

A heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.

ntfs-3g heap-overflow privilege-escalation linux
2r 1t 1c
high advisory

NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)

NestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.

denial-of-service nestjs recursion cve-2026-40879 linux
2r 1t 1c
critical advisory

Lotus Data Wiper Targeting Venezuelan Energy and Utility Firms

The Lotus wiper, a previously undocumented data-wiping malware, was deployed against Venezuelan energy and utilities organizations in 2025, overwriting physical drives, deleting files, and rendering systems unrecoverable.

data-wiper lotus-wiper venezuela energy utilities
3r 1t
high advisory

HKUDS OpenHarness Insecure Default Configuration Vulnerability

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.

vulnerability insecure-configuration access-control
2r 1t 1c
high advisory

Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)

Hermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.

cve-2026-6832 path-traversal file-deletion webui
2r 1t 1c
high advisory

goshs GitHub Token Leakage via ArtiPACKED Vulnerability (CVE-2026-40903)

The goshs SimpleHTTPServer prior to version 2.0.0-beta.6 is vulnerable to ArtiPACKED, potentially leading to leakage of the GITHUB_TOKEN through workflow artifacts.

cve-2026-40903 github_token credential-access artipacked
2r 1t 1c
medium advisory

FreeScout Privilege Escalation via Email Address Reassignment (CVE-2026-40589)

FreeScout versions before 1.8.214 are vulnerable to privilege escalation, allowing a low-privileged agent to reassign email addresses from hidden customers to visible customers, leading to information disclosure and unauthorized access to conversations.

privilege-escalation cve-2026-40589 freescout
2r 1t 1c 1i
high advisory

FreeScout Mass Assignment Vulnerability (CVE-2026-40569)

FreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.

freescout mass-assignment vulnerability email-exfiltration
2r 2t 1c
medium advisory

FreeScout Incorrect Authorization Vulnerability via Save Draft

FreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.

cve authorization web application
2r 1t 1c 4i
medium advisory

FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)

FreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.

freescout authorization vulnerability
2r 1t 1c 4i
high advisory

Fortra GoAnywhere MFT SSH Key Brute-Force Vulnerability (CVE-2025-14362)

Fortra's GoAnywhere MFT prior to 7.10.0 is vulnerable to brute-force attacks on SSH keys because the login limit is not enforced on the SFTP service when Web Users are configured to log in with an SSH Key.

goanywhere mft bruteforce ssh
2r 1t 1c
critical advisory

ElectricSQL /v1/shape API SQL Injection Vulnerability

The ElectricSQL sync engine is vulnerable to SQL injection, potentially allowing authenticated users to read, write, and destroy the underlying PostgreSQL database.

sql-injection electricsql postgresql
2r 1t 1c
critical advisory

CrowdStrike LogScale Unauthenticated Path Traversal Vulnerability (CVE-2026-40050)

A critical unauthenticated path traversal vulnerability (CVE-2026-40050) in CrowdStrike LogScale allows remote attackers to read arbitrary files from the server filesystem if a specific cluster API endpoint is exposed, necessitating immediate patching for self-hosted customers.

path-traversal vulnerability logscale crowdstrike
2r 1t 1c
critical advisory

ASP.NET Core Improper Signature Verification Vulnerability (CVE-2026-40372)

CVE-2026-40372 is a critical vulnerability in ASP.NET Core stemming from improper cryptographic signature verification, potentially enabling unauthorized attackers to achieve network-based privilege escalation.

aspnet privilege-escalation cve-2026-40372 signature-bypass
2r 1t 1c
critical advisory

WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)

The Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.

wordpress authorization-bypass plugin-vulnerability cve-2026-4119
2r 3t 1c
high advisory

Binutils XCOFF Heap-Based Buffer Overflow Vulnerability (CVE-2026-6846)

A heap-buffer-overflow vulnerability exists in binutils when processing a specially crafted XCOFF object file, potentially leading to arbitrary code execution or denial of service.

binutils heap-buffer-overflow CVE-2026-6846 xcoff
2r 4t 1c 1i
critical advisory

WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)

The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.

wordpress rce plugin cve-2026-4132
2r 1t 1c
critical advisory

Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)

An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.

cve-2026-6023 telerik deserialization rce webserver
2r 1t 1c
high advisory

Telerik UI for AJAX RadAsyncUpload Uncontrolled Resource Consumption (CVE-2026-6022)

A vulnerability exists in Progress Telerik UI for AJAX prior to 2026.1.421, RadAsyncUpload, due to missing cumulative size enforcement during chunk reassembly, which allows file uploads to exceed the configured maximum size, leading to disk space exhaustion.

cve-2026-6022 telerik resource-exhaustion
2r 1t 1c
medium advisory

util-linux Vulnerability Allows DoS and Information Disclosure

A local attacker can exploit a vulnerability in util-linux to perform a denial of service attack and disclose sensitive information.

util-linux denial-of-service information-disclosure linux
2r 2t
medium advisory

BigBlueButton Vulnerabilities Allow Data Manipulation and Redirects

Multiple vulnerabilities in BigBlueButton can be exploited by an attacker to manipulate data and redirect users to attacker-controlled domains.

bigbluebutton vulnerability datamanipulation redirect
2r 1t
high advisory

Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection

Multiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.

openbao vulnerability sql-injection dos
3r 3t
high advisory

pyLoad Privilege Escalation Vulnerability (CVE-2026-41133)

pyLoad versions up to 0.5.0b3.dev97 cache user roles and permissions in the session, leading to privilege escalation even after an admin revokes privileges.

pyLoad privilege-escalation CVE-2026-41133
2r 1t 1c
critical advisory

WWBN AVideo Unauthenticated Remote Code Execution via test.php

WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.

cve-2026-41064 avideo rce command-injection
2r 2t 1c 1i
high advisory

Oracle VM VirtualBox CVE-2026-35246 Vulnerability

CVE-2026-35246 is a vulnerability in Oracle VM VirtualBox version 7.2.6, where a high-privileged attacker with local access can exploit it to compromise the application potentially leading to a complete takeover.

cve-2026-35246 virtualbox vulnerability
2r 1c
medium advisory

Oracle VirtualBox Unauthenticated RDP Denial-of-Service Vulnerability (CVE-2026-35245)

An unauthenticated attacker with network access via RDP can exploit CVE-2026-35245 in Oracle VM VirtualBox version 7.2.6 to cause a denial-of-service (DOS) condition.

virtualbox rdp dos cve-2026-35245
2r 1t 1c
critical advisory

Esri Portal for ArcGIS Incorrect Authorization Vulnerability (CVE-2026-33519)

CVE-2026-33519 is a critical vulnerability in Esri Portal for ArcGIS 11.4, 11.5, and 12.0, where incorrect authorization checks on developer credentials can lead to unauthorized privilege escalation on Windows, Linux, and Kubernetes deployments.

esri arcgis privilege-escalation incorrect-authorization cve-2026-33519 webserver
2r 1t 1c
critical advisory

Crafty Controller Users API Insecure Direct Object Reference Vulnerability

Crafty Controller's Users API component contains an insecure direct object reference vulnerability, allowing a remote, authenticated attacker to perform unauthorized user modification actions due to improper API permissions validation (CVE-2026-5652).

idor privilege-escalation cve-2026-5652
2r 1t 1c 1i
high advisory

NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)

NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.

cve-2026-24189 out-of-bounds read nvidia
2r 2t 1i
high advisory

OpenMage LTS Phar Deserialization RCE

A remote code execution vulnerability exists in OpenMage LTS versions prior to 20.16.1 due to Phar deserialization, where an attacker can upload a malicious phar file disguised as an image and trigger deserialization via functions like `getimagesize()`, `file_exists()`, or `is_readable()` when processing `phar://` stream wrapper paths, leading to arbitrary code execution.

phar deserialization remote code execution OpenMage LTS Magento 1.x
2r 2t
high advisory

CVE-2026-32223 Windows USB Printing Stack Elevation of Privilege Vulnerability

CVE-2026-32223 is an elevation of privilege vulnerability affecting the Windows USB Printing Stack (usbprint.sys), potentially allowing a local attacker to gain elevated privileges on a vulnerable system.

cve-2026-32223 elevation-of-privilege windows
2r 1t 1c
high advisory

FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)

FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.

command-injection freepbx graphql cve-2026-40520
2r 1t 1c
critical advisory

Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload

Vvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.

cve-2026-6249 rce web-application
2r 1t 1c
medium advisory

ConnectWise Automate Solution Center Cleartext Communication Vulnerability (CVE-2026-6066)

ConnectWise Automate is vulnerable to CVE-2026-6066, a cleartext transmission of sensitive information vulnerability, where certain client-to-server communications could occur without transport-layer encryption, potentially allowing network-based interception of Solution Center traffic, and the issue is resolved in Automate 2026.4 by enforcing secure communication.

cve-2026-6066 connectwise cleartext rmm
2r 1t 1c 1i
medium advisory

Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)

Cisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.

Catalyst SD-WAN Manager cve-2026-20128 credential-access sd-wan cisco
2r 1t 1c
high advisory

Notepad++ Updater (gup.exe) Creates Uncommon Files

The Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.

supply-chain malware notepad++
2r 3t
high advisory

MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)

A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.

wordpress object-injection deserialization cve-2026-39467
2r 1t 1c
high advisory

Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution

Adversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.

macos lotl lateral-movement execution
2r 2t
high advisory

Multiple Vulnerabilities in Fortinet FortiSandbox

Multiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.

fortinet fortisandbox vulnerability xss code-execution
3r 3t
critical advisory

Multiple Vulnerabilities in Red Hat Hardened Images RPMs

Remote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.

redhat vulnerability denial-of-service information-disclosure code-execution linux
2r 7t
critical advisory

GIMP Multiple Vulnerabilities Allow Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in GIMP to execute arbitrary program code, potentially leading to system compromise.

gimp code-execution vulnerability
2r 1t
critical advisory

Cisco Catalyst SD-WAN Manager Multiple Vulnerabilities

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager allow a remote, anonymous, or local attacker to gain administrator privileges, bypass authentication, execute commands with Netadmin rights, read sensitive system information, and overwrite arbitrary files.

cisco sdwan vulnerability privilege-escalation
2r 4t
critical advisory

Libarchive Code Execution Vulnerability

A remote attacker can exploit a vulnerability in libarchive to achieve arbitrary code execution on a vulnerable system.

libarchive code-execution vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Roundcube

Multiple vulnerabilities in Roundcube allow an attacker to manipulate files, bypass security measures, perform cross-site scripting attacks, and disclose information.

roundcube vulnerability xss file-manipulation
2r 3t
high advisory

Multiple Vulnerabilities in Microsoft Developer Tools

Multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.

vulnerability code-execution spoofing denial-of-service information-disclosure windows
2r 4t
critical advisory

Multiple Vulnerabilities in Dell PowerProtect Data Domain OS

Multiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.

dell powerprotect datadomain vulnerability privilege-escalation defense-evasion credential-access impact
2r 4t
high advisory

Multiple Vulnerabilities in FreeRDP Allow Remote Code Execution and DoS

An anonymous remote attacker can exploit multiple vulnerabilities in FreeRDP to potentially execute arbitrary code, cause a denial-of-service condition, manipulate data, disclose confidential information, or perform other unspecified attacks.

freerdp vulnerability rdp
2r 5t
medium advisory

libarchive Multiple Vulnerabilities Allow Information Disclosure and DoS

Multiple vulnerabilities in libarchive can be exploited by a remote attacker to disclose information or cause a denial-of-service condition.

vulnerability denial-of-service information-disclosure
2r 2t
high advisory

Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities

A local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.

intel firmware vulnerability privilege-escalation credential-access
2r 2t
medium advisory

Microsoft CVE-2026-41254 Security Update

Microsoft released a security update for CVE-2026-41254, a vulnerability with unspecified details.

cve vulnerability microsoft
2r 1c
high advisory

AiAssistant Type Privilege Bypass Vulnerability (CVE-2026-31368)

CVE-2026-31368 is a type privilege bypass vulnerability in AiAssistant, potentially leading to service availability issues and complete compromise of the system.

privilege-escalation vulnerability AiAssistant
2r 2t 1c
high advisory

FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)

FreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.

freescout css-injection privilege-escalation cve-2026-40497
2r 2t 1c
critical advisory

Apktool Path Traversal Vulnerability (CVE-2026-39973)

A path traversal vulnerability in Apktool versions 3.0.0 and 3.0.1 allows a malicious APK file to write arbitrary files to the filesystem during decoding, potentially leading to remote code execution.

apktool path-traversal android cve-2026-39973
2r 3t 1c
high advisory

OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)

OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.

openclaw code-execution trust-boundary plugin
2r 1t 1c
medium advisory

Suspicious RDP File Execution

This rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.

rdp phishing initial-access windows
2r 2t
critical advisory

Spinnaker Echo Service Vulnerable to Spring Expression Language Injection

Unrestricted access to the JVM via Spring Expression Language (SPeL) in Spinnaker's Echo service allows for arbitrary code execution, enabling attackers to invoke commands and access files.

spel code-execution cloud
2r 1t 1c
critical advisory

Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability

The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.

wordpress plugin file-read file-deletion cve-2026-5478
2r 3t 1c
medium advisory

CVE-2026-26149 Microsoft Power Apps Spoofing Vulnerability

A spoofing vulnerability exists in Microsoft Power Apps, identified as CVE-2026-26149, potentially allowing an attacker to mislead users or gain unauthorized access.

CVE-2026-26149 powerapps spoofing
2r 1c
high advisory

Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)

An improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.

cve-2026-6635 authentication bypass web application
2r 1t 1c
critical advisory

Tenda F451 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability (CVE-2026-6631) in Tenda F451 router version 1.0.0.7_cn_svn7958 allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/webExcptypemanFilter component.

tenda router buffer_overflow cve-2026-6631 webserver
2r 2t
high advisory

Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)

A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.

cve-2026-6629 sql-injection web-application metasoft
2r 1t
medium advisory

Langflow Multiple Vulnerabilities

Multiple vulnerabilities in Langflow allow an attacker to manipulate files, disclose sensitive information, or conduct cross-site scripting attacks.

langflow vulnerability xss file-manipulation information-disclosure
2r 2t
medium advisory

Multiple Vulnerabilities in Gitea

Multiple vulnerabilities in Gitea could allow an attacker to disclose information, bypass security measures, and perform cross-site scripting attacks.

gitea vulnerability xss
1r 1t
critical advisory

Multiple Vulnerabilities in Firebird Database Server

Multiple vulnerabilities in Firebird allow an attacker to execute arbitrary code with administrator privileges, disclose sensitive information, or cause a denial-of-service condition.

firebird vulnerability sqldatabase
2r 3t
medium advisory

Moxi Blog v2 <= 5.2 Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability exists in moxi624 Mogu Blog v2 up to version 5.2, specifically affecting the `LocalFileServiceImpl.uploadPictureByUrl` function, allowing remote attackers to potentially interact with internal resources.

SSRF Mogu Blog CVE-2026-6625
2r 1t
high advisory

ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability

TeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.

vulnerability file-deletion path-traversal
2r 2t 1c
critical advisory

Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5964)

Digiwin's EasyFlow .NET is susceptible to a SQL Injection vulnerability, enabling unauthenticated remote attackers to inject arbitrary SQL commands for unauthorized database access, modification, and deletion.

sql-injection vulnerability web-application
2r 1t 1c
critical advisory

Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5963)

Digiwin EasyFlow .NET is vulnerable to SQL Injection, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

sql-injection cve-2026-5963 easyflow digiwin
2r 1t
high advisory

Modelscope Agentscope Code Injection Vulnerability (CVE-2026-6603)

A code injection vulnerability exists in modelscope agentscope up to version 1.0.18, specifically affecting the execute_python_code/execute_shell_command functions, allowing for remote code execution.

code-injection remote-code-execution agentscope
2r 1t
high advisory

Silex Technology SD-330AC and AMC Manager Insecure Default Password Vulnerability (CVE-2026-32965)

Silex Technology's SD-330AC and AMC Manager are vulnerable to insecure default initialization, allowing a null string password to be set upon initial network connection (CVE-2026-32965).

cve-2026-32965 default-password silex-technology
2r 1c
high advisory

Langflow Unrestricted File Upload Vulnerability (CVE-2026-6596)

An unrestricted file upload vulnerability in langflow-ai langflow versions up to 1.1.0 allows remote attackers to execute arbitrary code via the create_upload_file function in the API Endpoint.

CVE-2026-6596 unrestricted-upload langflow
2r 2t
high advisory

brikcss merge Prototype Pollution Vulnerability (CVE-2026-6594)

A prototype pollution vulnerability (CVE-2026-6594) in brikcss merge up to version 1.3.0 allows remote attackers to modify object prototype attributes by manipulating the __proto__/constructor.prototype/prototype argument.

prototype-pollution javascript code-injection cve-2026-6594
2r 2t 1c
high advisory

liangliangyy DjangoBlog Hardcoded Cryptographic Key Vulnerability (CVE-2026-6580)

CVE-2026-6580 describes a vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 where manipulation of the 'key' argument in the Amap API Call Handler leads to the use of a hard-coded cryptographic key, enabling remote exploitation.

cve-2026-6580 djangoblog hardcoded-key web-application
2r 1c
critical advisory

H3C Magic B1 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability (CVE-2026-6581) in H3C Magic B1 routers allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the SetMobileAPInfoById function.

cve-2026-6581 buffer-overflow router h3c
2r 1t 1c
critical advisory

liangliangyy DjangoBlog Authentication Bypass Vulnerability (CVE-2026-6577)

A critical authentication bypass vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 (CVE-2026-6577) allows remote attackers to inject arbitrary GPS data without authentication via the logtracks endpoint, potentially leading to data manipulation and unauthorized access.

cve-2026-6577 djangoblog authentication-bypass gps-injection web-application
2r 1t 1c
high advisory

Apple Account Notification Phishing Campaign

A phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.

apple phishing callback phishing email
2r 1t 5i
high advisory

osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)

CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture <= 1.2.2, leading to hardcoded credentials exposure.

cve-2026-6574 hardcoded-credentials web-application
2r 1t 1c
critical advisory

H3C Magic B0 Router Buffer Overflow Vulnerability (CVE-2026-6560)

A buffer overflow vulnerability (CVE-2026-6560) in H3C Magic B0 up to 100R002 allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the Edit_BasicSSID function of the /goform/aspForm file.

buffer overflow cve-2026-6560 h3c router network device
2r 1t 1c
high advisory

WeGIA SQL Injection Vulnerability (CVE-2026-40285)

WeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.

wegia sql-injection cve-2026-40285 web-application
2r 1t 1c
critical advisory

Sentry SAML SSO Improper Authentication Vulnerability

A critical vulnerability in Sentry's SAML SSO implementation allows account takeover by exploiting improper authentication when multiple organizations are configured, affecting versions 21.12.0 to 26.2.0 and requiring a malicious SAML Identity Provider and knowledge of the victim's email address.

sentry saml sso authentication account-takeover
2r 1t 1c
high advisory

PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix

PraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.

sql-injection praisonai web-application
2r 1t 1c
medium advisory

OpenClaw Webchat Media Embedding Local-Root Containment Bypass

A vulnerability in OpenClaw versions 2026.4.7 to before 2026.4.15 allows a crafted tool-result media reference to cause the host to attempt local file reads or Windows UNC/network path access, potentially disclosing files or network credentials.

openclaw local-file-inclusion unc-path
2r 2t
critical advisory

FastGPT NoSQL Injection Vulnerability (CVE-2026-40351)

FastGPT versions before 4.14.9.5 are vulnerable to NoSQL injection, allowing unauthenticated attackers to bypass authentication and gain administrative access.

NoSQL injection authentication bypass CVE-2026-40351 FastGPT
2r 1t 1c 3i
critical advisory

Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration

Dolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.

command-injection rce dolibarr
2r 1t 1c
high advisory

DNN (DotNetNuke) SVG Upload Vulnerability (CVE-2026-40321)

DNN (formerly DotNetNuke) before 10.2.2 is vulnerable to stored cross-site scripting (XSS) via malicious SVG file uploads, potentially leading to account takeover and arbitrary code execution.

dnn dotnetnuke svg xss cve-2026-40321 upload
2r 3t 1c
critical advisory

compressing npm Package Symlink Bypass Vulnerability

A vulnerability in the `compressing` npm package (<=v2.1.0) allows for arbitrary file overwrite via symlink path traversal, bypassing a previous patch for CVE-2026-24884.

npm supply-chain symlink directory-traversal privilege-escalation arbitrary-file-overwrite
3r 5t 1c 1i
high advisory

Anviz CrossChex Standard TDS7 PreLogin Encryption Vulnerability

Anviz CrossChex Standard is vulnerable to unauthorized database access due to the manipulation of TDS7 PreLogin, which disables encryption, leading to plaintext transmission of database credentials.

cve-2026-32650 credential-access database
2r 1t 1c 1i
high advisory

Firebird Server Denial-of-Service Vulnerability (CVE-2026-28224)

An unauthenticated attacker can trigger a denial-of-service condition on vulnerable Firebird servers by sending a specially crafted op_crypt_key_callback packet, leading to a null pointer dereference and server crash.

cve-2026-28224 denial-of-service firebird database
2r 1t 1c
critical advisory

NovumOS MemoryMapRange Privilege Escalation Vulnerability (CVE-2026-40572)

A vulnerability exists in NovumOS versions prior to 0.24 where the MemoryMapRange syscall allows user-mode processes to map arbitrary virtual address ranges, including kernel structures, leading to privilege escalation.

privilege-escalation novumOS CVE-2026-40572
2r 1t 1c
critical advisory

NovumOS Local Privilege Escalation via Unvalidated Syscall

A local privilege escalation vulnerability exists in NovumOS versions before 0.24, where Syscall 12 (JumpToUser) lacks input validation, allowing user-mode processes to execute arbitrary code in kernel mode.

privilege-escalation syscall novumos
3r 1t 1c
high advisory

SecureDrop Client Code Execution via Gzip Extraction Vulnerability

A compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.

securedrop gzip code execution vulnerability linux
2r 1t 2c
high advisory

Dagster SQL Injection Vulnerability in Dynamic Partition Keys

A SQL injection vulnerability exists in Dagster's DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers, where a user with 'Add Dynamic Partitions' permission can inject arbitrary SQL due to improper escaping of dynamic partition key values, leading to unauthorized data access or modification.

sqli dagster injection
2r 6t
high advisory

YesWiki Authenticated SQL Injection Vulnerability

YesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.

yeswiki sql-injection web-application
2r 1t 2i
medium advisory

Movary SSRF Vulnerability (CVE-2026-40348)

Movary versions before 0.71.1 are vulnerable to server-side request forgery (SSRF) via the `/settings/jellyfin/server-url-verify` endpoint, allowing authenticated users to probe internal network resources.

ssrf cve-2026-40348 movary web-application
2r 2t 1c
high advisory

Movary Privilege Escalation Vulnerability (CVE-2026-40349)

Movary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.

privilege-escalation web-application cve-2026-40349
2r 1t 1c 1i
high advisory

FastGPT NoSQL Injection Vulnerability in Password Change Endpoint

FastGPT versions prior to 4.14.9.5 are vulnerable to NoSQL injection in the password change endpoint, allowing authenticated attackers to bypass password verification and perform account takeover.

nosql-injection account-takeover cve fastgpt privilege-escalation
2r 2t 1c
high advisory

OpenClaw Environment Variable Injection Vulnerability

The openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.

npm openclaw environment-variable-injection vulnerability
2r 1t
medium advisory

WeGIA Stored Cross-Site Scripting Vulnerability (CVE-2026-40286)

A stored Cross-Site Scripting (XSS) vulnerability exists in WeGIA versions prior to 3.6.10, allowing attackers to inject malicious scripts into the 'Member Name' field during member registration, leading to persistent execution upon user access.

xss web-application cve-2026-40286
2r 1t 1c
high advisory

Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification

Anviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.

cve-2026-40461 authentication-bypass iot
2r 1t 1c
high advisory

Anviz CrossChex Standard TCP Packet Injection Vulnerability

Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.

cve-2026-40434 tcp-injection industrial-control-system
2r 2t 1c 4i
critical advisory

Firebird Path Traversal Vulnerability Leads to Code Execution (CVE-2026-40342)

An authenticated user with CREATE FUNCTION privileges can exploit a path traversal vulnerability in Firebird versions prior to 5.0.4, 4.0.7, and 3.0.14, to load an arbitrary shared library leading to code execution as the server's OS account.

firebird path-traversal code-execution cve-2026-40342 database
2r 2t 1c
critical advisory

Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)

Anviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.

command-injection unauthorized-access iot
2r 1t 1c
critical advisory

Anviz CX2 Lite and CX7 Unauthenticated Remote Code Execution via Unverified Update Packages (CVE-2026-40066)

Anviz CX2 Lite and CX7 devices are vulnerable to unverified update packages that allow for unauthenticated remote code execution by unpacking and executing a malicious script.

cve-2026-40066 rce iot
2r 1t 1c
high advisory

xrdp Privilege Escalation Vulnerability (CVE-2026-32107)

xrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.

xrdp privilege-escalation cve-2026-32107 linux
2r 2t 1c 1i
critical advisory

OpenViking Authentication Bypass Vulnerability (CVE-2026-40525)

OpenViking versions prior to commit c7bb167 are vulnerable to an authentication bypass that allows remote attackers to invoke privileged bot-control functionality without authentication when the api_key configuration is unset or empty, potentially leading to unauthorized access to downstream systems and data.

CVE-2026-40525 authentication-bypass openviking api
2r 1t 1c
critical advisory

Firebird Database Server Slice Packet Deserialization Buffer Overflow

Firebird versions before 5.0.4, 4.0.7, and 3.0.14 are vulnerable to a buffer overflow in the xdr_datum() function during slice packet deserialization, enabling unauthenticated attackers to cause a crash or potentially achieve arbitrary code execution by sending a malicious packet.

cve-2026-33337 firebird buffer-overflow denial-of-service
2r 2t 1c
medium advisory

Firebird FB3 Client Library Information Leak (CVE-2025-65104)

Firebird FB3 client library incorrectly handles data lengths when communicating with FB4+ servers, leading to an information leak exploitable by a local attacker.

cve-2025-65104 information-leak firebird
2r 1t 1c 1i
high advisory

ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability

ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.

path-traversal file-write bytedance deerflow
2r 1t 1c
critical advisory

WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability

The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.

wordpress plugin file-read file-deletion rce
2r 1t 1c
critical advisory

FlowiseAI File Upload Validation Bypass Leads to RCE

A file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).

flowiseai file-upload rce web-shell
2r 2t 1c
high advisory

Dnsmasq Out-of-Bounds Write Vulnerability (CVE-2026-6507)

A remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-6507) in dnsmasq by sending a specially crafted BOOTREPLY packet to a server configured with the `--dhcp-split-relay` option, leading to a denial of service.

dnsmasq denial-of-service cve-2026-6507
2r 1t 1c
high advisory

zrok Unauthenticated Denial-of-Service Vulnerability

An unauthenticated attacker can cause a denial-of-service (DoS) in zrok by sending a crafted HTTP request with a large cookie chunk count to an OAuth-protected proxy share, triggering unbounded memory allocation and leading to process termination.

dos vulnerability zrok CVE-2026-40303
2r 1t
high advisory

Paperclip Unauthenticated API Access Vulnerability

Paperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.

paperclip authentication-bypass api-vulnerability
2r 3t
critical advisory

Paperclip Cross-Tenant Agent API Token Minting Vulnerability

A vulnerability in Paperclip allows any authenticated user to mint agent API tokens for other tenants, leading to unauthorized access and control due to missing company access checks.

paperclip broken-access-control cross-tenant
2r 3t
high advisory

OCaml opam Path Traversal Vulnerability (CVE-2026-41082)

OCaml opam before 2.5.1 is vulnerable to path traversal via a crafted .install file, potentially allowing attackers to overwrite arbitrary files.

path-traversal package-manager ocaml
2r 1t 1c
high advisory

Meridian Library Multiple Defense-in-Depth Gaps

Multiple defense-in-depth gaps exist in Meridian versions prior to 2.1.1, including high severity issues related to bypassing safety caps on collection mapping that can lead to resource exhaustion, along with medium and low severity issues affecting constructor selection, telemetry, retry mechanisms, and exception handling.

defense-in-depth resource-exhaustion information-disclosure dotnet
3r 5t
high advisory

ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)

An authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.

cve-2026-5785 sqli manageengine pam360 passwordmanagerpro
2r 4t 1c
high advisory

Kyverno ConfigMap Cross-Namespace Read RBAC Bypass (CVE-2026-22039 Incomplete Fix)

CVE-2026-22039 incompletely fixed a cross-namespace privilege escalation vulnerability in Kyverno's apiCall context, as the ConfigMap context loader still lacks namespace validation, allowing a namespace admin to read ConfigMaps from any namespace using Kyverno's privileged service account, leading to a complete RBAC bypass in multi-tenant Kubernetes clusters.

kyverno rbac-bypass kubernetes privilege-escalation
2r 1t 1c
critical advisory

Flowise Authenticated Remote Code Execution via MCP Adapter

Flowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.

flowise rce command-injection
3r 1t
critical advisory

Clerk JavaScript SDK Middleware Route Protection Bypass

A vulnerability in `@clerk/nextjs`, `@clerk/nuxt`, and `@clerk/astro` allows crafted requests to bypass middleware gating via `createRouteMatcher`, potentially exposing protected routes if downstream authentication checks are absent.

route-bypass middleware-vulnerability javascript-sdk
3r 1t
high advisory

Better Auth OAuth Provider Authorization Bypass Vulnerability

An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.

oauth authorization bypass privilege-escalation defense-evasion
2r 2t
high advisory

Wavlink WL-WN530H4 OS Command Injection Vulnerability

A remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.

command-injection router cve-2026-6483
2r 2t 1c
high advisory

Dell PowerProtect Data Domain Improper Certificate Validation Vulnerability

Dell PowerProtect Data Domain versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.60, contain an improper certificate validation vulnerability in certificate-based login, potentially leading to privilege escalation.

privilege-escalation vulnerability dell
2r 1t 1c
high advisory

Dell Storage Manager Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in Dell Storage Manager to escalate their privileges on the system.

privilege-escalation dell storage manager
2r 1t
critical advisory

Critical Certificate Validation Vulnerability in CISCO Webex Allows User Impersonation

A critical improper certificate validation vulnerability in CISCO Webex versions 39.6 - 45.4 (CVE-2026-20184) allows a remote, unprivileged attacker to impersonate users, gain unauthorized access, and join meetings without authorization, potentially impacting confidentiality, integrity, and availability.

cisco webex sso certificate-validation user-impersonation cve-2026-20184 cloud
2r 3t 1c
critical advisory

Dell PowerProtect Data Domain Command Injection Vulnerability (CVE-2026-23778)

A command injection vulnerability in Dell PowerProtect Data Domain (CVE-2026-23778) could allow a remote, high-privileged attacker to gain root-level access.

cve-2026-23778 command-injection dell powerprotect
2r 3t 1c 1i
high advisory

Dell PowerProtect Data Domain BoostFS Credential Exposure Vulnerability (CVE-2025-36568)

Dell PowerProtect Data Domain BoostFS versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50 are vulnerable to an insufficiently protected credentials vulnerability, allowing a low-privileged attacker with local access to expose credentials and potentially gain elevated privileges.

credential-exposure dell powerprotect CVE-2025-36568
2r 1t 1c
critical advisory

Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution

Multiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.

cisco-ise rce command-injection path-traversal
2r 3t 3c
critical advisory

JetBrains YouTrack RCE via Sandbox Bypass (CVE-2026-33392)

A high privileged user can achieve remote code execution via sandbox bypass in JetBrains YouTrack before version 2025.3.131383, identified as CVE-2026-33392, potentially leading to complete system compromise.

cve-2026-33392 rce jetbrains youtrack sandbox-bypass
2r 1t 1c
high advisory

Dell PowerProtect Data Domain Weak Credentials Vulnerability (CVE-2026-23853)

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability (CVE-2026-23853) that can lead to unauthorized access by a local attacker.

cve-2026-23853 dell powerprotect data domain weak credentials
3r 2t 1c 2i
high advisory

Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.

wordpress file-read path-traversal cve-2026-4659
2r 1t 1c
medium advisory

Mobatek MobaXterm Home Edition Uncontrolled Search Path Vulnerability (CVE-2026-6421)

CVE-2026-6421 is an uncontrolled search path vulnerability in Mobatek MobaXterm Home Edition up to version 26.1, affecting msimg32.dll, that can be exploited locally with high complexity.

cve vulnerability mobaxterm dll hijacking
2r 1t 1c
medium advisory

HashiCorp Vault Denial-of-Service Vulnerability (CVE-2026-5807)

HashiCorp Vault is vulnerable to a denial-of-service (DoS) condition, identified as CVE-2026-5807, where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, preventing legitimate operators from completing these workflows.

denial-of-service vault cve-2026-5807
2r 1t 1c
high advisory

Vault Token Leak via Authorization Header Forwarding

Vault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

vault token-leak authorization cve-2026-4525
2r 1t 1c 1i
medium advisory

Vault kvv2 Policy Bypass Vulnerability Leading to Denial-of-Service (CVE-2026-3605)

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service, addressed in Vault versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

vault kvv2 denial-of-service cve-2026-3605
2r 1t 1c 1i
critical advisory

Paperclip Cross-Tenant Agent API Key IDOR Vulnerability

A Paperclip API vulnerability allows a board user from one company to create, list, and revoke agent API keys in another company, leading to full cross-tenant compromise due to insufficient authorization checks on `/agents/:id/keys` routes.

idor cross-tenant api paperclip privilege-escalation
3r 5t
high advisory

Paperclip codex_local Unauthorized Gmail Access

A Paperclip-managed `codex_local` runtime can access and utilize Gmail connectors connected in the ChatGPT/OpenAI apps UI without explicit Paperclip configuration, allowing unauthorized mailbox access and email sending capabilities due to a trust-boundary failure and dangerous default runtime settings.

paperclipai gmail openai authorization bypass
2r 5t
high advisory

Flowise SSRF Protection Bypass via Unprotected Built-in HTTP Modules

Flowise is vulnerable to SSRF protection bypass via unprotected built-in HTTP modules in the custom function sandbox, allowing authenticated users to access internal network resources by exploiting the lack of SSRF protection on Node.js `http`, `https`, and `net` modules.

ssrf flowise cloud
2r 1t
critical advisory

FlowiseAI AirtableAgent Remote Code Execution via Prompt Injection

A remote code execution vulnerability exists in FlowiseAI's AirtableAgent.ts due to insufficient input verification when using Pandas, allowing attackers to inject malicious code into the prompt and execute arbitrary code via Pyodide.

flowiseai rce prompt-injection airtable
2r 1t
high advisory

@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)

A middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.

fastify middie middleware bypass cve-2026-33804 defense-evasion
2r 1t 1c
high advisory

Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)

Weblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.

weblate privilege-escalation web-application
2r 2t 1c
critical advisory

Pyroscope Secret Key Exposure via Tencent COS Configuration (CVE-2025-41118)

CVE-2025-41118 allows an attacker with direct access to the Pyroscope API, when configured with Tencent COS, to extract the secret_key configuration value, potentially leading to unauthorized access to the cloud storage backend.

pyroscope tencent-cos secret-key-exposure cve-2025-41118 cloud
2r 2t 1c
high advisory

Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)

A missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.

wordpress plugin payment-bypass cve-2026-6372
2r 1t 1c 1i
high advisory

Mirax RAT Targeting Android Users in Europe

Mirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.

android rat mirax malware-as-a-service proxy
2r 4t
high advisory

Malicious Chrome Extensions Stealing Data and Opening Backdoors

A coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.

chrome-extension credential-theft backdoor ad-injection exfiltration
2r 6t
medium advisory

Google Chrome V8 Type Confusion Vulnerability (CVE-2026-6363)

A type confusion vulnerability (CVE-2026-6363) in Google Chrome's V8 JavaScript engine before version 147.0.7727.101 allows a remote attacker to potentially perform out-of-bounds memory access via a crafted HTML page.

cve-2026-6363 chrome v8 type confusion
2r 2t 1c
high advisory

Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)

A type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.

type-confusion code-execution chrome
2r 1t 1c
high advisory

Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)

A remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.

cve-2026-6311 chrome sandbox-escape windows
2r 1t 1c 1i
high advisory

Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)

Google Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.

chrome gpu oob-write sandbox-escape
2r 1t 1c
high advisory

Google Chrome Dawn Use-After-Free Vulnerability (CVE-2026-6310)

A use-after-free vulnerability (CVE-2026-6310) in Google Chrome's Dawn component allows a remote attacker, having compromised the renderer process, to potentially execute a sandbox escape via a specially crafted HTML page.

cve-2026-6310 use-after-free sandbox escape google chrome
2r 2t 1c 1i
high advisory

Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)

A use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.

cve-2026-6300 use-after-free chrome
1r 1t 1c
high advisory

Dragon Boss Solutions Adware Disabling Antivirus Protections

Digitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.

adware antivirus-evasion malware windows
2r 2t 2i
critical advisory

Multiple Vulnerabilities in Kyverno Allow Privilege Escalation and Data Manipulation

An authenticated remote attacker can exploit multiple vulnerabilities in Kyverno to disclose information, bypass security measures, manipulate data, and gain elevated privileges.

kyverno kubernetes privilege-escalation data-manipulation
3r 6t
high advisory

Multiple Vulnerabilities in Cisco Unity Connection

Multiple vulnerabilities in Cisco Unity Connection can be exploited by an attacker to conduct cross-site scripting attacks, redirect users to malicious websites, manipulate data, and disclose confidential information.

cisco unity-connection vulnerability xss data-manipulation
2r 1t
high advisory

Multiple Vulnerabilities in libssh Allow File Manipulation and DoS

Multiple vulnerabilities in libssh allow an attacker to manipulate files or cause a denial-of-service condition, potentially leading to data corruption or service disruption.

libssh vulnerability dos file_manipulation
2r 1t
high advisory

Grafana Vulnerability Allows File Manipulation and Information Disclosure

A remote, authenticated attacker can exploit a vulnerability in Grafana to manipulate files and disclose sensitive information, potentially leading to persistence, unauthorized access, and significant impact.

grafana vulnerability file-manipulation information-disclosure
2r 4t
medium advisory

PowMix Botnet Targeting Czech Workforce

The PowMix botnet campaign targets Czech organizations, particularly HR, legal, and recruitment agencies, using compliance-themed lures delivered via phishing emails, with the attack employing a Windows shortcut file that executes a PowerShell loader to bypass AMSI and deploy the botnet payload in memory.

powmix botnet czech-republic heroku
3r 5t 1i
high advisory

rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)

rsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.

rsync use-after-free cve-2026-41035 linux
2r 1t 1c
critical advisory

AcyMailing Plugin Privilege Escalation Vulnerability (CVE-2026-3614)

The AcyMailing plugin for WordPress is vulnerable to privilege escalation (CVE-2026-3614), allowing authenticated attackers with subscriber-level access to gain administrative privileges.

wordpress privilege-escalation acymailing
2r 1t 1c
high advisory

Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability

The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.

wordpress sqli plugin
2r 1t 1c
critical advisory

Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)

The Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.

wordpress privilege-escalation cve-2026-3596 plugin
2r 2t 1c
critical advisory

Apache ActiveMQ Multiple Vulnerabilities Allow Remote Code Execution

An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to manipulate files or execute arbitrary code.

apache-activemq vulnerability rce
2r 1t
high advisory

Openfind MailGates/MailAudit CRLF Injection Vulnerability

Openfind MailGates/MailAudit is vulnerable to CRLF injection (CVE-2026-6351), enabling unauthenticated remote attackers to read system files by injecting malicious CRLF sequences.

crlf-injection vulnerability mailgates mailaudit
2r 1t 1c
critical advisory

Simopro WinMatrix Agent Missing Authentication Vulnerability (CVE-2026-6348)

The WinMatrix agent by Simopro Technology suffers from a missing authentication vulnerability (CVE-2026-6348), enabling local authenticated attackers to execute arbitrary code with SYSTEM privileges on the local machine and all hosts within the agent's environment.

CVE-2026-6348 missing-authentication privilege-escalation windows
2r 2t 1c
critical advisory

Openfind MailGates/MailAudit Stack-based Buffer Overflow (CVE-2026-6350)

Openfind MailGates/MailAudit is vulnerable to a stack-based buffer overflow (CVE-2026-6350) allowing unauthenticated remote attackers to execute arbitrary code by controlling the program's execution flow.

cve-2026-6350 buffer-overflow remote-code-execution
2r 1t 1c
high advisory

Radare2 Command Injection Vulnerability (CVE-2026-41015)

Radare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.

radare2 command-injection cve-2026-41015 linux
2r 1t 1c
critical advisory

Creolabs Gravity Heap Buffer Overflow Vulnerability (CVE-2026-40504)

Creolabs Gravity before 0.9.6 is vulnerable to a heap buffer overflow in the gravity_vm_exec function, allowing attackers to achieve arbitrary code execution by crafting scripts with many string literals at global scope that exploit insufficient bounds checking in gravity_fiber_reassign().

cve heap-overflow code-execution
2r 3t 1c
high advisory

wger Broken Access Control in Global Gym Configuration Update Endpoint

The wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.

privilege-escalation broken-access-control web-application
2r 1t
critical advisory

Luanti LuaJIT Sandbox Escape (CVE-2026-40959)

Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod, potentially leading to arbitrary code execution.

sandbox-escape luanti luajit cve-2026-40959
2r 2t 1c
high advisory

Luanti 5 Improper Access Control Vulnerability (CVE-2026-40960)

Luanti 5 before 5.15.2 allows unintended access to an insecure environment if a crafted mod intercepts requests when secure mods are enabled, potentially leading to unauthorized access and control.

cve-2026-40960 luanti access-control
2r 1t 1c 1i
critical advisory

Fastify Proxy Header Stripping Vulnerability

The `@fastify/reply-from` and `@fastify/http-proxy` libraries process the client's `Connection` header after adding headers, allowing attackers to strip proxy-added headers via the `Connection` header, leading to potential bypass of security controls.

fastify header stripping proxy vulnerability
2r 2t
critical advisory

ArgoCD Image Updater Namespace Bypass Vulnerability (CVE-2026-6388)

CVE-2026-6388 describes a flaw in ArgoCD Image Updater that allows an attacker with permissions to create or modify an ImageUpdater resource in a multi-tenant environment to bypass namespace boundaries and trigger unauthorized image updates.

argocd privilege-escalation kubernetes cve-2026-6388
2r 1t 1c
critical advisory

Barracuda RMM Privilege Escalation via Filesystem ACLs

Barracuda RMM versions prior to 2025.2.2 are vulnerable to local privilege escalation, allowing attackers to gain SYSTEM privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory.

privilege-escalation rmm windows
2r 1t 1c
high advisory

GIMP GIF Image Buffer Overflow Vulnerability

A buffer overflow vulnerability in the GIF image loading component of GIMP allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file, potentially leading to denial of service or arbitrary code execution.

cve-2026-6384 gimp buffer-overflow dos
2r 3t 1c
critical advisory

Google Chrome Proxy Use-After-Free Vulnerability (CVE-2026-6297)

CVE-2026-6297 is a critical use-after-free vulnerability in the Proxy component of Google Chrome before version 147.0.7727.101, enabling a privileged network attacker to potentially achieve sandbox escape via a crafted HTML page.

cve use-after-free chrome sandbox escape
2r 1t 1c
high advisory

Fastify Body Schema Validation Bypass via Leading Space in Content-Type Header

Fastify v5.x is vulnerable to a body schema validation bypass, allowing attackers to circumvent request body validation by prepending a single space to the Content-Type header, potentially compromising data integrity and security constraints.

fastify validation-bypass webserver
2r 1t 2c
high advisory

Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)

Weblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.

cve-2026-33435 rce weblate
2r 3t 1c
medium advisory

Weblate Path Traversal Vulnerability in ZIP Download Feature (CVE-2026-34242)

Weblate versions before 5.17 are vulnerable to path traversal due to improper verification of downloaded files in the ZIP download feature, potentially allowing attackers to access files outside the intended repository.

weblate path-traversal zip-archive cve-2026-34242
2r 2t 1c
high advisory

Velociraptor Authentication Bypass via query() Plugin

Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.

velociraptor authentication bypass privilege escalation cve-2026-6290
2r 2t 1c
medium advisory

Git for Windows NTLM Hash Leak Vulnerability (CVE-2026-32631)

Git for Windows versions prior to 2.53.0.windows.3 are vulnerable to NTLM hash theft by attackers who can trick users into cloning malicious repositories or checking out malicious branches, leading to potential credential compromise.

cve credential-access windows git
2r 1t 1c
high advisory

WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)

An SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.

sql-injection wordpress wcfm-marketplace
2r 1t 1c 1i
high advisory

Splunk MCP Server App Cleartext Credential Exposure (CVE-2026-20205)

A user with access to the `_internal` index or the `mcp_tool_admin` capability in Splunk MCP Server app versions below 1.0.3 can view user session and authorization tokens in clear text, leading to potential credential compromise.

splunk credential-access vulnerability
2r 1t 1c
high advisory

Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name

Zarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.

zarf path-traversal arbitrary-file-write package-inspection linux
3r 1t
high advisory

Windows WinSock Use-After-Free Privilege Escalation (CVE-2026-26177)

CVE-2026-26177 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a local attacker to elevate privileges.

cve privilege-escalation windows
2r 1t 1c 1i
high advisory

Windows WinSock Race Condition Privilege Escalation (CVE-2026-26173)

CVE-2026-26173 is a race condition vulnerability in the Windows Ancillary Function Driver for WinSock that allows a local attacker to elevate privileges.

cve-2026-26173 privilege-escalation windows
2r 1t 1c
high advisory

Windows Win32K GRFX Privilege Escalation via Race Condition (CVE-2026-33104)

CVE-2026-33104 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

cve-2026-33104 privilege-escalation windows
2r 1t 1c 1i
high advisory

Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)

CVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)

CVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)

CVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.

cve-2026-33827 race-condition windows tcp/ip code-execution
2r 2t 1c
high advisory

Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)

CVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.

privilege-escalation windows cve-2026-32076
2r 1t 1c
medium advisory

Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)

CVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.

cve-2026-26151 rdp spoofing windows
2r 2t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)

CVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)

CVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.

privilege escalation race condition windows
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)

CVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.

cve-2026-26172 privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)

CVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)

CVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.

privilege-escalation toctou windows
2r 1t 1c 1i
high advisory

Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)

CVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.

privilege-escalation kerberos windows cve-2026-27912
2r 1t 1c 2i
high advisory

Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)

CVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.

hyper-v code-execution vulnerability windows
2r 2t 1c 1i
high advisory

Windows BitLocker Security Feature Bypass Vulnerability (CVE-2026-27913)

CVE-2026-27913 describes an improper input validation vulnerability in Windows BitLocker that allows a local attacker to bypass security features.

bitlocker security-bypass windows cve-2026-27913
2r 1t 1c 1i
high advisory

Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)

A Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.

cve-2026-38527 ssrf webkul krayin-crm
2r 1t 1c
critical advisory

SQL Server Untrusted Pointer Dereference Vulnerability (CVE-2026-33120)

CVE-2026-33120 is an untrusted pointer dereference vulnerability in Microsoft SQL Server that allows an authenticated attacker to achieve remote code execution over a network.

sql-server rce vulnerability
2r 1t 1c 2i
critical advisory

OAuth2 Proxy Authentication Bypass via User-Agent Header

A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.

oauth2-proxy authentication-bypass web-application
2r 1t
high advisory

Microsoft Word Use-After-Free Vulnerability CVE-2026-23657

CVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.

use-after-free code-execution office cve-2026-23657
2r 1t 1c
high advisory

Microsoft PowerShell Improper Input Validation Vulnerability (CVE-2026-26143)

An improper input validation vulnerability (CVE-2026-26143) in Microsoft PowerShell allows an unauthorized local attacker to bypass security features.

cve-2026-26143 powershell input-validation bypass-uac windows
2r 1t 1c 2i
high advisory

Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)

CVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.

use-after-free excel code-execution
3r 1t 1c
high advisory

Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)

CVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.

privilege-escalation windows cve-2026-27914
2r 1t 1c 1i
high advisory

Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)

CVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.

use-after-free code-execution excel cve-2026-32189
2r 1t 1c 1i
medium advisory

Microsoft Excel Out-of-Bounds Read Vulnerability (CVE-2026-32188)

An out-of-bounds read vulnerability in Microsoft Office Excel (CVE-2026-32188) allows a local attacker to potentially disclose sensitive information through a maliciously crafted Excel file.

excel out-of-bounds read cve-2026-32188 information disclosure vulnerability
2r 1t 1c
high advisory

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)

CVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.

privilege-escalation microsoft-defender cve-2026-33825
2r 1t 1c 1i
critical advisory

manikandan580 School-management-system SQL Injection Vulnerability

A time-based blind SQL injection vulnerability in manikandan580 School-management-system 1.0 allows unauthenticated attackers to potentially execute arbitrary SQL queries and gain unauthorized access to sensitive information.

sqli cve-2025-65135 school-management-system web-application
2r 1t 1c
high advisory

Libsixel Use-After-Free Vulnerability (CVE-2026-33018)

A use-after-free vulnerability exists in libsixel versions 1.8.7 and prior when processing animated GIFs due to improper frame buffer management, potentially leading to code execution.

libsixel use-after-free CVE-2026-33018 gif
2r 1t 1c
high advisory

Krayin CRM v2.2.x SQL Injection Vulnerability

Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.

sql-injection cve-2026-38528 krayin-crm
2r 1t 1c
high advisory

Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing

Jetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.

request-smuggling jetty CVE-2026-2332 webserver
2r 1t 1c 2i
high advisory

Go Markdown Library Out-of-Bounds Read Vulnerability

A vulnerability in the go-markdown library exists where processing a malformed input containing a '<' character that is not followed by a '>' character with a SmartypantsRenderer can lead to an out-of-bounds read or a panic, causing a denial of service.

markdown denial-of-service go out-of-bounds read
2r 1t
critical advisory

Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)

Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.

cve command-injection fortinet
2r 1t 1c 1i
high advisory

Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)

An SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.

sqli fortinet cve-2026-39815
2r 3t 1c
high advisory

CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability

An improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.

cve-2026-33826 active-directory code-execution vulnerability
2r 1t 1c 1i
critical advisory

CVE-2026-33824: Windows IKE Extension Double Free Vulnerability

A double free vulnerability in the Windows IKE Extension, tracked as CVE-2026-33824, allows an unauthenticated remote attacker to execute arbitrary code over the network.

cve-2026-33824 windows ike double-free remote-code-execution
2r 3t 1c 1i
high advisory

CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler

CVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c 2i
high advisory

CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.

cve-2026-33099 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver

CVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-33096 HTTP.sys Out-of-Bounds Read Denial-of-Service

An unauthenticated, remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-33096) in Windows HTTP.sys to cause a denial-of-service condition.

cve-2026-33096 denial-of-service windows
2r 2t 1c
high advisory

CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation

CVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows cve-2026-32195
2r 1t 1c 1i
high advisory

CVE-2026-32164 Windows User Interface Core Race Condition Privilege Escalation

CVE-2026-32164 is a race condition vulnerability in Windows User Interface Core that allows a locally authorized attacker to elevate privileges.

cve-2026-32164 privilege-escalation windows
2r 1t 1c
critical advisory

CVE-2026-32157 - Remote Desktop Client Use-After-Free Vulnerability

CVE-2026-32157 is a use-after-free vulnerability in the Remote Desktop Client that allows an unauthorized attacker to execute code over a network.

cve-2026-32157 use-after-free remote-desktop execution
2r 2t 1c 1i
high advisory

CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation

CVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-32153 Windows Speech Use-After-Free Privilege Escalation

CVE-2026-32153 is a use-after-free vulnerability in Microsoft Windows Speech that allows a locally authorized attacker to elevate privileges.

cve-2026-32153 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32152 Use-After-Free in Desktop Window Manager

CVE-2026-32152 is a use-after-free vulnerability in the Desktop Window Manager (dwm.exe) that allows an authorized local attacker to elevate privileges.

privilege-escalation use-after-free cve-2026-32152
2r 1t 1c 1i
high advisory

CVE-2026-32078: Windows Projected File System Use-After-Free Elevation of Privilege

A use-after-free vulnerability, CVE-2026-32078, exists in the Windows Projected File System, allowing a locally authenticated attacker to escalate privileges.

cve-2026-32078 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32071: Windows LSASS Null Pointer Dereference DoS

CVE-2026-32071 is a null pointer dereference vulnerability in the Windows Local Security Authority Subsystem Service (LSASS), allowing an unauthorized network attacker to cause a denial-of-service condition.

cve-2026-32071 denial-of-service windows
2r 1t 1c 1i
high advisory

CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation

CVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.

privilege-escalation race-condition windows
3r 1t 1c
high advisory

CVE-2026-27916 Use-After-Free in Windows UPnP Device Host

CVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.

windows upnp privilege-escalation cve-2026-27916
2r 1t 1c 1i
high advisory

CVE-2026-27910: Windows Installer Local Privilege Escalation

CVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.

privilege-escalation windows cve-2026-27910
2r 1t 1c 2i
high advisory

CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation

CVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver

A use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.

cve-2026-27908 use-after-free privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability

CVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26179 Windows Kernel Double Free Privilege Escalation

CVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.

privilege-escalation windows kernel double-free
2r 1t 1c
high advisory

CVE-2026-26163: Windows Kernel Double Free Privilege Escalation

CVE-2026-26163 is a double free vulnerability in the Windows Kernel, allowing an authorized attacker to elevate privileges locally with a CVSS v3.1 score of 7.8.

privilege-escalation windows cve-2026-26163
2r 1t 1c 1i
high advisory

CVE-2026-26153: Windows EFS Out-of-Bounds Read Privilege Escalation

CVE-2026-26153 is an out-of-bounds read vulnerability in the Windows Encrypting File System (EFS) that allows an authorized local attacker to elevate privileges.

efs privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26152: Windows Cryptographic Services Privilege Escalation

CVE-2026-26152 is an insecure storage of sensitive information vulnerability in Windows Cryptographic Services that allows a local, authorized attacker to elevate privileges.

cve-2026-26152 privilege-escalation windows
2r 1t 1c 1i
critical advisory

Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime

CVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.

rce deserialization talend
2r 2t 1c
high advisory

Composer Command Injection via Malicious Perforce Repository

Composer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.

composer command-injection php
2r 1t
high advisory

Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)

CVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.

azure privilege escalation vulnerability cve-2026-32168
2r 1t 1c 1i
high advisory

Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation

CVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.

cve-2026-32192 azure monitor agent privilege escalation deserialization
2r 1t 1c
high advisory

Autodesk Fusion Stored XSS Vulnerability (CVE-2026-4344)

CVE-2026-4344 is a stored cross-site scripting (XSS) vulnerability in the Autodesk Fusion desktop application where a malicious HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can lead to arbitrary code execution.

xss autodesk cve-2026-4344
2r 3t 1c 3i
high advisory

Adobe Photoshop Out-of-Bounds Read Vulnerability (CVE-2026-27289)

An out-of-bounds read vulnerability (CVE-2026-27289) in Adobe Photoshop Desktop versions 27.4 and earlier allows for potential code execution via a crafted file, requiring user interaction to trigger the exploit.

cve-2026-27289 out-of-bounds read adobe photoshop code execution
2r 3t 1c 2i
high advisory

Adobe InDesign Heap-Based Buffer Overflow Vulnerability (CVE-2026-34629)

Adobe InDesign versions 20.5.2, 21.2 and earlier are vulnerable to a heap-based buffer overflow (CVE-2026-34629) that could lead to arbitrary code execution if a user opens a malicious file.

cve-2026-34629 heap-overflow adobe-indesign
2r 2t 1c
high advisory

Adobe ColdFusion Path Traversal Vulnerability (CVE-2026-34619)

A path traversal vulnerability (CVE-2026-34619) in Adobe ColdFusion versions 2023.18, 2025.6, and earlier allows an attacker to bypass security features and access unauthorized files or directories without user interaction.

path-traversal coldfusion cve-2026-34619
2r 1t 1c
medium advisory

Adobe ColdFusion Improper Input Validation Vulnerability (CVE-2026-27306)

An improper input validation vulnerability in Adobe ColdFusion versions 2023.18, 2025.6, and earlier (CVE-2026-27306) could lead to arbitrary code execution if a privileged user opens a specially crafted malicious file.

cve-2026-27306 coldfusion code execution input validation
2r 1t 1c
critical advisory

Adobe ColdFusion Improper Input Validation RCE

Adobe ColdFusion versions 2023.18, 2025.6, and earlier are vulnerable to improper input validation, potentially leading to arbitrary code execution without user interaction.

cve-2026-27304 coldfusion rce improper-input-validation
2r 1t 1c 1i
high advisory

Adobe Bridge Heap-based Buffer Overflow Vulnerability (CVE-2026-27312)

A heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4 and earlier can lead to arbitrary code execution if a user opens a malicious file.

cve-2026-27312 heap-based buffer overflow adobe bridge code execution
2r 2t 1c
high advisory

Adobe Bridge Heap-Based Buffer Overflow Vulnerability (CVE-2026-27311)

A heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4, and earlier (CVE-2026-27311) allows for arbitrary code execution when a user opens a specially crafted file.

cve-2026-27311 heap-based-buffer-overflow adobe-bridge
2r 1t 1c
high advisory

Adobe Acrobat Reader Prototype Pollution Vulnerability (CVE-2026-34622)

A prototype pollution vulnerability in Adobe Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier (CVE-2026-34622) allows for arbitrary code execution when a user opens a specially crafted malicious file.

cve-2026-34622 adobe-acrobat prototype-pollution code-execution
2r 1t 1c
high advisory

.NET Uncontrolled Resource Consumption Vulnerability (CVE-2026-26171)

CVE-2026-26171 is a vulnerability in .NET that allows an unauthorized attacker to perform a denial-of-service attack over a network due to uncontrolled resource consumption.

CVE-2026-26171 dotnet denial-of-service dos resource-consumption
1r 1c
critical advisory

Multiple Vulnerabilities in Red Hat Ansible Automation Platform

A remote, anonymous attacker can exploit multiple vulnerabilities in Red Hat Ansible Automation Platform to perform denial of service, execute arbitrary code, bypass security measures, manipulate data, disclose information, or conduct XSS attacks.

ansible redhat vulnerability dos xss code-execution
2r 6t
high advisory

n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting

Threat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.

n8n phishing malware workflow-automation
2r 6t 2i
medium advisory

Keycloak Cross-Site Scripting Vulnerability

An authenticated remote attacker can exploit a vulnerability in Keycloak to perform a Cross-Site Scripting attack, potentially leading to unauthorized access and data compromise.

keycloak xss cross-site scripting cloud
2r 1t
high advisory

Kyverno SSRF Vulnerability in CEL HTTP Library

A Server-Side Request Forgery (SSRF) vulnerability in Kyverno's CEL HTTP library allows users with namespace-scoped policy creation permissions to make arbitrary HTTP requests, enabling unauthorized access to internal services, cloud metadata endpoints, and data exfiltration.

SSRF kyverno kubernetes cel cloud-security
2r 3t 1c 4i
high advisory

Kyverno Service Account Token Leak via API Call

Kyverno's apiCall serviceCall helper implicitly injects the Kyverno controller service account token into requests when policies lack an explicit Authorization header, allowing exfiltration to attacker-controlled endpoints and unauthorized actions.

kyverno token-leak cloud
2r 1t 5i
high advisory

free5gc UDR Improper Path Validation Allows Unauthenticated Access to Traffic Influence Subscriptions

An improper path validation vulnerability exists in the free5gc UDR service, allowing unauthenticated attackers with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions.

free5GC UDR path-validation information-disclosure
2r 2t 1i
high advisory

CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability

CVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.

command-injection windows vulnerability
2r 2t 1c
high advisory

Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)

CVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.

privilege-escalation windows cve-2026-32222
2r 1t 1c 1i
high advisory

CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host

CVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.

use-after-free windows upnp code-execution
2r 2t 1c 1i
high advisory

CVE-2026-26183 Windows RPC API Local Privilege Escalation

CVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.

privilege-escalation windows rpc
2r 1t 1c 1i
high advisory

Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174

CVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.

cve-2026-26174 privilege-escalation windows wsus
2r 1t 1c 2i
high advisory

Adobe Connect XSS Vulnerability Leading to Privilege Escalation

Adobe Connect versions 2025.3, 12.10, and earlier are susceptible to a Cross-Site Scripting (XSS) vulnerability (CVE-2026-34617) that can lead to privilege escalation if a user interacts with a malicious URL or compromised web page.

adobe-connect xss cve-2026-34617 privilege-escalation
2r 1t 1c
high advisory

CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

cve-2026-33100 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft Graphics Component Heap-based Buffer Overflow Vulnerability (CVE-2026-32221)

CVE-2026-32221 is a heap-based buffer overflow vulnerability in the Microsoft Graphics Component, allowing a local attacker to execute arbitrary code.

cve-2026-32221 buffer-overflow local-privilege-escalation graphics-component
2r 2t 1c 1i
high advisory

CVE-2026-32224 Use-After-Free in Windows Server Update Service

CVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.

cve-2026-32224 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)

CVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.

privilege-escalation windows
2r 1t 1c
high advisory

Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)

CVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.

cve-2026-32200 use-after-free powerpoint code-execution
2r 1t 1c 2i
medium advisory

.NET Spoofing Vulnerability (CVE-2026-32178)

CVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.

dotnet spoofing cve-2026-32178
2r 1t 1c 2i
high advisory

CVE-2026-32165 Use-After-Free in Windows User Interface Core

CVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c
high advisory

Windows COM Privilege Escalation via CVE-2026-32162

CVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.

privilege-escalation windows CVE-2026-32162
2r 1t 1c 2i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)

CVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)

CVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

CVE-2026-32087 Function Discovery Service Privilege Escalation

CVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.

privilege-escalation heap-overflow cve windows
2r 1t 1c
high advisory

CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)

CVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.

windows privilege-escalation cve
2r 1t 1c 2i
high advisory

Windows Shell Race Condition Vulnerability (CVE-2026-27918)

CVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

race-condition privilege-escalation windows
2r 1t 1c
high advisory

Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)

CVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.

cve-2026-26184 privilege-escalation windows
2r 1t 1c 1i
high advisory

Adobe Connect Reflected XSS Vulnerability (CVE-2026-27245)

Adobe Connect versions 2025.3, 12.10, and earlier are vulnerable to a reflected Cross-Site Scripting (XSS) attack, enabling attackers to execute malicious JavaScript in a victim's browser by enticing them to visit a crafted URL.

xss adobe-connect cve-2026-27245 reflected-xss
2r 1t 1c 3i
critical advisory

Windows WARP Integer Truncation Privilege Escalation (CVE-2026-26178)

CVE-2026-26178 is an integer size truncation vulnerability in the Windows Advanced Rasterization Platform (WARP) that allows an unauthorized attacker to elevate privileges locally.

privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-26176 Windows CSC Driver Privilege Escalation

CVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows
2r 1t 1c 1i
high advisory

Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159

CVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).

cve-2026-26159 privilege-escalation windows
2r 1t 1c 1i
critical advisory

Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)

A path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.

path-traversal vulnerability privilege-escalation fortinet
2r 1t 1c 2i
critical advisory

Webkul Krayin CRM BOLA Vulnerability (CVE-2026-38529)

CVE-2026-38529 is a Broken Object-Level Authorization (BOLA) vulnerability in Webkul Krayin CRM v2.2.x that allows authenticated attackers to reset user passwords and take over accounts.

bola cve-2026-38529 krayin-crm account-takeover
2r 1t 1c
high advisory

Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)

CVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.

cve-2026-22828 fortinet heap-overflow cloud
2r 2t 1c
critical advisory

SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)

A critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.

sql-injection web-application cve-2025-63939
2r 1t 1c 2i
critical advisory

UniFi Play Path Traversal Vulnerability (CVE-2026-22562)

A path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.

path-traversal rce unifi
2r 2t 1c
high advisory

State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)

In 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.

state-sponsored apt persistence vulnerability-exploitation
2r 6t
medium advisory

Suspicious Registry Modifications by Scripting Engines

Scripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.

registry-modification persistence defense-evasion scripting-engine
1r 3t
high advisory

Eclipse Jetty HTTP/1.1 Request Smuggling via Chunk Extensions (CVE-2026-2332)

Eclipse Jetty's HTTP/1.1 parser is vulnerable to request smuggling due to improper handling of chunk extensions, allowing attackers to inject malicious requests.

request-smuggling jetty cve-2026-2332 funky-chunks
2r 3t 1c 2i
critical advisory

Totolink A3002MU Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-6194) exists in the Totolink A3002MU B20211125.1046 router firmware, specifically affecting the `/boafrm/formWlanSetup` component's HTTP request handler, which allows remote attackers to execute arbitrary code by manipulating the `wan-url` argument.

cve-2026-6194 buffer-overflow totolink router
2r 7t 1c
high advisory

PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.

sqli cve-2026-6193 php web-application
2r 1t 1c
critical advisory

Pachno 1.0.6 XML External Entity Injection Vulnerability

Pachno 1.0.6 is vulnerable to XML external entity injection, allowing unauthenticated attackers to read arbitrary files by injecting malicious XML entities into wiki content due to unsafe XML parsing in the TextParser helper.

xxe cve-2026-40042 pachno web-application
2r 2t 1c 3i
high advisory

libTIFF Vulnerability Allows Code Execution and DoS

A remote, anonymous attacker can exploit a vulnerability in libTIFF to potentially execute arbitrary code or cause a denial-of-service condition.

libTIFF code execution denial of service
2r 2t
high advisory

RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability (CVE-2026-27668)

CVE-2026-27668 allows authenticated User Administrators in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to escalate their privileges and access any device group, due to an incorrect privilege assignment in versions prior to V5.8.

ruggedcom privilege-escalation cve-2026-27668 sam-p
2r 1t 1c
high advisory

Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)

CVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.

CVE-2026-33892 authentication-bypass industrial-control-system edge-management
2r 1t 1c
high advisory

SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)

An authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.

sinec-nms authentication-bypass cve-2026-24032 siemens
2r 1t 1c 1i
high advisory

Smart Post Show WordPress Plugin PHP Object Injection Vulnerability

The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.

wordpress php object-injection rce
2r 1t 1c
critical advisory

PraisonAI Unauthenticated Remote Session Hijacking Vulnerability (CVE-2026-40289)

PraisonAI versions before 4.5.139 and praisonaiagents versions before 1.5.140 are vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on the /ws WebSocket endpoint, enabling unauthorized remote control and data leakage.

cve-2026-40289 websocket remote-code-execution praisonai
2r 5t 1c
critical advisory

PraisonAI Arbitrary Code Execution Vulnerability

PraisonAI versions 4.5.138 and below are vulnerable to arbitrary code execution due to the unsanitized import of a malicious tools.py file, leading to potential system compromise.

praisonai code-execution cve-2026-40287
2r 1t 1c
critical advisory

PraisonAI GitHub Actions Credential Leakage Vulnerability (CVE-2026-40313)

PraisonAI versions 4.5.139 and below are vulnerable to credential leakage due to the ArtiPACKED attack, where GitHub Actions workflows using actions/checkout without persist-credentials: false write the GITHUB_TOKEN into the .git/config file, leading to potential exposure in uploaded artifacts and subsequent supply chain compromise.

credential-leakage supply-chain github-actions cve-2026-40313
2r 2t 1c
critical advisory

LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.

wordpress plugin learnpress data-deletion unauthorized-access
2r 1t 1c
medium advisory

jq JSON Processor Hash Table Collision Denial-of-Service Vulnerability (CVE-2026-40164)

A denial-of-service vulnerability exists in jq versions prior to commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784 due to the use of a hardcoded seed in MurmurHash3, enabling attackers to craft JSON objects that trigger hash collisions and cause excessive CPU consumption.

jq denial-of-service hash-collision CVE-2026-40164 linux
2r 1t 1c
critical advisory

SAP Business Planning and Consolidation and Business Warehouse SQL Injection Vulnerability

CVE-2026-27681 describes an insufficient authorization check vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse that allows authenticated users to execute crafted SQL statements, leading to unauthorized data access, modification, and deletion.

cve-2026-27681 sql-injection sap
2r 1t 1c
high advisory

NestJS Microservices Denial-of-Service via Recursive handleData

A denial-of-service vulnerability exists in NestJS's @nestjs/microservices package, affecting versions 11.1.18 and earlier, where an attacker can send multiple small, valid JSON messages within a single TCP frame, causing a stack overflow.

nestjs denial-of-service microservices
2r 1t
high advisory

MinIO Unauthenticated Object Write Vulnerability

Two authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.

minio authentication-bypass object-storage
2r 3t
critical advisory

Coinbase AgentKit Prompt Injection Vulnerability

A prompt injection vulnerability in Coinbase AgentKit allows for potential wallet drain, infinite approvals, and agent-level remote code execution.

prompt-injection coinbase agentkit wallet-drain
2r 2i
medium advisory

ImageMagick XML Bomb Denial-of-Service Vulnerability (CVE-2026-33908)

ImageMagick versions prior to 7.1.2-19 and 6.9.13-44 are susceptible to a denial-of-service (DoS) attack due to unbounded recursion during XML parsing, potentially leading to stack exhaustion.

dos imagemagick xml cve-2026-33908
2r 1t 1c
medium advisory

UniFi Play Improper Access Control Vulnerability (CVE-2026-22566)

An improper access control vulnerability in UniFi Play PowerAmp and Audio Port allows a malicious actor with access to the UniFi Play network to obtain WiFi credentials.

vulnerability access-control unifi
2r 1t 1c
critical advisory

UniFi Play Improper Access Control Allows SSH Enablement

CVE-2026-22564 is an improper access control vulnerability in UniFi Play PowerAmp and Audio Port devices that allows an attacker with network access to enable SSH and make unauthorized system changes.

cve-2026-22564 unifi-play access-control ssh
2r 1t 1c 1i
critical advisory

UniFi Play Command Injection Vulnerability (CVE-2026-22563)

A malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.

command-injection unifi cve-2026-22563
2r 1t 1c 1i
high advisory

ImageMagick Heap Buffer Overflow Vulnerability (CVE-2026-33901)

ImageMagick versions before 7.1.2-19 and 6.9.13-44 are vulnerable to a heap buffer overflow in the MVG decoder, potentially leading to an out-of-bounds write when processing a crafted image, which can result in denial of service or arbitrary code execution.

imagemagick heap-buffer-overflow cve-2026-33901
2r 1t 1c
high advisory

SQL Injection Vulnerability in Simple Content Management System 1.0

A remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.

sqli web-application cve-2026-6182
2r 1t 1c 5i
high advisory

VMware Tanzu Spring Cloud Gateway Security Bypass Vulnerability

An anonymous, remote attacker can exploit a vulnerability in VMware Tanzu Spring Cloud Gateway to bypass security measures, potentially gaining unauthorized access or control.

spring-cloud-gateway security-bypass defense-evasion
1r 1t
critical advisory

TOTOLINK A7000R Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-6168) exists in TOTOLINK A7000R devices up to version 9.1.0u.6115, allowing remote attackers to execute arbitrary code via a crafted ssid5g argument to the setWiFiEasyGuestCfg function in /cgi-bin/cstecgi.cgi.

totolink buffer-overflow cve-2026-6168 router
2r 1t 1c
high advisory

SQL Injection Vulnerability in Faculty Management System

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

ZTE ZXEDM iEMS Password Reset Vulnerability (CVE-2026-40436)

CVE-2026-40436 is a vulnerability in the ZTE ZXEDM iEMS product that allows attackers to reset user passwords due to improper access control on the user list acquisition function within the cloud EMS portal, potentially leading to unauthorized operations and system compromise.

cve password-reset zte zxedm cloud
2r 2t 1c
high advisory

SQL Injection Vulnerability in Vehicle Showroom Management System 1.0

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.

sqli web-application cve-2026-6165
2r 1t 1c
high advisory

SQL Injection Vulnerability in Lost and Found Thing Management 1.0

A remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

Samsung Escargot Out-of-Bounds Write Vulnerability (CVE-2026-25207)

CVE-2026-25207 is an out-of-bounds write vulnerability in Samsung Open Source Escargot that allows for buffer overflows, potentially leading to arbitrary code execution.

cve-2026-25207 out-of-bounds write buffer overflow samsung escargot
2r 2t 1c
high advisory

Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)

CVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (<= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.

sql-injection web-application cve-2026-6161
2r 1t 1c
high advisory

Samsung Escargot Heap-Based Buffer Overflow Vulnerability (CVE-2026-25205)

A heap-based buffer overflow vulnerability in Samsung Open Source Escargot (CVE-2026-25205) allows for out-of-bounds write operations, potentially leading to arbitrary code execution.

cve-2026-25205 heap-based buffer overflow escargot
2r 1t 1c
critical advisory

Totolink A800R Remote Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in the Totolink A800R router version 4.1.2cu.5137_B20200730, allowing unauthenticated attackers to potentially execute arbitrary code by overflowing the apcliSsid argument in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library.

cve-2026-6157 buffer-overflow router iot
2r 3t 1c
medium advisory

Huawei Communication Module Use-After-Free Vulnerability (CVE-2026-34856)

A use-after-free vulnerability, tracked as CVE-2026-34856, exists in Huawei's communication module due to improper synchronization in concurrent execution, potentially leading to a denial-of-service condition.

vulnerability uaf dos
2r 1t 1c
critical advisory

zhayujie chatgpt-on-wechat CowAgent Authentication Bypass (CVE-2026-6129)

CVE-2026-6129 is a critical vulnerability in zhayujie chatgpt-on-wechat CowAgent up to version 2.0.4, allowing remote attackers to bypass authentication via manipulation of the Agent Mode Service.

cve-2026-6129 authentication-bypass chatgpt-on-wechat
2r 1t 1c 1i
high advisory

Mesa WebGPU Out-of-Bounds Write Vulnerability (CVE-2026-40393)

An out-of-bounds write vulnerability exists in Mesa versions before 25.3.6 and 26 before 26.0.1 due to an untrusted allocation size in WebGPU, potentially leading to code execution.

cve vulnerability webgpu
2r 1c
high advisory

MyT-PM 1.5.1 SQL Injection Vulnerability

MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.

sql-injection web-application cve-2019-25713
2r 1t 1c 4i
high advisory

Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability

Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.

sqli cve-2019-25710 dolibarr web-application
2r 1t 1c
high advisory

ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability

ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.

sqli impresscms cve-2019-25703
2r 1t 1c 5i
high advisory

eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)

eBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.

sql-injection web-application cve-2019-25707
2r 1t 1c 5i
critical advisory

Across DR-810 Unauthenticated File Disclosure Vulnerability

Across DR-810 routers are vulnerable to unauthenticated file disclosure, allowing remote attackers to download the rom-0 backup file containing sensitive information, such as router passwords and configuration data, via a simple GET request to the rom-0 endpoint.

cve-2019-25706 file-disclosure router network
2r 1t 1c 4i
high advisory

Easy Video to iPod Converter 1.6.20 Local Buffer Overflow Vulnerability

Easy Video to iPod Converter 1.6.20 is vulnerable to a local buffer overflow in the user registration field, allowing a local attacker to overwrite the structured exception handler (SEH) by providing a crafted payload exceeding 996 bytes in the username field, potentially leading to arbitrary code execution with user privileges.

cve-2019-25701 buffer-overflow local-privilege-escalation windows
2r 2t 1c
high advisory

CMSsite 1.0 SQL Injection Vulnerability (CVE-2019-25697)

CMSsite 1.0 is vulnerable to unauthenticated SQL injection (CVE-2019-25697) via the cat_id parameter in category.php, allowing attackers to extract sensitive database information.

sqli cve-2019-25697 webserver
2r 2t 1c
critical advisory

RGui 3.5.0 Local Buffer Overflow Vulnerability

RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation, leading to arbitrary code execution.

buffer-overflow dep-bypass rgui cve-2018-25258 windows
2r 2t 1c
high advisory

HTML5 Video Player 1.2.5 Local Buffer Overflow Vulnerability

HTML5 Video Player version 1.2.5 is vulnerable to a local buffer overflow, allowing attackers to execute arbitrary code by providing an oversized key code string through the Help Register dialog.

buffer-overflow code-execution html5-video-player
2r 4t 1c
critical advisory

Tenda F451 Router Stack-Based Buffer Overflow Vulnerability

A remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.

tenda router buffer-overflow cve-2026-6120 iot
2r 1t 1c
high advisory

zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)

CVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.

CVE-2026-6126 authentication-bypass web-application
2r 1t 1c
critical advisory

Tenda F451 Router Stack-Based Buffer Overflow Vulnerability

Tenda F451 router version 1.0.0.7 is vulnerable to a stack-based buffer overflow in the frmL7ProtForm function, enabling remote attackers to execute arbitrary code by manipulating the 'page' argument.

cve-2026-6122 buffer-overflow router tenda
2r 1t 1c
critical advisory

Tenda F451 Stack-Based Buffer Overflow Vulnerability (CVE-2026-6121)

A stack-based buffer overflow vulnerability (CVE-2026-6121) exists in the WrlclientSet function of the /goform/WrlclientSet file in the httpd component of Tenda F451 version 1.0.0.7, allowing remote attackers to execute arbitrary code by manipulating the GO argument.

cve-2026-6121 buffer-overflow tenda router
2r 1t 1c
critical advisory

perfree go-fastdfs-web Improper Authorization Vulnerability (CVE-2026-6105)

CVE-2026-6105 is a critical vulnerability in perfree go-fastdfs-web versions up to 1.3.7, allowing for remote improper authorization due to a flaw in the doInstall Interface, potentially leading to unauthorized system access and control.

CVE-2026-6105 Improper Authorization go-fastdfs-web
2r 1t 1c
medium advisory

Chamilo LMS Session Fixation Vulnerability (CVE-2026-31940)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to session fixation due to user-controlled request parameters being used to set the PHP session ID, potentially allowing attackers to hijack user sessions.

session-fixation web-application cve-2026-31940
2r 1t 1c
critical advisory

Wasmtime Winch Compiler Aarch64 Sandbox Escape Vulnerability

A sandbox escape vulnerability exists in Wasmtime versions 25.0.0 to 36.0.7, 37.0.0 to 42.0.2, and version 43.0.0 when using the Winch compiler backend on aarch64 architecture, potentially allowing a Wasm guest to access host memory outside its sandbox, leading to denial of service, data leaks, or remote code execution.

wasmtime sandbox-escape memory-corruption aarch64
2r 2t 1c
critical advisory

Unauthenticated Arbitrary File Write in Saltcorn

Unauthenticated attackers can exploit a vulnerability in Saltcorn versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 to write arbitrary files and list directory contents on the server.

saltcorn file-write vulnerability
2r 1t 1c
medium advisory

TREK Travel Planner Missing Authorization Vulnerability (CVE-2026-40185)

TREK collaborative travel planner before version 2.7.2 is vulnerable to missing authorization checks on the Immich trip photo management routes, potentially allowing unauthorized access to trip photos.

cve-2026-40185 authorization-bypass web-application
2r 1t 1c 1i
high advisory

SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams

SiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.

siyuan ntlm ssrf credential-theft mermaid
2r 3t 1c
high advisory

Red Hat OpenShift AI odh-dashboard Kubernetes Token Disclosure (CVE-2026-5483)

CVE-2026-5483 is a high-severity vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) that allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint, potentially leading to unauthorized access to Kubernetes resources.

openshift kubernetes token-disclosure cve-2026-5483
2r 1t 1c
high advisory

Postiz SSRF Vulnerability (CVE-2026-40168)

Postiz, an AI social media scheduling tool, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 2.21.5, allowing attackers to access internal resources.

ssrf cve-2026-40168 postiz
2r 1c
critical advisory

Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host

This rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.

threat-detection higher-order-rule elastic-defend
2r 8t
high advisory

Math.js Improperly Controlled Modification of Object Attributes Leads to RCE

A vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.

mathjs rce expression-injection
2r 1t
critical advisory

LiteLLM Remote Code Execution via Bytecode Rewriting (CVE-2026-40217)

LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI, potentially leading to complete system compromise.

CVE-2026-40217 litellm rce bytecode-rewriting
2r 1t 1c
high advisory

Helm Plugin Path Traversal Vulnerability

A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.

helm path-traversal vulnerability plugin kubernetes
2r 1t 1c
critical advisory

Elastic Defend Alert from Package Manager Install Ancestry

This rule detects Elastic Defend alerts where the alerted process has a package-manager install context in its ancestry (npm, PyPI, Rust), indicating potential supply chain compromise via malicious postinstall scripts.

supply-chain initial-access package-manager elastic-defend post-install
3r 1t
high advisory

DotNetNuke.Core Stored XSS via SVG Upload

DotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.

dotnetnuke xss svg web-application
2r 2t
high advisory

CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)

CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.

privilege-escalation web-application cve
2r 1t 1c
critical advisory

Chamilo LMS Weak Password Reset Vulnerability (CVE-2026-33707)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to a weak password reset mechanism, allowing attackers to compute password reset tokens using only a user's email address due to the use of SHA1 hashing without randomization, expiration, or rate limiting, leading to unauthorized account takeover.

CVE-2026-33707 chamilo lms password-reset credential-access
2r 1t 1c 1i
critical advisory

Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)

Chamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.

chamilo rce eval-injection cve-2026-33618
2r 1t 1c
high advisory

Chamilo LMS SSRF Vulnerability in Social Wall Feature

A Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.

chamilo ssrf cve-2026-31941 lms
2r 1t 1c
high advisory

Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.

cve-2026-33710 chamilo api-key brute-force webserver
2r 1t 1c
high advisory

Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)

Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.

privilege-escalation web-application CVE-2026-33706
2r 1t 1c
high advisory

Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)

A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.

path-traversal file-deletion chamilo-lms
2r 1t 1c 1i
high advisory

Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)

CVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.

php lfi wordpress cve-2025-5804
2r 1t 1c 1i
high advisory

CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)

CVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.

wordpress lfi cve-2025-58913
2r 1t 1c
high advisory

BugSink Authenticated File Write Vulnerability (CVE-2026-40162)

BugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.

cve-2026-40162 file-write authentication
2r 1t 1c 1i
low advisory

AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance

An AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.

cloud aws s3 reconnaissance
2r 4t
high advisory

@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability

A vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.

sveltekit denial-of-service vulnerability
2r 1t 1c
critical advisory

wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.

wordpress file-deletion plugin CVE-2026-5809
2r 1t 1c
critical advisory

BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)

The BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.

wordpress buddypress privilege-escalation cve-2026-5144 cloud
2r 1t 1c
high advisory

Chartbrew Cross-Tenant Authorization Bypass Vulnerability

Chartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.

chartbrew authorization-bypass web-application
2r 1t 1c
critical advisory

Goshs File-Based ACL Authorization Bypass Vulnerability

Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.

authorization bypass acl file upload file deletion CVE-2026-40189
3r 4t 4i
critical advisory

PraisonAI Remote Code Execution via Malicious Workflow YAML

PraisonAI is vulnerable to remote code execution; loading untrusted YAML files with `type: job` can lead to arbitrary host command execution, potentially enabling full system compromise.

praisonai rce yaml
2r 1t 2i
critical advisory

PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution

A vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.

rce command-injection praisonai
2r 3t
critical advisory

LXD Backup Import Bypass Allows Privilege Escalation in Restricted Projects

A vulnerability in LXD allows an attacker with instance-creation rights in a restricted project to bypass project restrictions and escalate privileges by crafting a malicious backup archive.

lxd privilege-escalation container-escape cve-2026-34178
2r 1t
high advisory

Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)

An Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.

idor chamilo lms cve-2026-32930
2r 2t 1c
medium advisory

Entra ID ADRS Token Request by Microsoft Authentication Broker

Detects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.

azure entra_id persistence oauth
2r 2t 1i
high advisory

OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.

cve-2026-35660 openclaw access-control privilege-escalation
2r 1t 1c 5i
medium advisory

GitHub Exfiltration via High Number of Repository Clones

A single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.

github exfiltration code_repository
2r 3t
high advisory

OpenClaw Path Traversal Vulnerability (CVE-2026-35668)

OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.

path-traversal vulnerability openclaw
2r 1t 1c
critical advisory

OpenClaw WebView JavascriptInterface Vulnerability (CVE-2026-35643)

OpenClaw before 2026.3.22 is vulnerable to arbitrary code execution due to an unvalidated WebView JavascriptInterface, allowing attackers to inject malicious instructions by invoking the canvas bridge from untrusted pages.

cve-2026-35643 rce android
2r 1t 1c
high advisory

OpenClaw Arbitrary Code Execution via Malicious .npmrc File

OpenClaw before 2026.3.24 is vulnerable to arbitrary code execution via local plugin and hook installation, where an attacker can craft a .npmrc file with a git executable override to execute malicious code during npm install.

cve-2026-35641 code-execution npm
2r 1t 1c 1i
medium advisory

AWS STS GetCallerIdentity API Called for the First Time

An adversary with access to compromised AWS credentials may attempt to verify their validity and determine the account they are using by calling the STS GetCallerIdentity API, potentially indicating credential compromise and unauthorized discovery activity.

cloud aws sts discovery
2r 2t
high advisory

Multiple External EDR Alerts by Host

This rule detects multiple external EDR alerts on the same host, indicating a potential compromise, by analyzing alert data from various EDR solutions like CrowdStrike, SentinelOne, and M365 Defender to identify hosts triggering multiple alerts, enabling prioritization of investigation and response.

threat-detection edr endpoint
3r 3t
high advisory

Multiple Cloud Secrets Accessed by Single Source IP

A single source IP accessing secret-management APIs across multiple cloud providers (AWS, GCP, Azure) and Kubernetes clusters within a short timeframe indicates potential credential theft, session hijacking, or token replay.

credential-access cloud kubernetes
2r 1t
low advisory

AWS SSM Command Document Created by Rare User

An AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.

cloud aws ssm execution
2r 1t
high advisory

AWS IAM Login Profile Added for Root

An adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.

cloud aws iam persistence
2r 2t
medium advisory

AWS EC2 LOLBin Execution via SSM SendCommand

Detection of Living Off the Land Binaries (LOLBins) or GTFOBins execution on EC2 instances via AWS Systems Manager (SSM) SendCommand API, potentially indicating malicious activity.

aws ec2 ssm lolbin execution cloud
2r 2t
medium advisory

Zootemplate Cerato Theme Reflected XSS Vulnerability (CVE-2025-58920)

A reflected cross-site scripting (XSS) vulnerability exists in the Zootemplate Cerato WordPress theme (versions n/a through 2.2.18) due to improper neutralization of user-supplied input, potentially allowing attackers to execute arbitrary JavaScript in a user's browser.

xss wordpress reflected-xss
2r 1t 1c 1i
critical advisory

Juju CloudSpec API Authorization Bypass (CVE-2026-5412)

CVE-2026-5412 describes an authorization issue in Juju versions prior to 2.9.57 and 3.6.21, where a low-privileged authenticated user can call the CloudSpec API method to extract cloud credentials used to bootstrap the controller, leading to sensitive credential exposure.

vulnerability authorization cloud
2r 1t 1c 1i
medium advisory

Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)

The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.

wordpress missing-authorization plugin cve-2026-4162
2r 1t 1c
high advisory

Synology SSL VPN Client Plaintext Password Storage Vulnerability (CVE-2021-47961)

Synology SSL VPN Client before 1.4.5-0684 stores passwords in plaintext, allowing remote attackers to potentially access or manipulate user PIN codes, leading to unauthorized VPN configuration and traffic interception.

plaintext-password vpn synology
2r 1t 1c
high advisory

Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)

A remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.

cve-2026-6038 sql-injection web-application
2r 3t 1c
high advisory

SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)

A remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.

sqli cve-2026-6036 web-application
2r 2t 1c
critical advisory

IBM Semeru Runtime Code Execution Vulnerability

A remote, anonymous attacker can exploit a vulnerability in IBM Semeru Runtime and IBM DB2 to execute arbitrary program code.

code-execution vulnerability ibm
2r 1t
medium advisory

Google Chrome Device Bound Session Credentials (DBSC) Mitigates Cookie Theft

Google's rollout of Device Bound Session Credentials (DBSC) in Chrome 146 for Windows, with a future release planned for macOS, cryptographically binds authentication sessions to the user's device, rendering stolen session cookies unusable and mitigating credential access.

cookie-theft credential-access chrome
2r 1t
high advisory

Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)

The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.

wordpress perfmatters file-overwrite path-traversal
2r 2t 1c
high advisory

Samsung MagicINFO 9 Server Local Privilege Escalation via Incorrect Default Permissions (CVE-2026-25203)

Samsung MagicINFO 9 Server versions prior to 21.1091.1 are susceptible to a local privilege escalation vulnerability due to incorrect default permissions, potentially allowing a low-privilege user to gain elevated privileges on the system.

privilege-escalation samsung magicinfo
2r 1t 1c 1i
critical advisory

Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution

Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.

wordpress joomla remote-code-execution plugin
3r 9t 1c
critical advisory

PraisonAI Template Injection Vulnerability (CVE-2026-40154)

PraisonAI before version 4.5.128 is vulnerable to supply chain attacks due to treating remotely fetched template files as trusted executable code without proper verification, enabling exploitation via malicious templates.

cve-2026-40154 template-injection supply-chain
2r 1t 1c 2i
high advisory

PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion

PraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.

cve-2026-40116 resource-exhaustion websocket api-abuse cloud
2r 1t 1c
high advisory

PraisonAI SSRF Vulnerability via Unvalidated Webhook URL

PraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.

ssrf praisonai cve-2026-40114 web-application
2r 3t 1c
high advisory

OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)

OpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.

access-control vulnerability webserver
2r 1t 1c
medium advisory

Juniper Junos OS and Junos OS Evolved BGP Session Reset Denial of Service (CVE-2026-33797)

CVE-2026-33797 is an improper input validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved that allows an unauthenticated adjacent attacker to reset established BGP sessions via a specific BGP packet, leading to a denial of service condition.

cve-2026-33797 denial-of-service juniper bgp network
3r 2t 1c
critical advisory

Juniper Junos OS MX Series Missing Authorization Vulnerability

CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.

privilege-escalation network juniper
2r 1t 1c
critical advisory

D-Link DIR-605L Router Buffer Overflow Vulnerability (CVE-2026-5980)

A buffer overflow vulnerability exists in the D-Link DIR-605L router version 2.13B01, allowing a remote attacker to execute arbitrary code by manipulating the `curTime` argument in the `formSetMACFilter` function.

cve buffer_overflow router d-link
2r 4t 1c
critical advisory

D-Link DIR-605L Router Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.

dlink router buffer_overflow cve-2026-5979
2r 1t 1c
high advisory

Nimiq Blockchain Timestamp Manipulation Vulnerability

A vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.

blockchain timestamp-manipulation inflation
2r 4t 1c
high advisory

bsv-sdk and bsv-wallet Credential Forgery Vulnerability

The bsv-sdk and bsv-wallet packages are vulnerable to credential forgery because the `acquire_certificate` function persists certificate records to storage without verifying the certifier's signature, allowing attackers to forge identity certificates.

credential-forgery ruby bsv-sdk bsv-wallet
2r 1t
high advisory

MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)

A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.

command-injection metagpt cve-2026-5974
2r 1t 1c
critical advisory

MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)

A remote command injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.

CVE-2026-5972 command-injection metagpt
2r 1t 1c
critical advisory

PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)

PraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.

cve-2026-40088 command-injection praisonai
2r 1t 1c 1i
high advisory

CVE-2026-4436: Modbus Odorant Injection Manipulation

A low-privileged remote attacker can exploit CVE-2026-4436 by sending Modbus packets to manipulate register values controlling odorant injection in gas lines, potentially leading to hazardous conditions.

cve modbus industrial-control-system odorant-injection
2r 2t 1c
high advisory

HDF5 Heap Use-After-Free Vulnerability in h5dump (CVE-2026-34734)

A heap-use-after-free vulnerability (CVE-2026-34734) in HDF5 version 1.14.1-2 and earlier within the h5dump helper utility can be triggered by a malicious h5 file, leading to arbitrary code execution.

hdf5 heap-use-after-free cve-2026-34734 h5dump
2r 1t 1c
critical advisory

Contemporary Controls BASC 20T Packet Forging Vulnerability

CVE-2025-13926 describes a vulnerability in Contemporary Controls BASC 20T that allows an attacker to sniff network traffic and forge packets to make arbitrary requests, potentially leading to unauthorized actions.

cve-2025-13926 basc-20t packet-forging industrial-control-system
2r 1t 1c
high advisory

MetaGPT Code Injection Vulnerability (CVE-2026-5970)

A code injection vulnerability, CVE-2026-5970, exists in FoundationAgents MetaGPT up to version 0.8.1, allowing remote attackers to execute arbitrary code via manipulation of the `check_solution` function in the HumanEvalBenchmark/MBPPBenchmark component.

code-injection metagpt cve-2026-5970
2r 1t 1c
high advisory

FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)

A code injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.

code-injection vulnerability metagpt CVE-2026-5971
2r 1t 1c
high advisory

BSV Ruby SDK Improper ARC Response Handling

BSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.

bsv ruby blockchain vulnerability
2r 1t 1c
critical advisory

AGiXT Path Traversal Vulnerability (CVE-2026-39981)

AGiXT versions prior to 1.9.2 are vulnerable to path traversal (CVE-2026-39981) due to insufficient validation in the safe_join() function, allowing authenticated attackers to read, write, or delete arbitrary files.

path-traversal cve agixt web-application
2r 3t 1c 4i
high advisory

GNUTLS Denial of Service via Malformed ClientHello (CVE-2026-1584)

A remote, unauthenticated attacker can exploit CVE-2026-1584 in gnutls by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake, leading to a NULL pointer dereference and a denial-of-service condition.

cve-2026-1584 denial-of-service gnutls
2r 2t 1c
high advisory

SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation

Threat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.

saas phishing ransomware medusa
1r 1t 1c 2i
high advisory

MinIO S3 Select CSV Parsing Denial of Service

MinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.

dos minio s3select
2r 1t
critical advisory

Axios NO_PROXY Hostname Normalization Bypass Leads to SSRF

Axios is vulnerable to a NO_PROXY hostname normalization bypass leading to SSRF, where requests to loopback addresses like `localhost.` or `[::1]` bypass `NO_PROXY` rules, allowing attackers to force requests through a proxy and potentially exfiltrate sensitive data.

ssrf no_proxy axios hostname_normalization
2r 1t 1c
high advisory

Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)

Laravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.

cve-2026-39976 laravel oauth2 authentication bypass
2r 1t 1c
high advisory

Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion

Tmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.

dbus vulnerability dotnet
2r 1t 1c
high advisory

Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)

Plane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.

ssrf cve-2026-39843 plane project-management
2r 1t 1c
high advisory

osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)

A stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.

osslsigncode buffer-overflow authenticode code-signing CVE-2026-39853
2r 1t 1c
high advisory

OPNsense LDAP Injection Vulnerability (CVE-2026-34578)

OPNsense versions prior to 26.1.6 are vulnerable to LDAP injection, allowing unauthenticated attackers to enumerate valid LDAP usernames and bypass group membership restrictions via the WebGUI login page.

ldap-injection vulnerability opnsense
2r 1t 1c
high advisory

OpenClaw RCE via Build Tool Environment Variable Injection

OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.

rce environment-variable-injection openclaw
2r 2t
high advisory

OpenClaw Trust Model Vulnerability: System Prompt Channel Injection

OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.

openclaw trust-model system-prompt-injection npm
2r
high advisory

HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)

HashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.

cve-2026-4660 file-read go-getter information-disclosure
2r 1t 1c 1i
medium advisory

Saleor GraphQL Batch Query Resource Exhaustion Vulnerability (CVE-2026-33756)

Unauthenticated attackers can exploit a resource exhaustion vulnerability (CVE-2026-33756) in Saleor e-commerce platform versions before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118 by sending a single HTTP request with a large number of GraphQL operations, bypassing query complexity limits and exhausting server resources.

resource-exhaustion graphql cve-2026-33756 dos
2r 1t 1c
high advisory

OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability

A heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.

openexr heap-overflow dwaa cve-2026-34589
2r 1t 1c 1i
critical advisory

Nix Package Manager Arbitrary File Overwrite Vulnerability

A flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.

nix privilege-escalation linux vulnerability
2r 1t 2c
high advisory

WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)

An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.

cve-2024-1490 wago-plc openvpn rce code-injection
2r 1t 1c 2i
high advisory

Vim Vulnerability Allows Local Code Execution

A local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.

vim code-execution local-privilege-escalation
2r 1t
critical advisory

Multiple Vulnerabilities in Zammad

Multiple vulnerabilities in Zammad allow a remote attacker to execute arbitrary code, bypass security measures, disclose sensitive information, and perform cross-site scripting attacks.

zammad vulnerability code execution xss
2r 3t
high advisory

Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)

CVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.

cve authorization-bypass router
2r 1t 1c
critical advisory

D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)

A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.

command-injection d-link router cve-2026-5844
2r 1t 1c 2i
critical advisory

Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)

A stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.

cve-2026-5830 tenda router buffer-overflow stack-overflow
2r 2t 1c
high advisory

code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)

A remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.

sql-injection web-application cve-2026-5829
2r 1t 1c
high advisory

Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)

CVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.

sqli web-application injection
2r 1t 1c
high advisory

UAC (Unix-like Artifacts Collector) Command Injection Vulnerability

UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.

command-injection vulnerability uac
2r 1t 1c
high advisory

parseusbs Unsanitized LNK File Command Injection Vulnerability

parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.

command injection lnk parseusbs cve-2026-40029
2r 1t 1c
high advisory

parseusbs OS Command Injection Vulnerability (CVE-2026-40030)

parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.

command-injection vulnerability linux
2r 1t 1c 1i
high advisory

MemProcFS DLL and Shared Library Hijacking Vulnerability

MemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.

dll-hijacking library-hijacking code-execution memprocfs cve-2026-40031
2r 3t 1c
high advisory

Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)

A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.

path traversal code execution privilege escalation sleuth kit CVE-2026-40024
2r 3t 1c
critical advisory

PraisonAI Vulnerable to OS Command Injection

PraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.

command-injection rce praisonai
2r 1t 1i
high advisory

PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)

PraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.

cve-2026-39889 information-disclosure web-application
2r 1t 1c 1i
medium advisory

First Time Python Process Creates macOS Launch Agent or Daemon

This rule detects the initial creation or modification of a macOS LaunchAgent or LaunchDaemon plist file by a Python process, a common persistence technique employed by attackers using malicious scripts, compromised dependencies, or model file deserialization.

persistence macos python
2r 2t
high advisory

Kamailio Out-of-Bounds Access Denial of Service Vulnerability

A remote attacker can exploit an out-of-bounds access vulnerability (CVE-2026-39863) in Kamailio versions prior to 6.1.1, 6.0.6, and 5.8.8 by sending a specially crafted data packet over TCP, causing a denial-of-service condition.

dos cve-2026-39863 kamailio
2r 1t 1c
high advisory

InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)

A non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.

inventree privilege-escalation cve-2026-35476
2r 1t 1c 1i
high advisory

React Server Components Denial of Service Vulnerability (CVE-2026-23869)

A denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.

CVE-2026-23869 denial-of-service react
2r 1t 1c
medium advisory

LORIS Directory Traversal Vulnerability

LORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.

directory-traversal web-application neuroimaging
2r 2t 1c
high advisory

Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)

A stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.

immich xss cve-2026-35455 webserver
2r 2t 1c
medium advisory

Saleor GraphQL Resource Exhaustion Vulnerability (CVE-2026-35401)

A remote, unauthenticated attacker can cause resource exhaustion in Saleor e-commerce platforms via maliciously crafted GraphQL API requests, leading to denial of service.

cve-2026-35401 graphql resource-exhaustion denial-of-service saleor
2r 1t 1c
high advisory

LORIS File Traversal Vulnerability (CVE-2026-34392)

A file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.

file-traversal web-application cve-2026-34392
2r 1t 1c
high advisory

mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications

The mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.

ssrf openapi mcp-from-openapi
2r 2i
high advisory

Logstash Arbitrary File Write via Path Traversal (CVE-2026-33466)

CVE-2026-33466 describes a vulnerability in Logstash where improper validation of file paths within compressed archives allows arbitrary file writes, potentially leading to remote code execution.

path-traversal remote-code-execution logstash
2r 2t 1c
medium advisory

Red Hat Quay Image Upload Interference Vulnerability (CVE-2026-32589)

CVE-2026-32589 describes a vulnerability in Red Hat Quay's container image upload process where an authenticated user can interfere with other users' uploads, potentially leading to unauthorized access and modification.

quay image upload vulnerability
2r 2t 1c
critical advisory

Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)

CVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.

cve-2026-32590 redhat-quay deserialization rce
2r 2t 1c
medium advisory

Kibana Fleet Plugin Privilege Escalation via CVE-2026-4498

CVE-2026-4498 allows an authenticated Kibana user with Fleet sub-feature privileges to read index data beyond their direct Elasticsearch RBAC scope due to improper privilege handling in debug route handlers.

cve privilege-escalation kibana
2r 1t 1c 1i
high advisory

Unauthenticated Access to kcp Cache Server

The kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.

kcp kubernetes cache authentication authorization privilege-escalation
2r 2t
high advisory

XWiki Remote Code Execution via Unprotected Velocity Scripting API

XWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.

xwiki rce velocity scripting CVE-2026-33229
2r 2t
critical advisory

Apache ActiveMQ Classic RCE via Jolokia API Exploitation

A remote code execution vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic allows authenticated attackers to invoke management operations through the Jolokia API to retrieve a remote configuration file and execute OS commands, potentially exploitable without authentication via CVE-2024-32114.

activemq rce jolokia cve-2026-34197 cve-2024-32114 cve-2022-41678 spring-xml
2r 3t 3c
high advisory

CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)

Unauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.

xss cve-2026-5301 web-application
2r 2t 1c
medium advisory

Dell ECS and ObjectScale Sensitive Information Logging Vulnerability (CVE-2026-28261)

Dell Elastic Cloud Storage and ObjectScale are vulnerable to local privilege escalation due to sensitive information being logged, potentially allowing a low-privileged attacker with local access to expose secrets and gain unauthorized access.

cve-2026-28261 secret-leak privilege-escalation
2r 1t 1c
critical advisory

CoolerControl Command Injection Vulnerability (CVE-2026-5208)

CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.

command-injection privilege-escalation coolercontrol
2r 1t 1c
high advisory

WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)

The WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.

woocommerce sqli cve-2026-3396 wordpress plugin
2r 1t 1c
medium advisory

OpenClaw Agent Suspicious Child Process Execution

Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.

ai-agent execution malware credential-theft
2r 10t 3i
high advisory

NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.

cve-2026-32864 labview memory-corruption out-of-bounds-read
2r 4t 1c 1i
high advisory

Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)

Drizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.

sql-injection drizzle-orm cve-2026-39356 typescript orm
2r 5t 1c
high advisory

ChurchCRM Stored XSS Vulnerability in Person Property Management

A stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.

xss web-application churchcrm
2r 1t 2c
high advisory

D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability

The 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.

d-link router airsnitch vulnerability network-traffic-manipulation
2r 5t
high advisory

WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps

The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress plugin file-upload remote-code-execution
2r 2t 1c
high advisory

ASDA-Soft Stack-based Buffer Overflow Vulnerability (CVE-2026-5726)

A stack-based buffer overflow vulnerability exists in ASDA-Soft, potentially leading to arbitrary code execution, as identified by CVE-2026-5726 and reported by Deltaww with a CVSS v3.1 score of 7.8.

buffer-overflow asda-soft cve-2026-5726
2r 6t 1c 3i
high advisory

Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)

The Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.

wordpress woocommerce csrf cve-2026-3499
3r 1t 1c
critical advisory

Everest Forms WordPress Plugin PHP Object Injection Vulnerability

The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.

wordpress php object-injection rce cve-2026-3296
2r 2t 1c
medium advisory

IBM Tivoli Netcool Impact Sensitive Information Leak via Log Files (CVE-2026-4788)

IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files, potentially exposing it to unauthorized local users, tracked as CVE-2026-4788.

cve-2026-4788 information-disclosure log-files
2r 1t 1c 1i
critical advisory

IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)

IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.

cve-2026-3357 deserialization rce langflow
2r 1t 1c
medium advisory

IBM Verify and Security Verify Access Container Server-Side Request Forgery Vulnerability (CVE-2026-1343)

CVE-2026-1343 allows an attacker to contact internal authentication endpoints protected by the Reverse Proxy in IBM Verify Identity Access Container and IBM Security Verify Access Container.

cve cve-2026-1343 ssrf ibm
2r 2t 1c
critical advisory

IBM Verify Access and Security Verify Access Container Privilege Escalation (CVE-2026-1346)

A locally authenticated user can escalate privileges to root on vulnerable IBM Verify Identity Access Container and IBM Security Verify Access Container installations due to the execution of processes with unnecessary privileges, as tracked by CVE-2026-1346.

privilege-escalation cve-2026-1346 ibm
2r 1t 1c
high advisory

Amazon Firecracker Virtio PCI Out-of-Bounds Write Vulnerability (CVE-2026-5747)

An out-of-bounds write vulnerability in Amazon Firecracker's virtio PCI transport (CVE-2026-5747) allows a local guest user with root privileges to potentially crash the VMM process or execute arbitrary code on the host.

cve-2026-5747 firecracker out-of-bounds write vmm virtio
3r 2t 1c
high advisory

WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix

WWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.

ssrf avideo cve-2026-39370
2r 1t 2c 1i
high advisory

File Browser Share Links Accessible After Permission Revocation

File Browser share links remain accessible after Share/Download permissions are revoked, allowing continued access to shared files even after an administrator revokes the user's permissions.

filebrowser authorization-bypass github-advisory cve-2026-35604
3r 1t 1c
high advisory

LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash

LiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.

litellm authentication-bypass credential-access privilege-escalation
2r 1t
critical advisory

Emmett Web Framework Path Traversal Vulnerability (CVE-2026-39847)

Emmett web framework versions 2.5.0 to before 2.8.1 are vulnerable to path traversal attacks (CVE-2026-39847), allowing attackers to read arbitrary files outside the intended assets directory using manipulated URLs.

path-traversal web-application emmett cve-2026-39847
2r 1t 1c
high advisory

Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop

Podman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.

podman-desktop denial-of-service information-disclosure cve-2026-34045 linux windows
2r 4t 1c
high advisory

PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)

A code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.

code-injection powerjob cve-2026-5739
2r 1t 1c
high advisory

OpenObserve SSRF via Improper IPv6 Validation

OpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.

ssrf openobserve cloud vulnerability
2r 1t 1c 1i
high advisory

NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)

A memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.

cve-2026-32863 labview out-of-bounds read memory corruption arbitrary code execution information disclosure
2r 5t 1c
high advisory

NI LabVIEW Memory Corruption Vulnerability (CVE-2026-32862)

A memory corruption vulnerability (CVE-2026-32862) in NI LabVIEW versions 2026 Q1 (26.1.0) and prior, stemming from an out-of-bounds write in ResFileFactory::InitResourceMgr(), can lead to information disclosure or arbitrary code execution if a user opens a malicious VI file.

cve-2026-32862 ni-labview memory-corruption rce
2r 5t 1c
high advisory

NI LabVIEW LVLIB File Parsing Memory Corruption Vulnerability (CVE-2026-32860)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVLIB file, potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvlib file.

cve-2026-32860 labview memory corruption out-of-bounds write lvlib
2r 2t 1c 1i
high advisory

NI LabVIEW LVCLASS File Parsing Out-of-Bounds Write Vulnerability (CVE-2026-32861)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVCLASS file (CVE-2026-32861), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvclass file.

cve-2026-32861 labview out-of-bounds write memory corruption
2r 4t 1c
high advisory

Mise Trust Bypass Vulnerability via Malicious .mise.toml

A vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.

mise trust-bypass code-execution vulnerability
2r 2t
high advisory

PowerJob SQL Injection Vulnerability (CVE-2026-5736)

A remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.

sql-injection vulnerability powerjob
2r 1t 1c
critical advisory

Genealogy PHP Application Broken Access Control Vulnerability (CVE-2026-39355)

A critical broken access control vulnerability (CVE-2026-39355) in Genealogy PHP application versions prior to 5.9.1 allows authenticated users to transfer ownership of arbitrary teams, leading to complete takeover of team workspaces and unrestricted data access.

broken-access-control php genealogy CVE-2026-39355
2r 6t 1c
critical advisory

ChurchCRM Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39337)

A critical pre-authentication remote code execution vulnerability in ChurchCRM versions prior to 7.1.0 allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise.

rce cve-2026-39337 churchcrm
2r 2t 2c
high advisory

ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)

An authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.

cve-2026-39331 churchcrm authorization-bypass privilege-escalation web-application
2r 1t 1c
critical advisory

ChurchCRM Path Traversal Vulnerability Leading to Remote Code Execution

A path traversal vulnerability in ChurchCRM versions prior to 6.5.3 allows authenticated administrators to upload arbitrary files, leading to remote code execution by overwriting Apache .htaccess files.

path-traversal rce churchcrm
2r 1t 1c
high advisory

NVIDIA Triton Inference Server Denial-of-Service Vulnerability (CVE-2026-24146)

NVIDIA Triton Inference Server is vulnerable to denial of service due to insufficient input validation that, when combined with a large number of outputs, can cause a server crash.

cve-2026-24146 denial-of-service nvidia triton
2r 1t 1c
high advisory

NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)

NVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.

cve-2026-24156 deserialization nvidia dali
2r 2t 1c 1i
high advisory

SoftEtherVPN Pre-Authentication Denial-of-Service Vulnerability (CVE-2026-39312)

SoftEtherVPN version 5.2.5188 and earlier is vulnerable to a pre-authentication denial-of-service attack where an unauthenticated remote attacker can crash the vpnserver process by sending a malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.

dos softethervpn cve-2026-39312 l2tp
2r 2t 1c
high advisory

PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)

PolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.

cve-2026-35610 privilege-escalation polarnl
2r 1t 1c 1i
high advisory

Emissary OS Command Injection Vulnerability (CVE-2026-35581)

Emissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.

cve command injection emissary
2r 1t 1c
critical advisory

Windmill Missing Authorization Vulnerability (CVE-2026-22683)

Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability (CVE-2026-22683) that allows users with the Operator role to bypass intended restrictions and perform unauthorized entity creation and modification actions via the backend API, potentially leading to privilege escalation and remote code execution.

windmill authorization-bypass privilege-escalation remote-code-execution
2r 2t 1c
critical advisory

Windmill CE/EE SQL Injection Vulnerability

Windmill CE/EE versions 1.276.0 through 1.603.2 are vulnerable to SQL injection in the folder ownership management, allowing authenticated attackers to inject SQL through the owner parameter, leading to sensitive data access, token forgery, and arbitrary code execution.

sql-injection rce windmill
2r 3t 1c
high advisory

libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)

CVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.

libssh mitm windows cve-2025-14821 insecure-configuration
2r 2t 1c
high advisory

ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)

ChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.

cve-2026-35567 sql-injection churchcrm
2r 1t 1c 2i
high advisory

text-generation-webui SSRF Vulnerability (CVE-2026-35486)

The text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.

ssrf text-generation-webui cve-2026-35486 cloud
2r 1t 1c 2i
high advisory

runZero Platform Superuser Privilege Escalation (CVE-2026-5373)

CVE-2026-5373 is an improper privilege management vulnerability in the runZero platform that allows all-organization administrators to promote accounts to superuser status, which was fixed in version 4.0.260202.0.

privilege-escalation cve runzero
2r 1t 1c 3i
critical advisory

Red Hat Open Cluster Management (OCM) Cross-Cluster Privilege Escalation via Forged Certificates (CVE-2026-4740)

CVE-2026-4740 describes a vulnerability in Red Hat Open Cluster Management (OCM) where improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge certificates, enabling cross-cluster privilege escalation.

kubernetes privilege-escalation cve-2026-4740 ocm acm
2r 1t 1c 1i
high advisory

LibRaw Heap-Based Buffer Overflow Vulnerability (CVE-2026-24660)

A heap-based buffer overflow vulnerability (CVE-2026-24660) exists in the x3f_load_huffman functionality of LibRaw commit d20315b, where a specially crafted malicious file can lead to a heap buffer overflow.

libraw heap-overflow cve-2026-24660
2r 1t 1c
high advisory

LibRaw Integer Overflow Vulnerability in deflate_dng_load_raw

CVE-2026-20884 is an integer overflow vulnerability in LibRaw's deflate_dng_load_raw function that leads to a heap buffer overflow when processing crafted DNG files.

libraw integer-overflow heap-buffer-overflow cve-2026-20884
2r 1t 1c
critical advisory

Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint

Weaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.

weaver e-cology rce unauthenticated cve-2026-22679
3r 1t 1c
critical advisory

GPUBreach: GPU Rowhammer Attack for Privilege Escalation

GPUBreach is a novel Rowhammer attack targeting GPUs, allowing privilege escalation to root shell by inducing bit flips in GDDR6 memory and exploiting memory-safety bugs in Nvidia drivers, posing a significant risk to shared cloud environments.

rowhammer privilege-escalation gpu cloud
2r 1t
high advisory

Apache Traffic Server Vulnerabilities Leading to Denial of Service

A remote attacker can exploit multiple vulnerabilities in Apache Traffic Server to conduct a denial of service or request smuggling attack.

apache traffic server denial of service request smuggling
2r 2t
medium advisory

OpenSSH GSSAPI Vulnerability Leads to Potential Denial-of-Service

A remote, anonymous attacker can exploit a vulnerability in OpenSSH GSSAPI and Ubuntu Linux to trigger undefined behavior or a potential denial-of-service attack.

openssh gssapi denial-of-service linux
2r 1t
high advisory

SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns

Attackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.

saas-abuse phishing credential-harvesting github jira
3r 1t 5i
high advisory

Malicious NPM Packages Target Strapi Users

A threat actor published 36 malicious NPM packages disguised as Strapi plugins in a supply chain attack, designed to execute code, escape containers, harvest credentials, and establish persistent implants on Linux systems targeting Strapi users, with specific focus on the Guardarian cryptocurrency payment gateway.

supply-chain npm strapi malware
3r 6t
medium advisory

CSRF Vulnerability in WordPress Under Construction Plugin (CVE-2026-34896)

A cross-site request forgery (CSRF) vulnerability exists in the Analytify Under Construction, Coming Soon & Maintenance Mode WordPress plugin (versions n/a through 2.1.1), potentially allowing attackers to execute unauthorized actions on behalf of legitimate users.

wordpress csrf vulnerability
2r 2t 1c
critical advisory

Amelia WordPress Plugin IDOR Vulnerability CVE-2026-5465

The Amelia WordPress plugin is vulnerable to an insecure direct object reference, allowing authenticated attackers with Provider-level access or higher to escalate privileges and gain persistence by taking over any WordPress account, including Administrator by manipulating the `externalId` field.

wordpress amelia idor privilege-escalation
2r 1t 1c
critical advisory

Remote Code Execution Vulnerability in JP1/IT Desktop Management Products (CVE-2025-65115)

CVE-2025-65115 is a remote code execution vulnerability affecting multiple versions of JP1/IT Desktop Management and related products on Windows, potentially allowing attackers to execute arbitrary code on vulnerable systems.

cve-2025-65115 rce jp1 windows
2r 1t 1c
critical advisory

Ninja Forms File Upload Plugin Vulnerability Leads to RCE

The Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress file-upload rce CVE-2026-0740
2r 2t 1c
critical advisory

AWS Research and Engineering Studio OS Command Injection Vulnerability (CVE-2026-5707)

A remote authenticated attacker can execute arbitrary commands as root on the virtual desktop host by crafting a malicious session name in AWS Research and Engineering Studio (RES) versions 2025.03 through 2025.12.01 due to unsanitized input, leading to complete system compromise.

cve command-injection aws res
2r 1t 1c
critical advisory

AWS Research and Engineering Studio (RES) RCE via FileBrowser API Vulnerability

CVE-2026-5709 is a critical vulnerability in AWS Research and Engineering Studio (RES) versions 2024.10 through 2025.12.01, allowing remote authenticated attackers to execute arbitrary commands on the cluster-manager EC2 instance through the FileBrowser API.

cve-2026-5709 rce aws res
2r 1t 1c
critical advisory

Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5686)

A stack-based buffer overflow vulnerability (CVE-2026-5686) exists in the Tenda CX12L router version 16.03.53.12, allowing remote attackers to potentially execute arbitrary code by manipulating the 'page' argument in the `/goform/RouteStatic` endpoint.

cve-2026-5686 tenda router stack-based buffer overflow remote code execution
2r 2t 1c
high advisory

Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.

tenda router buffer-overflow cve-2026-5684
2r 2t 1c
critical advisory

WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)

WeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.

cve-2026-35395 sql-injection web-application
2r 1t 1c
critical advisory

Brave CMS Missing Authorization Leads to Privilege Escalation

Brave CMS versions prior to 2.0.6 are vulnerable to privilege escalation due to a missing authorization check in the update role endpoint, allowing any authenticated user to gain Super Admin privileges.

cve-2026-35182 privilege-escalation web-application brave-cms
2r 1t 1c 1i
medium advisory

Brave CMS Insecure Direct Object Reference Vulnerability (CVE-2026-35183)

Brave CMS versions prior to 2.0.6 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability allowing authenticated users with edit permissions to delete images attached to articles owned by other users due to missing ownership verification in the deleteImage method.

idor brave-cms vulnerability
1r 1t 1c
medium advisory

openFPGALoader Heap-Buffer-Overflow Read Vulnerability

A heap-buffer-overflow read vulnerability exists in openFPGALoader 1.1.1 and earlier, allowing out-of-bounds heap memory access via a crafted .pof file, potentially leading to denial of service or information disclosure.

heap-buffer-overflow openFPGALoader denial-of-service information-disclosure
2r 1t 1c
critical advisory

Anthropic Claude Code CLI/SDK OS Command Injection Vulnerability

CVE-2026-35022 describes an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK that allows attackers with control over authentication settings to execute arbitrary commands, potentially leading to credential theft and environment variable exfiltration.

command-injection cve-2026-35022 anthropic claude
2r 2t 1c
high advisory

Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)

The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.

cve-2026-35021 command-injection anthropic
2r 1t 1c
high advisory

Samsung Exynos Wi-Fi Driver Use-After-Free Vulnerability (CVE-2025-54602)

A use-after-free vulnerability exists in the Wi-Fi driver of Samsung Mobile and Wearable Processors Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000 due to improper synchronization on a global variable, allowing attackers to trigger a race condition and potentially execute arbitrary code.

cve-2025-54602 use-after-free exynos samsung wifi
2r 1t 1c
high advisory

Samsung Exynos Processor Denial-of-Service Vulnerability (CVE-2025-57834)

A denial-of-service vulnerability, CVE-2025-57834, exists in Samsung Exynos processors and modems due to improper input validation, potentially leading to device malfunction or service disruption.

cve-2025-57834 denial-of-service samsung exynos
2r 1t 1c 1i
high advisory

Totolink A8000R Authentication Bypass Vulnerability (CVE-2026-5676)

A remote, unauthenticated attacker can bypass authentication on Totolink A8000R routers running firmware version 5.9c.681_B20180413 by manipulating the `langType` argument in the `setLanguageCfg` function of the `/cgi-bin/cstecgi.cgi` file.

cve-2026-5676 authentication-bypass totolink
2r 1t 1c
high advisory

Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)

A remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.

cve-2026-5677 totolink command-injection network-device
2r 1t 1c
critical advisory

text-generation-webui Path Traversal Vulnerability (CVE-2026-35050)

text-generation-webui versions prior to 4.1.1 are vulnerable to path traversal, allowing a high-privileged user to overwrite Python files and achieve arbitrary code execution by triggering the 'download-model.py' file through the application's 'Model' menu.

path traversal code execution text-generation-webui
2r 3t 1c 1i
critical advisory

Brave CMS Unrestricted File Upload Leads to Remote Code Execution

Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.

cve-2026-35164 rce file-upload brave-cms ckeditor php webserver
2r 3t 1c
high advisory

Plunk Email Platform CRLF Header Injection Vulnerability

A CRLF header injection vulnerability in Plunk versions prior to 0.8.0 allows authenticated API users to inject arbitrary email headers, enabling silent email forwarding, reply redirection, or sender spoofing.

crlf header-injection plunk cve-2026-34975 cloud
2r 1t 1c
high advisory

code-projects Online FIR System SQL Injection Vulnerability

A SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.

sqli cve-2026-5665 web-application
2r 1t 1c 6i
critical advisory

Vim Modeline Sandbox Bypass Vulnerability (CVE-2026-34982)

A critical vulnerability in Vim versions prior to 9.2.0276 allows arbitrary OS command execution via a crafted file that bypasses the modeline sandbox due to missing security checks, potentially leading to code execution.

vim modeline sandbox-bypass code-execution cve-2026-34982
3r 1t 1c 5i
high advisory

ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)

CVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.

sqlinjection cve-2026-34402 churchcrm webserver
2r 1t 1c
high advisory

Qualcomm Memory Corruption Vulnerability CVE-2026-21382

CVE-2026-21382 is a memory corruption vulnerability related to handling power management requests with improperly sized input/output buffers, potentially leading to code execution.

cve-2026-21382 buffer-overflow memory-corruption qualcomm
2r 2t 1c 1i
high advisory

Qualcomm Memory Corruption Vulnerability in Auxiliary Sensor Processing (CVE-2026-21374)

CVE-2026-21374 describes a memory corruption vulnerability due to insufficient buffer size validation when processing auxiliary sensor input/output control commands, potentially allowing a local attacker to execute arbitrary code with elevated privileges.

cve memory-corruption qualcomm sensor
2r 1t 1c
high advisory

Qualcomm IOCTL Memory Corruption Vulnerability (CVE-2026-21375)

CVE-2026-21375 is a memory corruption vulnerability in Qualcomm chipsets due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.

cve-2026-21375 qualcomm memory-corruption ioctl
2r 1t 1c
high advisory

Qualcomm Camera Driver Memory Corruption Vulnerability

A memory corruption vulnerability exists in Qualcomm camera sensor drivers due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.

memory-corruption driver-vulnerability qualcomm
2r 1t 1c
high advisory

Memory Corruption Vulnerability in DMABUF IOCTL Calls (CVE-2026-21380)

A use-after-free vulnerability, identified as CVE-2026-21380, exists due to memory corruption when using deprecated DMABUF IOCTL calls for video memory management, potentially leading to arbitrary code execution.

cve-2026-21380 memory-corruption use-after-free
2r 1t 1c
high advisory

CVE-2026-21378 Memory Corruption in Camera Sensor Driver

A memory corruption vulnerability (CVE-2026-21378) exists in a camera sensor driver due to improper validation of output buffer size during IOCTL processing, potentially leading to arbitrary code execution.

camera-driver memory-corruption ioctl
2r 1t 1c
medium advisory

Qualcomm Transient Denial-of-Service via FILS Discovery Frames (CVE-2026-21367)

CVE-2026-21367 describes a transient denial-of-service vulnerability in Qualcomm products that occurs when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans, potentially leading to service disruption.

dos qualcomm cve-2026-21367
2r 2t 1c 2i
high advisory

Qualcomm Memory Corruption Vulnerability (CVE-2026-21371)

CVE-2026-21371 is a memory corruption vulnerability due to insufficient size validation when retrieving an output buffer, potentially leading to information disclosure or arbitrary code execution on affected Qualcomm devices.

cve memory-corruption qualcomm
2r 1t 1c
high advisory

Memory Corruption Vulnerability in Satellite Data Decoding (CVE-2025-47392)

CVE-2025-47392 describes a memory corruption vulnerability that occurs when decoding corrupted satellite data files with invalid signature offsets, reported by Qualcomm, Inc.

cve-2025-47392 memory corruption satellite data
2r 1t 1c 1i
high advisory

CVE-2025-47391 Qualcomm Memory Corruption Vulnerability

CVE-2025-47391 is a memory corruption vulnerability due to a stack-based buffer overflow (CWE-121) while processing a frame request, as detailed in the Qualcomm security bulletin for April 2026, potentially leading to arbitrary code execution.

cve-2025-47391 memory corruption qualcomm stack-based buffer overflow
3r 3t 1c 2i
high advisory

CVE-2025-47390: JPEG Driver IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability (CVE-2025-47390) exists while preprocessing IOCTL requests in the JPEG driver, potentially leading to local privilege escalation or denial of service.

memory-corruption jpeg qualcomm
2r 1t 1c
high advisory

CVE-2025-47389 Memory Corruption Vulnerability in Attestation Report Generation

CVE-2025-47389 describes a memory corruption vulnerability stemming from a buffer copy operation failure due to an integer overflow during the attestation report generation process, potentially leading to arbitrary code execution.

cve-2025-47389 memory-corruption buffer-overflow attestation
2r 1t 1c 1i
critical advisory

Twitch Studio Privilege Escalation Vulnerability (CVE-2024-14032)

Twitch Studio version 0.114.8 and prior contains a privilege escalation vulnerability (CVE-2024-14032) that allows local attackers to execute arbitrary code as root by exploiting an unprotected XPC service, enabling them to overwrite system files and achieve full system compromise.

privilege-escalation cve-2024-14032 twitch
2r 1t 1c
high advisory

Potential File Download via a Headless Browser

Detects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.

command-and-control headless-browser file-download windows
2r 1t
high advisory

OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)

A remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.

command-injection dcmtk cve-2026-5663 storescp
2r 1t 1c
high advisory

Media Library Assistant WordPress Plugin SQL Injection Vulnerability

The Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.

sql-injection wordpress plugin-vulnerability
2r 1t 1c
high advisory

Distribution Toolkit Authentication Redirection Vulnerability (CVE-2026-33540)

A vulnerability in the distribution toolkit prior to 3.1.0 allows a malicious upstream registry or man-in-the-middle attacker to redirect authentication requests, potentially exposing upstream credentials.

CVE-2026-33540 authentication redirection container
2r 1t 1c
high advisory

GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)

GLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.

sql-injection glpi cve-2026-26263 web-application
2r 1t 1c
critical advisory

GLPI Template Injection RCE (CVE-2026-26026)

GLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.

cve-2026-26026 template-injection rce glpi
2r 3t 1c 1i
high advisory

GLPI SQL Injection Vulnerability (CVE-2026-29047)

GLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.

glpi sqli cve-2026-29047
2r 1t 1c
medium advisory

GLPI Cross-Site Scripting Vulnerability (CVE-2026-25932)

CVE-2026-25932 is a cross-site scripting vulnerability in GLPI versions 0.60 to before 10.0.24, where an authenticated technician user can store a malicious XSS payload within supplier fields, potentially leading to arbitrary code execution in the context of other users' browsers.

xss glpi cve-2026-25932
2r 1t 1c
high advisory

AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts

This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.

cloud aws iam credential-access initial-access
2r 2t
high advisory

Mattermost Legal Hold Plugin Authentication Bypass Vulnerability

Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.

mattermost authentication-bypass legal-hold
2r 2t 1c
low advisory

Kubernetes Secret Access via Unusual User Agent

Detects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.

kubernetes credential-access cloud
2r 1t
critical advisory

Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.

CVE-2026-5605 buffer-overflow tenda
2r 2t 1c
high advisory

SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)

A remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.

sqli web-application cve-2026-5634
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in Easy Blog Site 1.0

A SQL injection vulnerability exists in code-projects Easy Blog Site 1.0 within the login.php file, exploitable remotely by manipulating the username/password parameters, potentially leading to unauthorized database access.

sqlinjection cve-2026-5646 webapplication
2r 1t 1c
high advisory

SQL Injection Vulnerability in projectworlds Car Rental System 1.0

A SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.

sql-injection web-application cve-2026-5637
2r 1t 1c
high advisory

GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)

A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.

ssrf cve-2026-5633 gpt-researcher
2r 1t 1c 6i
high advisory

GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)

CVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.

CVE-2026-5632 authentication-bypass web-application
2r 1t 1c
high advisory

GPT Researcher Code Injection Vulnerability (CVE-2026-5631)

A remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.

code-injection vulnerability gpt-researcher
2r 1t 1c
high advisory

JeecgBoot AI Chat Module Authentication Bypass Vulnerability

JeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.

jeecgboot authentication-bypass ai-chat-module
2r 1t 1c
critical advisory

Belkin F9K1015 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5612)

A stack-based buffer overflow vulnerability (CVE-2026-5612) exists in Belkin F9K1015 1.00.10, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWlEncrypt' function of the '/goform/formWlEncrypt' file.

cve-2026-5612 buffer-overflow belkin
2r 1t 1c
critical advisory

Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5608) exists in the formWlanSetup function of Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the /goform/formWlanSetup file.

buffer-overflow belkin cve-2026-5608
2r 1t 1c
critical advisory

Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.

cve-2026-5604 buffer-overflow tenda router
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)

Kados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.

sql-injection cve-2019-25704 web-application
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)

Kados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.

sql-injection web-application cve-2019-25702
2r 1t 1c
critical advisory

phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)

phpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.

phpBB file-upload deserialization CVE-2019-25685
2r 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)

Kados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.

sqli cve-2019-25692 web-application
2r 1t 1c
high advisory

RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)

RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.

cve-2019-25679 buffer-overflow seh local-code-execution realterm
2r 1t 1c 1i
high advisory

OpenDocMan 1.3.4 SQL Injection Vulnerability

OpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.

sqli vulnerability opendocman
2r 1t 1c
critical advisory

Advance Gift Shop Pro Script 2.0.3 SQL Injection Vulnerability

Advance Gift Shop Pro Script 2.0.3 is vulnerable to SQL injection via the 's' search parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.

sqli vulnerability webapp
2r 1t 1c
critical advisory

eDirectory SQL Injection Vulnerability (CVE-2019-25675)

Unauthenticated attackers can exploit SQL injection vulnerabilities in eDirectory (CVE-2019-25675) to bypass administrator authentication and disclose sensitive files.

sqli edirectory cve-2019-25675
2r 2t 1c
critical advisory

C4G Basic Laboratory Information System 3.4 SQL Injection Vulnerability

C4G Basic Laboratory Information System 3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL commands via the 'site' parameter in GET requests to the users_select.php endpoint, potentially leading to sensitive data extraction.

sql-injection web-application cve-2019-25678
2r 1t 1c
critical advisory

VA MAX 8.3.4 Remote Code Execution via changeip.php (CVE-2019-25671)

VA MAX 8.3.4 is vulnerable to remote code execution (CVE-2019-25671), allowing authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter via a POST request to changeip.php.

rce cve-2019-25671 web-application
2r 1t 1c 2i
high advisory

River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability

River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.

cve-2019-25670 buffer-overflow seh-overflow windows
2r 2t 1c
high advisory

PilusCart 1.4.1 SQL Injection Vulnerability

PilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.

sqli vulnerability web-application
2r 1t 1c
high advisory

News Website Script 2.0.5 SQL Injection Vulnerability

News Website Script 2.0.5 contains an SQL injection vulnerability (CVE-2019-25668) allowing unauthenticated attackers to extract sensitive information by injecting SQL code through the news ID parameter in GET requests.

sqli cve-2019-25668 webserver
2r 1t 1c
high advisory

SuiteCRM 7.10.7 Time-Based SQL Injection Vulnerability

SuiteCRM 7.10.7 is vulnerable to time-based SQL injection in the record parameter of the Users module DetailView action, allowing authenticated attackers to manipulate database queries and potentially extract sensitive information.

sql-injection cve-2019-25664 suitecrm
2r 1t 1c
high advisory

ResourceSpace 8.6 SQL Injection Vulnerability

ResourceSpace 8.6 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL queries via the 'ref' parameter in GET requests to the watched_searches.php endpoint, leading to sensitive data extraction.

sqli cve-2019-25662 resourcespace
2r 1t 1c
high advisory

R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)

R i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.

buffer-overflow seh-overwrite code-execution cve-2019-25656 windows
2r 2t 1c 5i
high advisory

SQL Injection Vulnerability in jkev Record Management System 1.0 (CVE-2026-5575)

A SQL injection vulnerability (CVE-2026-5575) exists in the Login component of SourceCodester/jkev Record Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username parameter in index.php.

sql-injection cve-2026-5575 web-application
2r 1t 1c
high advisory

Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)

CVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.

CVE-2026-5573 file-upload web-application
2r 1t 1c 4i
high advisory

Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)

CVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.

cve authentication-bypass webserver
2r 1t 1c
high advisory

Technostrobe HI-LED-WR120-G2 Improper Access Control Vulnerability (CVE-2026-5569)

CVE-2026-5569 describes a remote improper access control vulnerability in the /Technostrobe/ endpoint of Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30, potentially leading to unauthorized access and control of affected devices.

cve-2026-5569 access-control technostrobe
2r 1t 1c
critical advisory

Tenda M3 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Tenda M3 1.0.0.10 via manipulation of the policyType argument in the setAdvPolicyData function, allowing remote attackers to execute arbitrary code.

cve-2026-5567 buffer-overflow tenda router webserver
2r 6t 1c
high advisory

code-projects Simple Laundry System 1.0 SQL Injection Vulnerability

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

Provectus Kafka UI Code Injection Vulnerability (CVE-2026-5562)

A code injection vulnerability exists in provectus kafka-ui up to version 0.7.2, specifically affecting the validateAccess function within the /api/smartfilters/testexecutions endpoint, allowing remote attackers to inject code.

code-injection kafka-ui vulnerability
2r 2t 1c
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)

A SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.

sql-injection web-application vulnerability
2r 1t 1c 1i
critical advisory

Tenda AC10 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5550) in Tenda AC10 firmware version 16.03.10.10_multi_TDE01 within the /bin/httpd SysToolChangePwd function allows remote attackers to execute arbitrary code.

cve-2026-5550 tenda buffer-overflow router
2r 1t 1c
high advisory

Tenda 4G03 Pro Improper Access Control Vulnerability (CVE-2026-5526)

CVE-2026-5526 describes an improper access control vulnerability in the Tenda 4G03 Pro router's /bin/httpd file, allowing remote attackers to potentially gain unauthorized access.

cve-2026-5526 tenda router access-control
2r 1t 1c
high advisory

Snes9K 0.0.9z Buffer Overflow Vulnerability (CVE-2018-25251)

Snes9K 0.0.9z is vulnerable to a buffer overflow in the Netplay Socket Port Number field, enabling local attackers to execute arbitrary code via a crafted payload.

buffer-overflow code-execution cve-2018-25251 snes9k
2r 1t 1c
medium advisory

Microsoft VPN Browser+ 1.1.0.0 Denial of Service Vulnerability (CVE-2018-25241)

An unauthenticated attacker can cause a denial of service by crashing Microsoft VPN Browser+ 1.1.0.0 via oversized input to the search functionality, leading to application termination.

dos cve-2018-25241 microsoft
2r 1t 1c
high advisory

Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)

Sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.

privilege-escalation unquoted-service-path cve-2016-20061
2r 1t 1c 4i
critical advisory

Signal K Server Privilege Escalation via Unprotected /enableSecurity Endpoint

The Signal K server is vulnerable to privilege escalation due to the /skServer/enableSecurity endpoint remaining active after initial setup, allowing unauthenticated users to inject a new admin account and gain full server control; this affects versions prior to 2.24.0-beta.4.

privilege-escalation web-application vulnerability
2r 1t 1c
high advisory

prompts.chat Path Traversal Vulnerability (CVE-2026-22661)

A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.

path-traversal file-write code-execution cve-2026-22661 prompts.chat linux
2r 1t 1c
high advisory

OpenEXR Heap Information Disclosure in PXR24 Decompression (CVE-2026-34543)

OpenEXR is vulnerable to a heap information disclosure in PXR24 decompression, where the undo_pxr24_impl function ignores the actual decompressed size, potentially leading to the exposure of uninitialized heap memory when processing crafted EXR files.

openexr heap-disclosure cve-2026-34543
2r 2t 1c 2i
high advisory

Mesop Framework WebSocket Denial-of-Service Vulnerability (CVE-2026-34824)

An unauthenticated attacker can exploit an uncontrolled resource consumption vulnerability in Mesop versions 1.2.3 to 1.2.4 by sending a rapid succession of WebSocket messages, leading to thread exhaustion and a denial-of-service condition.

denial-of-service websocket cve-2026-34824
2r 2t
high advisory

Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification

An authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.

juju resource-poisoning privilege-escalation cloud
2r 2t 1c
critical advisory

goshs Unauthenticated Arbitrary File Deletion via Path Traversal

The goshs application is vulnerable to unauthenticated path traversal (CVE-2026-35471) due to a missing return statement in the `deleteFile()` function, allowing attackers to delete arbitrary files and directories using a crafted GET request.

path-traversal file-deletion goshs
2r 1t
critical advisory

Budibase REST Connector SSRF via Empty Blacklist

A critical Server-Side Request Forgery (SSRF) vulnerability in Budibase's REST datasource connector allows attackers with Builder privileges to exfiltrate sensitive data from internal network services due to a missing default IP blacklist.

ssrf budibase vulnerability
2r 7t
high advisory

Budibase Command Injection Vulnerability in Bash Automation Step

A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.

command-injection rce budibase
2r 1t
critical advisory

Axios NPM Supply Chain Attack Delivering Platform-Specific RATs

A supply chain attack on the Axios NPM package injected malicious code into versions v1.14.1 and v0.30.4, leading to the deployment of platform-specific remote access trojans (RATs) after the installation of a rogue dependency that communicated with attacker-controlled infrastructure to retrieve malicious payloads for Windows, MacOS, and Linux.

supply-chain npm javascript rat
2r 5t 7i
critical advisory

Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)

A critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.

cve-2026-5485 command injection athena odbc linux
2r 1t 1c
medium advisory

WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability

The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.

wordpress xss cve-2026-5425 plugin
2r 1t 1c
high advisory

ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability

The ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.

wordpress plugin vulnerability membership
2r 1t 1c
critical advisory

pyLoad Arbitrary Code Execution via Malicious Session Deserialization

pyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.

pyLoad rce pickle deserialization webserver
2r 4t 1c 2i
high advisory

libp2p-rendezvous Unlimited Namespace Registration DoS

A vulnerable libp2p-rendezvous server can be crashed via a denial-of-service attack where an unauthenticated peer registers unlimited namespaces, leading to memory exhaustion.

libp2p rendezvous denial-of-service
2r 1t
high advisory

Coder Code-Marketplace Zip Slip Vulnerability

A Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.

zip-slip path-traversal code-marketplace persistence
2r 2t
critical advisory

Directus Aggregate Query Vulnerability Allows Disclosure of Concealed Data

A vulnerability in Directus versions prior to 11.17.0 allows authenticated users to extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users, via aggregate queries.

directus vulnerability credential-access api-token 2fa-bypass
2r 1t
high advisory

Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)

A context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.

electron context-isolation javascript xss CVE-2026-34780 defense-evasion privilege-escalation
2r 2t 1c
high advisory

PraisonAI OS Command Injection Vulnerability (CVE-2026-34937)

PraisonAI versions prior to 1.5.90 are vulnerable to OS Command Injection (CVE-2026-34937) due to insufficient escaping in the run_python() function, allowing arbitrary OS command execution via shell interpolation.

cve-2026-34937 os command injection praisonai
2r 1t 1c
critical advisory

PraisonAI Gateway Unauthenticated Access Vulnerability

PraisonAI Gateway server versions prior to 4.5.97 allow unauthenticated access to WebSocket connections and agent topology, enabling unauthorized message sending and agent enumeration.

vulnerability authentication bypass websocket
2r 1t 1c
critical advisory

Emlog Path Traversal Vulnerability Leads to Remote Code Execution

Emlog versions 2.6.2 and prior are vulnerable to path traversal via crafted ZIP uploads, allowing authenticated admins to write arbitrary files and achieve remote code execution.

path-traversal remote-code-execution emlog web-application
2r 3t 1c
critical advisory

Hirschmann HiLCOS OpenBAT/BAT450 IPv6 IPsec Firewall Bypass (CVE-2021-4477)

CVE-2021-4477 describes a firewall bypass vulnerability in Hirschmann HiLCOS OpenBAT and BAT450 products that can be exploited by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while using an IPv6 Internet connection, allowing attackers to bypass configured firewall rules.

cve-2021-4477 firewall-bypass network
2r 1t 1c
critical advisory

BentoML SSTI via Unsandboxed Jinja2 in Dockerfile Generation

BentoML versions 1.4.37 and earlier are vulnerable to server-side template injection (SSTI), where the Dockerfile generation function uses an unsandboxed jinja2.Environment allowing arbitrary Python code execution on the host machine when a malicious bento archive is imported and containerized, bypassing container isolation and potentially granting full access to the host filesystem and environment variables.

ssti bentoml code-execution docker
2r 1t
high advisory

Piwigo SQL Injection Vulnerability (CVE-2026-27885)

CVE-2026-27885 is a SQL Injection vulnerability in Piwigo before version 16.3.0, affecting the Activity List API endpoint, allowing an authenticated administrator to extract sensitive data.

sql-injection web-application piwigo
2r 1t 1c 1i
high advisory

Piwigo SQL Injection Vulnerability (CVE-2026-27834)

A SQL Injection vulnerability (CVE-2026-27834) exists in Piwigo versions prior to 16.3.0, allowing authenticated administrators to execute arbitrary SQL commands via the pwg.users.getList Web Service API method.

piwigo sql-injection cve-2026-27834
2r 1t 1c 1i
high advisory

OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)

OAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.

authentication-bypass jupyterhub oauthenticator cve-2026-33175
2r 1t
medium advisory

Piwigo Unauthenticated History Search Access

Piwigo versions prior to 16.3.0 expose the full browsing history of gallery visitors to unauthenticated users via the pwg.history.search API method due to a missing authorization check.

piwigo vulnerability information-disclosure
2r 1t 1c 1i
high advisory

fast-jwt Library Vulnerability Allows crit Header Validation Bypass

The fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.

jwt vulnerability authentication authorization
2r 1t 1c
critical advisory

SandboxJS Integrity Escape Vulnerability

A sandbox integrity escape vulnerability exists in SandboxJS versions prior to 0.8.36, allowing untrusted code to bypass global write protections and mutate host shared global objects, potentially leading to cross-context persistence and broader compromise.

sandbox-escape javascript vulnerability
2r 2t
high advisory

curl_cffi SSRF Vulnerability via Redirects

curl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.

ssrf curl_cffi cloud
2r 1t 1c 3i
high advisory

Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability

A man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.

cve-2026-35560 athena odbc man-in-the-middle mitm credential-theft
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Denial of Service Vulnerability (CVE-2026-35562)

A remote, unauthenticated attacker can cause a denial of service by sending crafted input to vulnerable versions of the Amazon Athena ODBC driver, triggering excessive resource consumption during parsing operations.

CVE-2026-35562 denial-of-service amazon athena odbc driver
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Authentication Bypass Vulnerability (CVE-2026-35561)

CVE-2026-35561 describes an insufficient authentication security control vulnerability in the browser-based authentication components of the Amazon Athena ODBC driver before version 2.1.0.0, potentially allowing a threat actor to intercept or hijack authentication sessions.

amazon athena odbc authentication hijacking cve-2026-35561
2r 2t 1c
high advisory

Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)

CVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.

cve-2026-32646 authentication-bypass device-management
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)

A command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.

command injection cve-2026-35558 athena
2r 2t 1c
high advisory

prompts.chat Fal.ai SSRF Vulnerability (CVE-2026-22664)

prompts.chat prior to commit 30a8f04 is vulnerable to server-side request forgery (SSRF) in Fal.ai media status polling, allowing authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs, leading to potential credential theft and internal network probing.

ssrf cve-2026-22664 fal.ai prompts.chat
2r 1t 1c 3i
high advisory

Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)

A denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.

dos cve-2020-37216 network
2r 2t 1c
high advisory

Hardcoded Storage Credentials in Mobile App and Device Firmware (CVE-2025-10681)

CVE-2025-10681 describes a vulnerability where hardcoded storage credentials in a mobile app and device firmware, with inadequate permission limits and lack of expiration, could lead to unauthorized access to production storage containers.

cve-2025-10681 hardcoded-credentials ics-cert ot
2r 1t 1c
critical advisory

Budibase Unauthenticated Remote Code Execution via Webhook

Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.

CVE-2026-35216 budibase rce webhook
2r 1t 1c
high advisory

Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)

A stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.

budibase xss cve-2026-35218 web-application
2r 1t 1c
critical advisory

Budibase Path Traversal Vulnerability in Plugin Upload

A path traversal vulnerability exists in Budibase versions prior to 3.33.4, allowing attackers with Global Builder privileges to delete arbitrary directories and write arbitrary files via crafted plugin uploads.

path-traversal vulnerability budibase
2r 1t 1c
critical advisory

Critical Authentication Bypass Vulnerability in Cisco Integrated Management Controller (CVE-2026-20093)

An unauthenticated remote attacker can exploit CVE-2026-20093 to bypass authentication in Cisco Integrated Management Controller (IMC), gain full administrative access, and manipulate hardware settings, potentially disrupting critical infrastructure.

authentication bypass cisco imc cve-2026-20093
3r 3t 1c
medium advisory

Suricata Quadratic Complexity Issue in SMTP URL Searching (CVE-2026-31934)

Suricata versions 8.0.0 to before 8.0.4 exhibit a quadratic complexity vulnerability (CVE-2026-31934) when searching for URLs in MIME-encoded SMTP messages, leading to significant performance degradation and potential denial-of-service conditions; this is fixed in version 8.0.4.

suricata cve-2026-31934 denial-of-service performance network-security
2r 1t 1c 1i
critical advisory

fast-jwt Library JWT Algorithm Confusion Vulnerability

The fast-jwt library is vulnerable to JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key due to an incomplete fix for CVE-2023-48223, allowing attackers to bypass intended security measures by exploiting leading whitespace in the RSA public key, enabling attackers to sign arbitrary payloads that will be accepted by the verifier, potentially leading to privilege escalation.

jwt algorithm-confusion vulnerability fast-jwt nodejs
2r 1t 1c
medium advisory

Democratization of Business Email Compromise (BEC) Attacks

Attackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.

business-email-compromise bec ai social-engineering credential-harvesting exploitation
2r 2t 1c 6i
critical advisory

Compromised Axios Library Leads to RAT Deployment via @usebruno/cli

Compromised versions of the `axios` npm package introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT), impacting users of `@usebruno/cli` who ran `npm install` between 00:21 UTC and ~03:30 UTC on March 31, 2026, potentially leading to credential exfiltration.

supply-chain npm rat credential-theft
2r 5t 1i
medium advisory

ManageEngine Exchange Reporter Plus Stored XSS Vulnerability

Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in the Distribution Lists report, allowing attackers to inject malicious scripts.

xss vulnerability manageengine
2r 2t 1c
critical advisory

Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)

The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.

cve-2026-4350 wordpress perfmatters file-deletion path-traversal
2r 1t 1c
high advisory

AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions

AIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.

cve-2025-7024 privilege-escalation windows
2r 1t 1c
high advisory

Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)

A command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.

command-injection metasploit pymetasploit3
2r 1t 1c
high advisory

Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)

Ajenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.

ajenti authorization-bypass privilege-escalation CVE-2026-35175
2r 1t
high advisory

Wisp Multipart Parsing Vulnerability Leads to Denial of Service

A vulnerability in the multipart parsing logic of gleam-wisp allows an unauthenticated attacker to bypass request size limits and cause a denial of service by exhausting server memory or disk.

denial-of-service multipart-parsing gleam-wisp
3r 1t 1c
high advisory

Swift Crypto X-Wing HPKE Decapsulation Vulnerability

The X-Wing decapsulation path in swift-crypto accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length of 1120 bytes, leading to a potential out-of-bounds read.

vulnerability memory-safety swift-crypto
2r 1t
high advisory

Ech0 Unauthenticated Server-Side Request Forgery Vulnerability

Ech0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.

ssrf ech0 web-application
2r 1t 2i
critical advisory

Better Auth Two-Factor Authentication Bypass Vulnerability

Better Auth versions prior to 1.4.9 have a critical two-factor authentication bypass vulnerability; when session.cookieCache is enabled, the initial sign-in session may be improperly cached, allowing attackers with valid credentials to bypass 2FA.

authentication 2fa bypass better-auth
2r 1t
high advisory

Sudo Privilege Escalation Vulnerability (CVE-2026-35535)

CVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.

sudo privilege-escalation cve-2026-35535
2r 1t 1c
critical advisory

OpenClaw TOCTOU Race Condition Leads to Sandbox Escape

A critical time-of-check time-of-use (TOCTOU) vulnerability in OpenClaw's remote file system bridge allows a sandbox escape by exploiting the delay between path validation and file reading, affecting versions up to 2026.3.28.

openclaw sandbox-escape toctou
2r 1t
high advisory

OpenClaw Incomplete Scope Clearing Allows Privilege Escalation

An incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.

privilege-escalation web-application openclaw
2r 1t
medium advisory

OpenClaw Arbitrary File Read and Credential Exfiltration Vulnerability

The openclaw package is vulnerable to arbitrary file read and credential exfiltration due to media local roots self-whitelisting in `appendLocalMediaParentRoots`, allowing a model to initiate arbitrary host file reads, potentially leading to credential exfiltration.

arbitrary-file-read credential-exfiltration openclaw npm
2r 1t
high advisory

Electron Use-After-Free Vulnerability in Offscreen Rendering with Child Windows

A use-after-free vulnerability (CVE-2026-34774) exists in Electron applications using offscreen rendering and allowing child windows, potentially leading to crashes or memory corruption if the parent WebContents is destroyed before the child window.

electron use-after-free vulnerability cve-2026-34774
2r 1i
high advisory

Electron Use-After-Free Vulnerability in PowerMonitor Module

A use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.

electron use-after-free vulnerability powermonitor windows macos
2r 1t 1i
critical advisory

CVE-2026-33105 - Microsoft Azure Kubernetes Service Privilege Escalation

CVE-2026-33105 is a critical vulnerability in Microsoft Azure Kubernetes Service that allows an unauthorized attacker to elevate privileges over a network due to improper authorization.

azure kubernetes privilege-escalation
2r 1t 1c 2i
critical advisory

Azure Databricks SSRF Vulnerability (CVE-2026-33107) Allows Privilege Escalation

A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-33107, exists in Azure Databricks, allowing an unauthorized attacker to elevate privileges over a network.

ssrf azure databricks privilege-escalation
2r 1t 1c
high advisory

Azure SRE Agent Improper Authentication Vulnerability (CVE-2026-32173)

An improper authentication vulnerability (CVE-2026-32173) in the Azure SRE Agent allows an unauthorized attacker to disclose sensitive information over the network, potentially leading to data breaches or further compromise.

azure sre authentication information-disclosure
2r 1t 1c
critical advisory

Azure MCP Server Missing Authentication Vulnerability (CVE-2026-32211)

CVE-2026-32211 is a critical vulnerability in Azure MCP Server due to missing authentication for a critical function, allowing an unauthorized attacker to disclose information over the network.

azure information-disclosure vulnerability
2r 1t 1c 1i
high advisory

Hirschmann EagleSDV Denial-of-Service Vulnerability (CVE-2022-4986)

Hirschmann EagleSDV devices are vulnerable to denial-of-service (DoS) attacks where a device crash can be triggered by establishing TLS 1.0 or TLS 1.1 connections, leading to service disruption.

denial-of-service cve-2022-4986 network-device
2r 1t 1c
high advisory

Hirschmann HiLCOS Web Interface Heap Overflow Vulnerability (CVE-2024-14033)

A heap overflow vulnerability in the HiLCOS web interface of Hirschmann Industrial IT products (CVE-2024-14033) allows unauthenticated remote attackers to cause a denial-of-service condition by sending specially crafted requests, leading to device crashes and service disruption, particularly when the Public Spot functionality is enabled.

cve-2024-14033 denial-of-service heap-overflow hilcos
2r 1t 1c
critical advisory

OpenClaw Sandbox Bypass via Heartbeat Context Inheritance

A critical vulnerability in the openclaw npm package (<=2026.3.28) allows a heartbeat context inheritance to bypass the sandbox via senderIsOwner escalation, patched in version 2026.3.31.

sandbox-bypass dependency-vulnerability npm
2r
high advisory

OpenClaw NPM Package Vulnerable to Python Package Index Redirection

The openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.

openclaw npm package-index-redirection environment-variable-injection
2r
critical advisory

OneUptime SAML SSO Authentication Bypass Vulnerability (CVE-2026-34840)

OneUptime versions prior to 10.0.42 are vulnerable to an authentication bypass due to improper SAML signature validation, allowing attackers to impersonate users by prepending unsigned assertions.

CVE-2026-34840 saml authentication-bypass webserver
2r 1t 1c
critical advisory

Hirschmann HiEOS HTTP(S) Management Module Authentication Bypass (CVE-2024-14034)

Hirschmann HiEOS devices contain an authentication bypass vulnerability (CVE-2024-14034) in the HTTP(S) management module, allowing unauthenticated remote attackers to gain administrative access by sending specially crafted HTTP(S) requests.

authentication bypass cve-2024-14034 hieos ics
2r 1t 1c
high advisory

Kiro IDE Code Execution Vulnerability via Crafted Color Theme (CVE-2026-5429)

CVE-2026-5429 is a code execution vulnerability in Kiro IDE before version 0.8.140 that allows a remote, unauthenticated attacker to execute arbitrary code by exploiting a crafted color theme name when a local user opens a workspace.

cve cve-2026-5429 code-execution kiro-ide
2r 2t 1c
critical advisory

OneUptime Unauthenticated Endpoint Access Vulnerability (CVE-2026-34758)

OneUptime versions prior to 10.0.42 are vulnerable to unauthenticated access to Notification test and Phone Number management endpoints, leading to potential abuse of SMS, Call, Email, and WhatsApp functionalities, and unauthorized phone number purchases, fixed in version 10.0.42.

cve vulnerability oneuptime unauthenticated-access
2r 1t 1c 1i
high advisory

goshs Authentication Bypass Vulnerability (CVE-2026-34581)

goshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).

cve-2026-34581 authentication-bypass code-execution
1r 1t
high advisory

CVE-2024-44250: macOS Sequoia Privilege Escalation Vulnerability

CVE-2024-44250 is a permission issue in macOS Sequoia 15.1 that allows an application to execute arbitrary code outside of its sandbox or with elevated privileges, potentially leading to full system compromise.

privilege-escalation macos cve-2024-44250
2r 1t 1c
critical advisory

HiSecOS Web Server Privilege Escalation Vulnerability (CVE-2023-7342)

CVE-2023-7342 allows authenticated users with operator or auditor roles in HiSecOS web server to escalate privileges to administrator by sending specially crafted packets, potentially granting full administrative access.

privilege-escalation web-server hisecos
2r 1t 1c
critical advisory

OpenProject SQL Injection Vulnerability (CVE-2026-34717)

OpenProject versions before 17.2.3 are susceptible to SQL injection due to improper input sanitization in the '=n' operator, potentially allowing remote attackers to execute arbitrary SQL commands.

openproject sqli cve-2026-34717 web-application
2r 1t 1c 1i
medium advisory

OpenSSH scp Insecure File Permission Vulnerability (CVE-2026-35385)

OpenSSH versions before 10.3 allow for the potential installation of setuid or setgid files when using scp to download files as root with the -O option (legacy SCP protocol) and without the -p option (preserve mode), contrary to user expectations.

openssh scp privilege-escalation cve-2026-35385
2r 1t 1c
medium advisory

Rack::Static Information Disclosure Vulnerability (CVE-2026-34785)

Rack versions prior to 2.2.23, 3.1.21, and 3.2.6 are vulnerable to information disclosure due to improper static file serving via a prefix matching issue in Rack::Static.

rack information-disclosure CVE-2026-34785 ruby webserver
2r 1t 1c
high advisory

Balena Etcher for Windows TOCTOU Vulnerability

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.

privilege-escalation toctou balena-etcher
2r 1t 1c
medium advisory

Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)

A server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.

cve-2026-5346 ssrf huimeicloud
2r 1t 1c
critical advisory

Endian Firewall Command Injection Vulnerability (CVE-2026-34791)

Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.

command-injection rce vulnerability
2r 1t 1c
high advisory

Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)

Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.

cve path-traversal file-deletion web-application
2r 1t 1c 1i
medium advisory

Suricata HTTP2 Continuation Frame Flooding Denial of Service (CVE-2026-31935)

A denial of service vulnerability, CVE-2026-31935, exists in Suricata versions prior to 7.0.15 and 8.0.4, where flooding the system with crafted HTTP2 continuation frames leads to memory exhaustion and process termination.

cve dos http2 suricata
2r 1t 1c
medium advisory

Suricata DCERPC Buffering Inefficiency Vulnerability (CVE-2026-31937)

Suricata versions prior to 7.0.15 are vulnerable to CVE-2026-31937, where inefficient DCERPC buffering can lead to a denial-of-service condition through performance degradation.

vulnerability dos suricata
2r 1t 1c 1i
high advisory

DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)

DefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.

command-injection web-application cve-2026-5333
2r 2t 1c
medium advisory

Suricata NULL Dereference Vulnerability

Suricata versions 8.0.0 to before 8.0.4 are vulnerable to a NULL dereference crash when using the 'tls.alpn' rule keyword, potentially leading to a denial of service.

suricata denial-of-service null-dereference
2r 2t 1c 2i
medium advisory

Suricata KRB5 Buffering Inefficiency Vulnerability (CVE-2026-31932)

An unauthenticated attacker can exploit CVE-2026-31932, a vulnerability in Suricata versions prior to 7.0.15 and 8.0.4, to cause performance degradation due to inefficient KRB5 buffering.

cve-2026-31932 suricata krb5 performance-degradation denial-of-service
2r 1t 1c 1i
medium advisory

Suricata DoS Vulnerability (CVE-2026-31933)

Specially crafted network traffic can cause Suricata to slow down, leading to a denial-of-service condition in versions prior to 7.0.15 and 8.0.4, as identified by CVE-2026-31933.

dos suricata cve-2026-31933 network
2r 1t 1c 1i
critical advisory

ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)

Authenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.

rce file-upload sharefile
2r 1t
critical advisory

ShareFile Storage Zones Controller Unauthenticated Configuration Access and Potential RCE (CVE-2026-2699)

An unauthenticated attacker can access restricted configuration pages in Customer Managed ShareFile Storage Zones Controller (SZC), leading to system configuration changes and potential remote code execution.

sharefile storage-zones-controller rce cve-2026-2699
2r 2t 3i
high advisory

OpenSTAManager Time-Based Blind SQL Injection Vulnerability

OpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.

openstamanager sqli cve-2026-28805
2r 1t
low advisory

Unusual City for Azure Activity Logs Event

A machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.

azure cloud anomaly-detection
2r 3t
low advisory

Spike in Successful Logon Events from a Source IP

A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.

credential-access defense-evasion brute-force password-spraying
2r 3t
high advisory

Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)

CVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.

keycloak uma policy-bypass privilege-escalation
2r 3t 1c
high advisory

Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)

An unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.

cve-2026-4634 denial-of-service keycloak
2r 1t 1c
medium advisory

Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)

CVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.

keycloak redirect-uri-bypass cve-2026-3872 authentication authorization
2r 1t 1c 1i
high advisory

Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)

An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.

keycloak privilege-escalation authorization
2r 1t 1c
low advisory

Unusual Spike in Bytes Written to External Device Detected by Machine Learning

A machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.

data exfiltration machine learning external device
2r 1t
medium advisory

SSH Authorized Key File Modification Inside a Container

The rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.

container persistence lateral-movement privilege-escalation ssh
2r 4t
high advisory

SillyTavern Path Traversal Vulnerability in Chat Endpoints

A path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.

path-traversal web-application sillytavern
3r 4t
high advisory

DeepLoad Malware Distributed via ClickFix

The DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.

deepload clickfix credential-theft windows
2r 3t
critical advisory

Unauthenticated SQL Injection Vulnerability in mb24api Endpoint (CVE-2026-33616)

CVE-2026-33616 describes an unauthenticated blind SQL Injection vulnerability affecting an mb24api endpoint, which a remote attacker can exploit by injecting special elements into a SQL SELECT command, potentially leading to a total loss of confidentiality due to improper neutralization of special elements.

sql-injection cve-2026-33616 web-application
2r 1t 1c
critical advisory

Unauthenticated SQL Injection Vulnerability in setinfo Endpoint

An unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.

sql-injection vulnerability web-application
2r 1t 1c 3i
critical advisory

Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)

An unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

CVE-2026-33613: Remote Code Execution in generateSrpArray Function

CVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.

cve-2026-33613 rce command-injection
2r 1t 1c
high advisory

Cesanta Mongoose TLS 1.3 Heap-Based Buffer Overflow Vulnerability (CVE-2026-5244)

A remote heap-based buffer overflow vulnerability exists in Cesanta Mongoose versions up to 7.20 due to improper handling of the pubkey argument in the mg_tls_recv_cert function, potentially leading to code execution.

cve-2026-5244 heap-based-buffer-overflow tls-1.3 remote-code-execution
2r 1t 1c
high advisory

WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)

The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.

ssrf wordpress webmention cve-2026-0686
2r 1t 1c
critical advisory

MW WP Form WordPress Plugin Arbitrary File Move Vulnerability (CVE-2026-4347)

The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation, allowing unauthenticated attackers to move arbitrary files on the server, potentially leading to remote code execution.

wordpress file-move rce
2r 2t 1c
high advisory

AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability

A SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.

sql-injection web-application cve-2026-5322
2r 1t 1c
high advisory

vanna-ai vanna Authentication Bypass Vulnerability (CVE-2026-5320)

CVE-2026-5320 describes an unauthenticated remote access vulnerability in vanna-ai vanna up to version 2.0.2 via manipulation of the /api/vanna/v2/ Chat API endpoint, potentially allowing unauthorized access and actions.

authentication-bypass cve-2026-5320 vanna-ai
2r 2t 1c
high advisory

HCL BigFix Platform Insecure Permissions Vulnerability (CVE-2026-21765)

HCL BigFix Platform is vulnerable to insecure permissions on private cryptographic keys, where keys on a Windows host may have overly permissive file system permissions, potentially leading to unauthorized access and privilege escalation.

cve-2026-21765 privilege-escalation windows hcl-bigfix
2r 2t 1c
critical advisory

Juju Controller Vulnerable to Unauthorized Database Access Due to Improper TLS Configuration

Juju controller versions 3.2.0 up to 3.6.20 and 4.0.5 are vulnerable to unauthorized database access due to improper TLS client/server authentication and certificate verification, allowing an attacker with network access to modify all information, escalate privileges, and open firewall ports.

juju dqlite tls vulnerability
2r 3t
high advisory

PraisonAI SubprocessSandbox Shell Escape via sh/bash

PraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '<command>'`.

sandbox-escape command-injection praisonai
2r 3t
high advisory

PraisonAI SSRF Vulnerability via Unvalidated api_base Parameter

PraisonAI versions 4.5.89 and earlier are vulnerable to SSRF via the `api_base` parameter in the `passthrough()` function, allowing attackers to make requests to internal services or external hosts, potentially leading to IAM credential theft on cloud infrastructure or access to internal services within the VPC.

ssrf praisonai cloud
2r 1t 1i
high advisory

KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe

The KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.

kubeai command-injection kubernetes cloud
2r 1t
high advisory

V-SFT Stack-Based Buffer Overflow Vulnerability (CVE-2026-32928)

V-SFT versions 6.2.10.0 and prior are susceptible to a stack-based buffer overflow vulnerability that could allow arbitrary code execution when a malicious V7 file is opened.

cve-2026-32928 buffer-overflow code-execution v-sft
2r 1t 1c
medium advisory

V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32929)

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability (CVE-2026-32929) in VS6ComFile!get_macro_mem_COM, where opening a crafted V7 file may lead to information disclosure.

cve-2026-32929 out-of-bounds read information disclosure v-sft
2r 1t 1c
critical advisory

V-SFT v6.2.10.0 Stack-Based Buffer Overflow (CVE-2026-32925)

V-SFT versions 6.2.10.0 and prior are vulnerable to a stack-based buffer overflow (CVE-2026-32925) in the VS6ComFile!CV7BaseMap::WriteV7DataToRom function, potentially leading to arbitrary code execution when processing a crafted V7 file.

cve-2026-32925 stack-based-buffer-overflow v-sft
2r 3t 1c
medium advisory

V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32926)

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in the VS6ComFile!load_link_inf function, allowing for potential information disclosure when opening a crafted V7 file.

cve-2026-32926 out-of-bounds read information disclosure
2r 6t 1c 3i
critical advisory

CI4MS Stored XSS Vulnerability in User Management

A stored cross-site scripting (XSS) vulnerability in CI4MS versions prior to 0.31.0.0 allows attackers to inject persistent JavaScript code into the backend user management functionality, leading to session hijacking, privilege escalation, and full administrative account compromise.

xss web-application cve-2026-34571
2r 2t 1c
high advisory

IBM Verify and Security Verify Access Authentication Bypass Vulnerability

CVE-2026-4101 describes an authentication bypass vulnerability in IBM Verify Identity Access Container and IBM Security Verify Access Container versions 11.0 through 11.0.2 and 10.0 through 10.0.9.1, respectively, that could allow unauthorized access under specific load conditions.

authentication-bypass cve-2026-4101 ibm-verify
2r 1t 1c
medium advisory

File Browser EPUB Preview Stored XSS Vulnerability (CVE-2026-34529)

File Browser versions prior to 2.62.2 are vulnerable to stored cross-site scripting (XSS) via the EPUB preview function, allowing attackers to execute arbitrary JavaScript in a user's browser by embedding malicious code in a crafted EPUB file.

xss filebrowser cve-2026-34529
2r
high advisory

IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability

Unauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.

command-injection rce cve-2026-1345
2r 1t 1c
high advisory

Goshs Authentication Bypass via Share Token

Goshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.

authentication-bypass code-execution goshs
2r 3t 2i
medium advisory

Payload CMS Stored XSS Vulnerability (CVE-2026-34748)

A stored Cross-Site Scripting (XSS) vulnerability exists in Payload CMS versions prior to 3.78.0, allowing authenticated users with write access to inject malicious scripts that execute in the browsers of other users.

xss cve-2026-34748 payloadcms
2r 1t 1c
medium advisory

Payload CMS SSRF Vulnerability (CVE-2026-34746)

Payload CMS versions before 3.79.1 are vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users with upload access to trigger outbound HTTP requests to arbitrary URLs.

cve-2026-34746 ssrf payload-cms
2r 1t 1c
critical advisory

Payload CMS Password Reset Vulnerability (CVE-2026-34751)

An unauthenticated attacker can perform actions on behalf of a user initiating a password reset in Payload CMS versions prior to 3.79.1 due to a flaw in the password recovery flow, potentially leading to account takeover or privilege escalation.

cve-2026-34751 payload-cms password-reset vulnerability
2r 1t 1c 1i
critical advisory

Mbed TLS FFDH Public Key Export Buffer Overflow

A buffer overflow vulnerability (CVE-2026-34875) exists in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0 during public key export for FFDH keys, potentially leading to code execution or denial of service.

buffer-overflow mbedtls crypto cve-2026-34875
2r 2t 1c
high advisory

Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)

Auth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.

cve-2026-34236 auth0 php cookie-forging session-hijacking
2r 1t 1c
medium advisory

Open WebUI Broken Access Control Vulnerability (CVE-2026-34222)

A broken access control vulnerability in Open WebUI versions prior to 0.8.11 (CVE-2026-34222) allows authenticated users to potentially access or modify tool values they should not be authorized to, leading to privilege escalation and unauthorized configuration changes.

broken-access-control web-application privilege-escalation
2r 3t 1c
high advisory

Tina CMS Path Traversal Vulnerability (CVE-2026-34603)

Tina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.

path-traversal tina-cms CVE-2026-34603
2r 1t
critical advisory

DedeCMS 5.7.118 Code Injection Vulnerability via Crafted Module Upload (CVE-2026-30643)

DedeCMS 5.7.118 is vulnerable to remote code execution via crafted setup tag values during a module upload, as exploited by an unauthenticated attacker (CVE-2026-30643).

dedecms code-injection cve-2026-30643
2r 1t 1c
high advisory

pandas-ai SQL Injection Vulnerability (CVE-2026-30273)

pandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.

sql-injection vulnerability pandas-ai
2r 1t 1c
critical advisory

Cisco Smart Software Manager On-Prem RCE via Exposed API (CVE-2026-20160)

CVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges by sending a crafted request to an exposed API.

cve-2026-20160 cisco ssm-on-prem rce webserver
2r 1t 1c
high advisory

Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)

Lakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.

lakeside systrack privilege-escalation race-condition cve-2026-35099 windows
2r 1t 1c
critical advisory

Critical Vulnerability in FastGPT Allows API Key Exfiltration and Internal Network Access

CVE-2026-34162 in FastGPT allows unauthenticated attackers to exfiltrate API keys and gain complete access to internal services managed by Docker Compose by sending arbitrary HTTP requests, leading to potential compromise of the internal network.

fastgpt vulnerability information-disclosure
2r 3t 1c 1i
medium advisory

Unsecured Zoom Meeting Creation

The creation of Zoom meetings without passcodes allows unauthorized access and disruption, known as Zoombombing, potentially leading to the exposure of sensitive information or reputational damage.

zoom zoombombing initial-access
2r 2t
high advisory

Libinput Code Injection Vulnerability via Malicious Lua Bytecode (CVE-2026-35093)

A local attacker can exploit CVE-2026-35093 in libinput by placing a specially crafted Lua bytecode file in configuration directories, allowing arbitrary code execution with the privileges of the application using libinput.

libinput code-injection lua cve-2026-35093
3r 6t 1c
medium advisory

Corosync Integer Overflow Vulnerability (CVE-2026-35092) Leads to DoS

CVE-2026-35092 is an integer overflow vulnerability in Corosync's join message sanity validation, allowing a remote, unauthenticated attacker to send crafted UDP packets, resulting in a denial of service condition.

cve-2026-35092 denial-of-service corosync
2r 2t 1c
low advisory

Kubectl Network Configuration Modification

This rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.

kubectl kubernetes command_and_control network_configuration linux macos
3r 2t
medium advisory

WebServer Access Logs Deleted

Detection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.

defense-evasion indicator-removal file-deletion
2r 1t
medium advisory

Dell AppSync 4.6.0 UNIX Symbolic Link Following Vulnerability (CVE-2026-22767)

Dell AppSync version 4.6.0 is vulnerable to a UNIX Symbolic Link (Symlink) Following vulnerability (CVE-2026-22767) that allows a low-privileged local attacker to tamper with information.

symlink dell appsync privilege-escalation
2r 1t 1c
high advisory

Dell AppSync 4.6.0 Incorrect Permission Assignment Vulnerability

Dell AppSync version 4.6.0 contains an incorrect permission assignment vulnerability that allows a low-privileged attacker with local access to elevate privileges on the system.

dell appsync privilege-escalation cve-2026-22768
2r 1t 1c
critical advisory

CrewAI Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in CrewAI, an open-source multi-agent orchestration framework, can be exploited by attackers through prompt injection to execute arbitrary code and perform other malicious activities, potentially leading to system compromise.

ai rce prompt-injection
3r 3t 4c
high advisory

Right-to-Left Override Character Used for Defense Evasion

Adversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.

defense-evasion obfuscation
2r 1t
high advisory

BPFDoor Lock File Access

BPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.

bpfdoor linux backdoor ebpf
2r 2t
high advisory

SonicWall Email Security Appliance Multiple Vulnerabilities

A remote, authenticated attacker with administrator rights can exploit multiple vulnerabilities in SonicWall Email Security Appliance to perform cross-site scripting, manipulate data, or cause a denial-of-service.

sonicwall email security xss dos data manipulation
2r 2t
high advisory

gdk-pixbuf Vulnerability Allows Denial of Service and Potential Code Execution

A remote, anonymous attacker can exploit a vulnerability in gdk-pixbuf to cause a denial of service and potentially execute arbitrary code.

gdk-pixbuf denial-of-service code-execution
2r 1t
high advisory

cPanel/WHM Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in cPanel/WHM to escalate their privileges.

privilege-escalation cpanel whm
2r 1t
high advisory

7-Zip Multiple Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.

7-zip code-execution vulnerability windows
2r 1t
high advisory

Multiple Vulnerabilities in PowerDNS

Multiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.

powerdns vulnerability dos information-disclosure code-execution
1r
critical advisory

Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service

A remote, anonymous attacker can exploit multiple vulnerabilities in libpng to execute arbitrary program code or cause a denial of service.

libpng vulnerability remote-code-execution denial-of-service
2r 2t
medium advisory

HTTP/2 Implementations Vulnerability Enables Denial of Service

A remote, anonymous attacker can exploit a vulnerability in various HTTP/2 implementations to perform a denial-of-service attack.

http/2 denial-of-service webserver
2r 1t
medium advisory

7-Zip Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in 7-Zip to manipulate files, leading to potential data integrity issues.

7-zip file-manipulation vulnerability
2r 2t
high advisory

IBM App Connect Enterprise Multiple Vulnerabilities

A remote, anonymous attacker can exploit multiple vulnerabilities in IBM App Connect Enterprise to cause a denial-of-service condition or bypass security measures, enabling cross-site scripting attacks.

vulnerability dos xss ibm
2r 2t
critical advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution

A local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.

libxslt rhel vulnerability code-execution denial-of-service linux
2r 2t
high advisory

Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS

A remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.

django sql-injection information-disclosure denial-of-service web-application webserver
2r 2t
critical advisory

Shandong Hoteam InforCenter PLM Unrestricted Upload Vulnerability (CVE-2026-5261)

CVE-2026-5261 is an unrestricted file upload vulnerability in Shandong Hoteam InforCenter PLM up to version 8.3.8, allowing remote attackers to execute arbitrary code by uploading malicious files via the uploadFileToIIS function.

CVE-2026-5261 unrestricted-upload hoteam-plm
2r 3t 1c
critical advisory

Weaponization of Google Vertex AI Agents

Researchers demonstrated that AI agents built on Google's Vertex AI can be compromised to exfiltrate data, create backdoors, and compromise infrastructure by abusing excessive permissions of the Per-Project, Per-Product Service Agent (P4SA).

cloud ai vertex-ai privilege-escalation
2r 8t
high advisory

Sanster IOPaint Path Traversal Vulnerability (CVE-2026-5258)

A path traversal vulnerability (CVE-2026-5258) exists in Sanster IOPaint 1.5.3, allowing remote attackers to read arbitrary files by manipulating the filename argument in the _get_file function within the File Manager component.

path traversal cve-2026-5258 web application
2r 1t 1c
high advisory

Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)

CVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.

cve-2026-3779 use-after-free code-execution foxit
2r 1t 1c
high advisory

CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer

An application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.

privilege-escalation cve-2026-3780 untrusted-search-path dll-hijacking installer
2r 1t 1c
critical advisory

XenForo RCE via Authenticated Admin User (CVE-2026-35056)

XenForo before 2.3.9 and 2.2.18 allows remote code execution by authenticated, malicious admin users with admin panel access.

rce xenforo cve-2026-35056 code-injection
2r 1t 1c 1i
high advisory

XenForo Template Code Injection Vulnerability (CVE-2025-71281)

XenForo before 2.3.7 is vulnerable to code injection due to a loose prefix match for methods accessible within templates, potentially allowing unauthorized method invocations.

xenforo code-injection cve-2025-71281
2r 2t 1c 1i
medium advisory

XenForo Path Disclosure via Open-Basedir Restrictions (CVE-2025-71282)

XenForo before 2.3.7 discloses filesystem paths through exception messages triggered by open_basedir restrictions, allowing attackers to gain sensitive information about the server's directory structure.

path-disclosure cve-2025-71282 xenforo
2r 1t 1c
high advisory

XenForo OAuth2 Unauthorized Scope Request Vulnerability

XenForo before 2.3.5 allows OAuth2 client applications to request unauthorized scopes, potentially allowing client applications to gain access beyond their intended authorization level due to improper authorization checks.

cve-2025-71278 oauth2 xenforo incorrect-authorization
2r 1t 1c 2i
high advisory

SiYuan Note Reflected XSS Vulnerability in SVG Processing

SiYuan Note versions prior to the fix for commit f09953afc57a are vulnerable to reflected cross-site scripting (XSS) via a namespace prefix bypass in the SanitizeSVG function when handling dynamic icons, allowing unauthenticated attackers to execute arbitrary JavaScript in a victim's browser.

xss siyuan svg reflected-xss
2r 1t
high advisory

itsourcecode Payroll Management System 1.0 SQL Injection Vulnerability

itsourcecode Payroll Management System 1.0 is vulnerable to SQL injection via the ID parameter in /view_employee.php, allowing remote attackers to execute arbitrary SQL commands.

sql-injection web-application payroll-system
2r 1t 1c 5i
high advisory

OpenClaw Gateway Unauthorized Session Reset Vulnerability

A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.

openclaw session-reset privilege-escalation
2r 1t
high advisory

File Browser Stored XSS via Crafted EPUB File

File Browser version 2.62.1 and earlier is vulnerable to stored cross-site scripting (XSS) via crafted EPUB files, allowing attackers to execute arbitrary JavaScript in a victim's browser by exploiting the application's misconfigured iframe sandbox and stealing sensitive information like JWT tokens.

filebrowser xss epub cve-2026-34529
2r 5t 1c 2i
high advisory

SQL Injection Vulnerability in itsourcecode Payroll Management System 1.0 (CVE-2026-5237)

A SQL injection vulnerability (CVE-2026-5237) exists in itsourcecode Payroll Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID parameter in the /manage_user.php file.

sql-injection web-application payroll-system
2r 1t 1c
critical advisory

SiYuan Knowledge Management System RCE via Malicious Website

SiYuan versions prior to 3.6.2 are vulnerable to remote code execution (RCE) via a malicious website exploiting a permissive CORS policy to inject a JavaScript snippet, leading to arbitrary code execution within the application's Node.js context.

cve-2026-34449 rce siyuan cors
2r 1t 1c
critical advisory

Vim and Emacs Remote Code Execution Vulnerabilities Triggered by File Opening

Vulnerabilities in Vim (<=9.2.0271) and GNU Emacs allow remote code execution by opening a specially crafted file, leveraging flaws in modeline handling and Git integration, respectively.

rce vim emacs git modeline
2r 1t
high advisory

Axios npm Package Compromised in Supply Chain Attack

The widely used Axios npm package was compromised via a supply chain attack on March 31, 2026, resulting in the publication of malicious versions through a compromised maintainer account.

supply-chain npm javascript
2r 1t
critical advisory

lodash _.template Function Injection Vulnerability (CVE-2026-4800)

CVE-2026-4800 allows attackers to inject arbitrary code at template compilation time via untrusted input passed as key names in the options.imports object of the _.template function in lodash versions prior to 4.18.0, potentially leading to remote code execution.

lodash template-injection rce cve-2026-4800
2r 2t 2c
high advisory

SourceCodester Leave Application System 1.0 File Inclusion Vulnerability (CVE-2026-5210)

SourceCodester Leave Application System 1.0 is vulnerable to remote file inclusion (CVE-2026-5210) due to improper handling of the 'page' argument, potentially allowing attackers to execute arbitrary code.

cve-2026-5210 file-inclusion web-application
2r 1t 1c 6i
high advisory

AWS-C-EventStream Out-of-Bounds Write Vulnerability (CVE-2026-5190)

CVE-2026-5190 is an out-of-bounds write vulnerability in the aws-c-event-stream library before version 0.6.0 that allows a malicious third-party server to cause memory corruption and potential arbitrary code execution on client applications.

cve-2026-5190 aws-c-event-stream out-of-bounds write code execution
2r 3t 1c
high advisory

SciTokens C++ Authorization Bypass Vulnerability (CVE-2026-32725)

SciTokens C++ library before 1.4.1 is vulnerable to an authorization bypass (CVE-2026-32725) due to improper path normalization, allowing attackers to escalate privileges by using parent-directory traversal in scope claims.

authorization-bypass privilege-escalation cve
2r 1t 1c
critical advisory

UXGROUP Cast to TV Screen Mirroring Arbitrary File Overwrite Vulnerability (CVE-2026-30282)

UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is vulnerable to arbitrary file overwrite (CVE-2026-30282) via the file import process, allowing attackers to overwrite critical internal files and potentially achieve arbitrary code execution or information exposure.

arbitrary-file-overwrite code-execution information-disclosure cve-2026-30282
2r 4t 1c 1i
critical advisory

Kerberos Authentication Relay via DNS CNAME Abuse (CVE-2026-20929)

An attacker exploits CVE-2026-20929 by manipulating DNS responses to redirect Kerberos authentication to attacker-controlled AD CS, enabling certificate enrollment for persistent access.

kerberos relay adcs cve-2026-20929 credential-access
2r 1t 1c
high advisory

NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)

NVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.

cve deserialization nvidia
2r 1t 1c 1i
high advisory

NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)

CVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.

cve-2026-24154 nvidia jetson initrd command injection privilege escalation
2r 5t 1c 1i
high advisory

NVIDIA Jetson JetPack Insecure Default Initialization Vulnerability (CVE-2026-24148)

CVE-2026-24148 is a vulnerability in NVIDIA Jetson for JetPack's system initialization logic, where an unprivileged attacker can cause the initialization of a resource with an insecure default, potentially leading to information disclosure, data tampering, and denial of service.

cve-2026-24148 nvidia-jetson insecure-default information-disclosure data-tampering denial-of-service
2r 2t 1c 1i
critical advisory

Tenda CH22 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5204)

A stack-based buffer overflow vulnerability (CVE-2026-5204) exists in the Tenda CH22 1.0.0.1 router, allowing remote attackers to execute arbitrary code by manipulating the webSiteId argument in the formWebTypeLibrary function.

cve-2026-5204 tenda buffer-overflow router
2r 1t 1c
medium advisory

MPPX TypeScript Interface Vulnerability (CVE-2026-34209)

A vulnerability exists in mppx TypeScript interface before version 0.4.11, allowing attackers to close or grief channels for free by submitting close vouchers equal to the settled amount due to incorrect validation.

vulnerability payment-channel typescript
1r 1t 1c 2i
high advisory

OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)

OpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.

cve-2026-32971 code-execution approval-bypass
2r 1t 1c
high advisory

SQL Injection Vulnerability in Student Membership System 1.0

CVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.

sql-injection vulnerability web-application
2r 1t 1c
medium advisory

Query Monitor WordPress Plugin Vulnerable to Reflected XSS (CVE-2026-4267)

The Query Monitor WordPress plugin is vulnerable to reflected cross-site scripting (XSS) due to insufficient input sanitization and output escaping of the '$_SERVER['REQUEST_URI']' parameter, allowing unauthenticated attackers to inject arbitrary web scripts.

wordpress xss reflected-xss cve-2026-4267
2r 1t 1c
critical advisory

OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.

rate-limiting brute-force webhook cve-2026-34505
2r 1t 1c 1i
medium advisory

OpenClaw Microsoft Teams Plugin Sender Allowlist Bypass (CVE-2026-34506)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin, allowing unauthorized senders to bypass intended authorization checks due to improper handling of empty groupAllowFrom parameters, potentially leading to information disclosure.

cve-2026-34506 openclaw microsoft teams allowlist bypass
2r 2t 1c
medium advisory

OpenClaw Information Disclosure via Telegram Bot Token Exposure

OpenClaw before version 2026.3.13 exposes Telegram bot tokens in error messages due to the fetchRemoteMedia function embedding these tokens in MediaFetchError strings when media downloads fail.

information-disclosure vulnerability telegram
2r 1c
critical advisory

OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)

OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.

command-injection imessage openclaw
2r 1t 1c
high advisory

code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)

A remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.

sql-injection web-application cve-2026-5195
2r 1t 1c
high advisory

DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)

A stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.

xss vulnerability web-application
2r 1t 1c
high advisory

ENOVIA Collaborative Industry Innovator Stored XSS Vulnerability (CVE-2025-10551)

A stored cross-site scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator allows an attacker to execute arbitrary script code in a user's browser session by injecting malicious code into document management functions.

xss cve-2025-10551 enovia
2r 1t 1c 1i
high advisory

DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)

CVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.

path-traversal vulnerability delmia cve-2025-10559
2r 1t 1c 1i
critical advisory

ImageMagick Multiple Vulnerabilities Leading to DoS, Code Execution, or Data Manipulation

Multiple vulnerabilities in ImageMagick could allow an attacker to perform a denial of service attack, execute arbitrary code, or manipulate data.

imagemagick vulnerability dos code_execution data_manipulation
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.

supply-chain github-actions credential-theft
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.

supply-chain github-actions credential-theft
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.

supply-chain github-actions credential-theft linux
2r 2t
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)

A SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.

sql-injection vulnerability web-application
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)

A SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)

A vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.

vulnerability openssl vcpkg cwe-427 windows
2r 2t 1c
high advisory

SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)

SciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.

authorization-bypass scitokens CVE-2026-32716
2r 1t 1c 4i
critical advisory

act Project Cache Poisoning Vulnerability Leads to Potential RCE

A vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.

act cache-poisoning rce github-actions linux
2r 1t 1c
high advisory

SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)

A path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.

scitokens path-traversal cve-2026-32727 vulnerability
2r 1t 1c
high advisory

Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)

A security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.

containerization authorization bypass privilege escalation cve-2026-34040
2r 2t 1c 2i
critical advisory

SciTokens KeyCache SQL Injection Vulnerability (CVE-2026-32714)

A SQL injection vulnerability exists in SciTokens versions before 1.9.6, allowing attackers to execute arbitrary SQL commands via the KeyCache class by manipulating user-supplied data used in SQL query construction.

sql-injection scitokens cve-2026-32714 web-application
2r 3t 1c
critical advisory

Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)

A command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.

command-injection cve-2026-5176 totolink router
2r 1t 1c
critical advisory

baserCMS OS Command Injection Vulnerability (CVE-2026-21861)

baserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.

cve-2026-21861 command-injection webserver
2r 1t 1c
medium advisory

baserCMS DOM-Based Cross-Site Scripting Vulnerability (CVE-2026-32734)

baserCMS versions prior to 5.2.3 are vulnerable to DOM-based Cross-Site Scripting (XSS) due to improper neutralization of input during web page generation, potentially allowing a remote attacker to execute arbitrary JavaScript in a user's browser.

xss vulnerability basercms
2r 1t 1c
critical advisory

baserCMS OS Command Injection Vulnerability (CVE-2026-30877)

baserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.

basercms command-injection webserver
2r 1t 1c
critical advisory

baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)

baserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.

basercms rce cve-2025-32957 webserver
2r 6t 1c 4i
critical advisory

Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1 via manipulation of the `mit_linktype` argument in the `/goform/QuickIndex` endpoint, potentially enabling remote code execution.

cve-2026-5156 buffer-overflow tenda router
2r 1t 1c
critical advisory

Tenda CH22 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1/1.If allowing remote attackers to execute arbitrary code by manipulating the `funcname` argument in the `/goform/setcfm` endpoint.

cve-2026-5154 tenda buffer-overflow router
2r 2t 1c
critical advisory

Contact Form by Supsystic WordPress Plugin SSTI Vulnerability (CVE-2026-4257)

The Contact Form by Supsystic WordPress plugin is vulnerable to Server-Side Template Injection (SSTI) via the `cfsPreFill` parameter, leading to unauthenticated Remote Code Execution (RCE).

ssti wordpress rce twig
2r 1t 1c
medium advisory

FreeRDP Heap-Buffer-Overflow Vulnerability (CVE-2026-33982)

A heap-buffer-overflow read vulnerability exists in FreeRDP versions prior to 3.24.2, specifically in the winpr_aligned_offset_recalloc() function, potentially leading to denial of service or information disclosure.

freerdp heap-buffer-overflow cve-2026-33982 rdp
2r 3t 1c 1i
high advisory

Botan SM2 Decryption Heap Over-read Vulnerability (CVE-2026-32877)

Botan C++ cryptography library versions 2.3.0 before 3.11.0 are vulnerable to a heap over-read during SM2 decryption due to insufficient validation of the authentication code length, potentially leading to crashes or undefined behavior.

cve vulnerability heap-overread botan
2r 1t 1c 2i
high advisory

SQL Injection Vulnerability in code-projects Accounting System 1.0 (CVE-2026-5150)

A remote SQL injection vulnerability (CVE-2026-5150) exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' argument in /viewin_costumer.php, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application cve-2026-5150
2r 1t
high advisory

YunaiV yudao-cloud SQL Injection Vulnerability

A remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.

cve-2026-5147 sql-injection web-application
2r 1t
medium advisory

Symantec DLP Windows Endpoint Elevation of Privilege Vulnerability (CVE-2026-3991)

CVE-2026-3991 is an elevation of privilege vulnerability in Symantec Data Loss Prevention (DLP) Windows Endpoint that could allow a local attacker to gain elevated access to resources.

vulnerability privilege-escalation symantec dlp windows
2r 1t
critical advisory

Vim Code Execution Vulnerability via Crafted Files (CVE-2026-34714)

Vim versions before 9.2.0272 allow code execution upon opening a specially crafted file due to %{expr} injection in tabpanel lacking P_MLE in the default configuration, potentially leading to arbitrary code execution.

cve-2026-34714 code-execution vim injection
2r 2t
high advisory

GNU C Library iconv() Function Assertion Failure (CVE-2026-4046)

A vulnerability in the iconv() function of the GNU C Library (versions 2.43 and earlier) can cause a crash due to an assertion failure when handling IBM1390 or IBM1399 character sets, potentially leading to remote application denial-of-service.

glibc iconv denial-of-service crash cve-2026-4046
2r 1t
high advisory

Parse Server LiveQuery Protected Field Leak via Shared Mutable State

Parse Server versions before 8.6.65 and between 9.0.0 and 9.7.0-alpha.9 are vulnerable to a data leak where protected fields and authentication data can be exposed to unauthorized clients due to shared mutable objects across concurrent LiveQuery subscribers.

parse-server livequery data-leak cve-2026-34363
3r
high advisory

TinaCMS GraphQL Path Traversal Vulnerability

A path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root by manipulating the relativePath parameter in GraphQL mutations, leading to potential arbitrary code execution.

path-traversal graphql tinacms arbitrary-file-write
2r 2t
high advisory

Glances XML-RPC Server Cross-Origin Information Disclosure

The Glances XML-RPC server exposes sensitive system information due to a permissive CORS policy and missing Content-Type validation, enabling attackers to bypass CORS restrictions and steal data like hostnames, OS details, IP addresses, and process lists.

glances cors information-disclosure vulnerability
2r 3t 2i
high advisory

Gotenberg Chromium Deny-List Bypass via Case-Insensitive URL Scheme

Gotenberg versions before 8.29.0 are vulnerable to unauthenticated arbitrary file read, where a case-insensitive URL scheme bypasses the Chromium deny-list, allowing attackers to read sensitive files such as /etc/passwd by using mixed-case or uppercase URL schemes like FILE:///etc/passwd, leading to the leakage of sensitive data from the Gotenberg container and bypassing the fix for CVE-2024-21527.

gotenberg file-read vulnerability chromium
2r 1t
high advisory

libp2p-gossipsub Remote Denial of Service via Integer Overflow

A remote, unauthenticated attacker can crash applications using libp2p-gossipsub versions prior to 0.49.4 by sending a crafted PRUNE control message with a near-maximum backoff value, causing an arithmetic overflow during heartbeat processing.

libp2p gossipsub denial-of-service integer overflow rust
2r 1t
critical advisory

Multiple Vulnerabilities in Wazuh Leading to Code Execution and Data Manipulation

Multiple vulnerabilities in Wazuh allow an attacker to perform denial-of-service attacks, execute arbitrary code, manipulate data, and disclose sensitive information, potentially leading to significant data breaches and system compromise.

wazuh vulnerability code-execution data-manipulation
2r 6t
high advisory

Red Hat Undertow Multiple Vulnerabilities Allow Security Bypass

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat Undertow to bypass security measures, manipulate data, and disclose sensitive information.

redhat undertow security-bypass information-disclosure data-manipulation
2r 3t
critical advisory

Multiple Vulnerabilities in Fleet

Multiple vulnerabilities in Fleet allow an attacker to perform SQL injection, denial of service, bypass security measures, disclose information, and execute arbitrary program code with administrator privileges.

fleet vulnerability sql-injection denial-of-service
2r 8t
critical advisory

Multiple Vulnerabilities in Grafana

Multiple vulnerabilities in Grafana allow a remote attacker to conduct a denial-of-service attack, execute code, or disclose information.

grafana vulnerability dos code-execution information-disclosure
2r 4t
medium advisory

Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation

Detection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.

privilege-escalation defense-evasion persistence initial-access active-directory
2r 4t
high advisory

Langflow Vulnerability Allows File Manipulation

An authenticated, remote attacker can exploit a vulnerability in Langflow to manipulate files, potentially leading to unauthorized data modification or application compromise.

langflow file-manipulation vulnerability
2r 1t
critical advisory

ArthurFiorette steam-trader 2.1.1 Sensitive Information Exposure

CVE-2026-5128 exposes sensitive Steam account data via the /users API endpoint and logs in ArthurFiorette steam-trader 2.1.1, allowing account takeover.

cve-2026-5128 steam-trader information-disclosure credential-access account-takeover
2r 3t
high advisory

OpenBao Multiple Vulnerabilities Allow Security Bypass and XSS

An anonymous, remote attacker can exploit multiple vulnerabilities in OpenBao to bypass security measures or conduct cross-site scripting attacks.

openbao vulnerability security-bypass xss
2r 4t
high advisory

Multiple Vulnerabilities in Dovecot Mail Server

Multiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.

dovecot vulnerability sql-injection authentication-bypass dos
2r 2t
high advisory

Internet Systems Consortium BIND Vulnerabilities Leading to Denial of Service

Multiple vulnerabilities in Internet Systems Consortium BIND can be exploited by a remote attacker to conduct a denial of service attack or bypass security measures.

dns denial-of-service bind
2r 1t
critical advisory

Multiple Vulnerabilities in NGINX and NGINX Plus

Multiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.

nginx vulnerability denial-of-service code-execution webserver linux
2r 1t
critical advisory

Multiple Vulnerabilities in F5 BIG-IP and F5OS

Multiple vulnerabilities in F5 BIG-IP and F5OS allow an attacker to bypass security mechanisms, escalate privileges, cause a denial-of-service condition, perform a cross-site scripting attack, and disclose or manipulate information.

f5 big-ip f5os vulnerability
2r 5t
critical advisory

Gigabyte Control Center Arbitrary File Write Vulnerability

Gigabyte Control Center has an Arbitrary File Write vulnerability (CVE-2026-4415) that allows unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

cve-2026-4415 arbitrary-file-write privilege-escalation code-execution gigabyte
2r 2t
high advisory

Tinyproxy HTTP Chunked Encoding Integer Overflow Denial of Service

An integer overflow vulnerability in Tinyproxy's HTTP chunked transfer encoding parser (versions <= 1.11.3) allows an unauthenticated remote attacker to cause a denial of service by sending a crafted chunk size that bypasses validation, leading to resource exhaustion.

tinyproxy denial-of-service integer-overflow cve-2026-3945
2r 1t
high advisory

CVE-2026-2328 Unauthenticated Path Traversal Vulnerability

CVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.

path-traversal vulnerability webserver
2r 1t 2i
medium advisory

CrowdStrike Falcon Cloud Security Advances CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike Falcon Cloud Security enhances its CNAPP capabilities, incorporating adversary intelligence to prioritize cloud risks based on threat actor behavior, particularly focusing on groups like LABYRINTH CHOLLIMA and SCATTERED SPIDER, to enable security teams to understand and remediate cloud exposures more effectively.

Lazarus Group +10 cloud-security cnapp threat-intelligence
2r 5t
high advisory

Securing AI Agents and Governing Shadow AI

CrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.

AI agentic-soc shadow-ai
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.

supply-chain credential-theft github-actions
2r 1t
high advisory

GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)

GitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.

gitlab jira authentication authorization cve-2026-2370
2r 2t 1i
critical advisory

Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)

Xiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.

CVE-2026-34005 command-injection xiongmai dvr nvr
2r 1t
high advisory

OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability

The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.

openclaw vulnerability authorization
2r 1t
high advisory

OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs

OpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.

ssrf openclaw cve-2026-28476
2r 1t
high advisory

Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)

A remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.

traefik grpc authorization-bypass cve-2026-33186
2r 1t
high advisory

XPath Boolean Expression DoS Vulnerability

A vulnerability in the antchfx/xpath package allows for denial of service via CPU exhaustion by exploiting boolean expressions that evaluate to true, leading to an infinite loop.

xpath denial-of-service cve-2026-32287
2r 1t
critical advisory

Tenda FH1201 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5046)

A stack-based buffer overflow vulnerability (CVE-2026-5046) in Tenda FH1201 version 1.2.0.14(408) allows remote attackers to execute arbitrary code by manipulating the GO argument in the formWrlExtraSet function of the /goform/WrlExtraSet component.

CVE-2026-5046 tenda buffer-overflow router
2r 1t 1i
medium advisory

CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools

CrowdStrike's Falcon Next-Gen SIEM now supports third-party EDR solutions, starting with Microsoft Defender, to extend AI-native SOC capabilities without replacing existing endpoint agents.

siem edr threat-intelligence
2r 2t
high advisory

OpenClaw Credential Exposure via Leaked Pairing Codes

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.

credential-access vulnerability openclaw
2r 1t
critical advisory

Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.

cve-2026-5044 buffer-overflow belkin router
2r 1t
medium advisory

OpenClaw Insufficient File Permissions Vulnerability (CVE-2026-33572)

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents and extract sensitive information.

cve-2026-33572 file-permissions credential-access
2r 1t 4i
high advisory

OpenClaw Code Execution via Script Modification (CVE-2026-32979)

OpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.

cve-2026-32979 code-execution openclaw
2r 1t
critical advisory

OpenClaw Bootstrap Code Replay Vulnerability (CVE-2026-32987)

OpenClaw before 2026.3.13 is vulnerable to a replay attack during device pairing verification, allowing attackers to repeatedly verify a bootstrap code and escalate privileges to operator.admin.

replay-attack privilege-escalation device-pairing
2r 2t 1i
high advisory

OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)

OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.

authentication-bypass webhook cve-2026-32974
2r 1t
critical advisory

OpenClaw Exec Allowlist Bypass via POSIX Path Overmatching (CVE-2026-32973)

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability (CVE-2026-32973) due to improper normalization of patterns, allowing attackers to execute unintended commands via wildcard matching in POSIX paths.

cve-2026-32973 openclaw allowlist-bypass
2r 1t
high advisory

OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.

openclaw sandbox-escape authorization
2r 1t
critical advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-32922)

OpenClaw before 2026.3.11 is vulnerable to privilege escalation in the device.token.rotate function, allowing attackers with limited operator.pairing scope to mint tokens with elevated operator.admin privileges, potentially leading to remote code execution.

privilege-escalation remote-code-execution cve
2r 2t 2i
high advisory

OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.

sandbox-escape privilege-escalation cve-2026-32915
2r 2t
high advisory

OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.

insufficient-access-control privilege-escalation web-application
2r 1t 3i
critical advisory

Belkin F9K1122 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5042) exists in the Belkin F9K1122 router version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the webpage argument in the formCrossBandSwitch function.

cve-2026-5042 buffer-overflow router
2r 3t 4i
high advisory

Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.

phishing credential-theft cloud
2r 2t
critical advisory

Tenda 4G06 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5036)

A stack-based buffer overflow vulnerability (CVE-2026-5036) exists in the fromDhcpListClient function of the Tenda 4G06 router (version 04.06.01.29), potentially allowing remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/DhcpListClient endpoint.

cve-2026-5036 buffer-overflow router tenda
2r 1t
high advisory

Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.

ai prompt-injection data-security
2r 5t
medium advisory

CrowdStrike CNAPP Adds Adversary-Informed Risk Prioritization

CrowdStrike's CNAPP enhancements prioritize cloud risks based on adversary behavior, application context, and configuration change tracking to reduce breach likelihood.

Lazarus Group +10 cnapp cloud-security risk-prioritization
2r 1t
medium advisory

Securing AI Agents with Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents by blocking prompt injection attacks, redacting sensitive data, defanging malicious content, and moderating unwanted topics, ensuring compliance and preventing abuse.

ai-security prompt-injection data-protection
3r 4t
medium advisory

CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender EDR

CrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions like Microsoft Defender, enabling unified detection and response across diverse environments, addressing the challenges of cross-domain attacks and fragmented security systems.

siem edr threat-intelligence
2r 2t
high advisory

code-projects Accounting System 1.0 SQL Injection Vulnerability (CVE-2026-5034)

A remote SQL injection vulnerability exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' parameter in '/edit_costumer.php', potentially allowing unauthorized database access.

sqli cve-2026-5034 web-application
2r 1t
critical advisory

Tenda F453 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5021)

A stack-based buffer overflow vulnerability in Tenda F453 1.0.0.3 allows a remote attacker to execute arbitrary code by manipulating the 'delno' argument in the fromPPTPUserSetting function of the /goform/PPTPUserSetting component's httpd process.

cve-2026-5021 buffer-overflow router
2r 1t
critical advisory

Wavlink WL-WN579X3-C Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in Wavlink WL-WN579X3-C 231124's UPNP Handler component, specifically in the /cgi-bin/firewall.cgi file and the sub_4019FC function, allowing remote attackers to execute arbitrary code by manipulating the UpnpEnabled argument; public exploits are available, but the vendor has not responded to the disclosure.

cve buffer-overflow router
2r 1t
medium advisory

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for improved risk prioritization, addressing limitations in infrastructure visibility, threat actor behavior analysis, and alert triage.

Lazarus Group +10 cloud-security cnapp risk-prioritization
2r 3t
high advisory

SQL Injection Vulnerability in Simple Food Order System 1.0

A SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.

sql-injection web-application vulnerability
2r 1t
high advisory

code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)

CVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.

sql-injection web-application vulnerability
2r 1t
medium advisory

elecV2 elecV2P Server-Side Request Forgery Vulnerability (CVE-2026-5016)

A server-side request forgery vulnerability exists in elecV2 elecV2P up to 3.8.3, affecting the eAxios function within the /mock URL handler, allowing remote attackers to manipulate the req argument and potentially conduct internal reconnaissance or other malicious activities.

cve-2026-5016 ssrf elecv2 web-application
2r 2t
medium advisory

CrowdStrike Falcon SIEM Integration with Microsoft Defender

CrowdStrike's Falcon Next-Gen SIEM expands to support third-party EDR solutions, beginning with Microsoft Defender, to unify detection, investigation, and response without requiring the Falcon sensor and modernize security operations.

siem edr integration microsoft-defender
2r 10t
high advisory

CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails, providing enterprise-grade protection for AI agents by defending against runtime attacks like prompt injection, redacting sensitive data, defanging malicious content, and moderating unwanted topics to ensure agents stay within compliance boundaries in sectors like finance, healthcare, customer service, and software development.

ai-security prompt-injection data-exfiltration
2r 2t
high advisory

Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents from attacks like prompt injection, data exfiltration, and unauthorized actions, enabling organizations to deploy AI applications more securely.

ai-security prompt-injection data-protection ai-agents
2r 1t
medium advisory

CrowdStrike Innovations Secure AI Agents and Govern Shadow AI

CrowdStrike is introducing innovations to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by extending AI detection and response (AIDR) capabilities to cover desktop AI applications and provide visibility into AI-related components, helping to prevent prompt attacks, data leaks, and policy violations.

AI AI-Security Shadow-AI Endpoint-Security SaaS Cloud
2r 2t
medium advisory

CrowdStrike Falcon SIEM Integrates with Microsoft Defender EDR

CrowdStrike Falcon Next-Gen SIEM is expanding its capabilities to integrate with third-party EDR solutions, starting with Microsoft Defender, to enable organizations to extend their AI-native SOC across heterogeneous environments without replacing existing endpoint agents.

siem edr microsoft-defender crowdstrike-falcon
2r 1t
medium advisory

Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR integrates with NVIDIA NeMo Guardrails to provide comprehensive protection for AI agents against prompt injection, data leaks, and malicious content.

ai security agentic-soc
2r 2t
medium advisory

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike has enhanced its CNAPP capabilities by adding application-layer visibility and prioritizing risks based on known adversary tactics, techniques, and procedures (TTPs).

Lazarus Group +10 cloud-security cnapp threat-intelligence risk-prioritization
2r 2t
high advisory

SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension

A SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.

sql-injection vulnerability pandasai
2r 1t
critical advisory

Crashmail 1.6 Stack-Based Buffer Overflow Vulnerability

Crashmail 1.6 is vulnerable to a stack-based buffer overflow, allowing remote attackers to execute arbitrary code via malicious input and potentially leading to denial of service.

buffer-overflow remote-code-execution cve-2018-25223
2r 5t
high advisory

SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)

SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.

buffer-overflow code-execution CVE-2018-25222
2r 1t
high advisory

Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)

Flat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.

cve-2017-20228 buffer-overflow local-privilege-escalation
2r 1t
critical advisory

EChat Server 3.1 Buffer Overflow Vulnerability in chat.ghp Endpoint

EChat Server 3.1 is vulnerable to a buffer overflow in the chat.ghp endpoint, allowing remote attackers to execute arbitrary code by sending a crafted GET request with an oversized username parameter.

buffer-overflow code-execution echat
2r 1t
critical advisory

JAD Java Decompiler Stack-Based Buffer Overflow Vulnerability

JAD Java Decompiler 1.5.8e-1kali1 and prior is vulnerable to a stack-based buffer overflow, allowing attackers to execute arbitrary code by providing overly long input to the jad command leading to a return-oriented programming chain execution and shell spawning.

cve buffer_overflow java_decompiler
2r 2t
high advisory

PInfo 0.6.9-5.1 Local Buffer Overflow Vulnerability

PInfo version 0.6.9-5.1 is susceptible to a local buffer overflow vulnerability, enabling local attackers to execute arbitrary code by providing an overly large argument to the '-m' parameter, ultimately allowing for shellcode execution with user privileges.

buffer-overflow local-privilege-escalation cve-2016-20044
2r 1t
high advisory

yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)

yTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.

cve-2016-20038 buffer-overflow local-code-execution
2r 1t
high advisory

TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)

TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.

cve-2016-20040 buffer-overflow local-privilege-escalation
2r 1t
high advisory

Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)

Multi Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.

cve buffer overflow code execution
2r 1t
high advisory

xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)

A stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.

cve buffer-overflow code-execution
2r 3t
high advisory

Undertow Request Smuggling Vulnerability (CVE-2026-28368)

CVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.

undertow request-smuggling cve-2026-28368
2r 1t
critical advisory

Tenda AC15 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4975)

A stack-based buffer overflow vulnerability (CVE-2026-4975) exists in the Tenda AC15 router version 15.03.05.19, allowing remote attackers to execute arbitrary code by manipulating the 'funcpara1' argument in a POST request to /goform/setcfm.

tenda router buffer overflow cve-2026-4975
2r 1t
high advisory

LibreChat SSRF Vulnerability (CVE-2026-31943)

LibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.

ssrf librechat cve-2026-31943
2r 2t 1i
high advisory

Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage

A server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.

ssrf vulnerability clerk cloud
2r 1t
high advisory

LangChain Core Path Traversal Vulnerability in Legacy APIs

A path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.

langchain path-traversal vulnerability
1r 1t
medium advisory

CrowdStrike Falcon Enhancements for Securing AI Environments

CrowdStrike is enhancing its Falcon platform with new features focusing on AI Detection and Response (AIDR) capabilities across endpoints, SaaS, and cloud environments to mitigate risks such as prompt injection attacks, data leaks, and policy violations related to AI agents and shadow AI.

ai security falcon agentic-soc prompt-injection
2r 2t
medium advisory

CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike Falcon Cloud Security enhances CNAPP capabilities with application-layer visibility and adversary-informed risk prioritization, enabling security teams to focus on attacker-aligned risks and known threat actors.

Lazarus Group +10 cloud-security cnaap risk-prioritization
2r 3t
medium advisory

CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization

CrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.

Lazarus Group +10 cloud cnapp risk-prioritization
2r 8t
high advisory

CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI

CrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.

ai shadow-ai prompt-injection data-leak endpoint-security
2r 3t
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.

agentic-soc mdr soc ai
2r 2t
medium advisory

CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Automated Security Operations

CrowdStrike introduces Charlotte AI AgentWorks and Agentic SOAR to enhance security operations through AI-driven automation and orchestration, reducing manual workloads and improving decision accuracy.

ai automation security operations soar
2r
medium advisory

CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools

CrowdStrike Falcon Next-Gen SIEM is expanding to support third-party EDR solutions, starting with Microsoft Defender, enabling organizations to extend their AI-native SOC across their ecosystem by unifying detection, investigation, and response.

SIEM EDR Microsoft Defender
2r
medium advisory

CrowdStrike Charlotte AI AgentWorks for Agentic SOC Transformation

CrowdStrike's Charlotte AI AgentWorks facilitates the development and deployment of AI-driven security agents within the SOC, aiming to enhance analyst capabilities through automated and orchestrated responses to threats.

agentic-soc ai-security automation
2r 2t
medium advisory

CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Agentic Security Operations

CrowdStrike's Charlotte AI AgentWorks and Agentic SOAR aim to revolutionize security operations by enabling the creation and orchestration of AI-powered agents, enhancing analyst capabilities and automating tasks to combat AI-accelerated adversaries.

agentic-soc ai security-automation
2r
high advisory

Tycoon2FA PhaaS Platform Resurgence After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.

phishing credential-theft MFA-bypass
2r 2t 1i
high advisory

CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails Secure AI Agents

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0), providing enterprise-grade protection for AI agents by managing data access, controlling responses, ensuring policy compliance, and blocking prompt injection attacks.

AI-security prompt-injection data-protection
2r 1t
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike's Agentic MDR combines machine-speed execution with expert oversight, leveraging deterministic automation and adaptive AI agents to enhance breach prevention and SOC modernization.

agentic-soc mdr soc-transformation ai
2r 2t
high advisory

Tycoon2FA Phishing-as-a-Service Resurgence After Takedown

The Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.

phishing credential-theft MFA-bypass phishing-as-a-service
2r 2t 1i
medium advisory

CrowdStrike Flex for Services Expands Access to Incident Response Expertise

CrowdStrike is expanding its Falcon Flex model to its services offering, providing flexible access to incident response, proactive security services, advisory, platform services, and training.

incident-response security-services
2r 2t
medium advisory

CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike's new CNAPP capabilities in Falcon Cloud Security focus on adversary-informed risk prioritization by correlating application-layer visibility with threat actor profiles and techniques, enabling security teams to understand cloud risk, prioritize remediation, and accelerate response.

Lazarus Group +10 cloud-security cnapp threat-intelligence risk-prioritization
3r 2t
low advisory

CrowdStrike Falcon Flex for Services Expansion

CrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.

incident-response security-services crowdstrike
3r 2t
medium advisory

CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender

CrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions, beginning with Microsoft Defender, enabling organizations to extend their AI-native SOC and unify detection across heterogeneous environments.

siem edr microsoft defender crowdstrike falcon
2r 1t
medium advisory

CrowdStrike Falcon Enhancements for Securing AI Agents and Governing Shadow AI

CrowdStrike is enhancing its Falcon platform with new AI detection and response capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments, addressing threats like prompt injection and data leaks.

AI-Security Shadow-AI Endpoint-Security
2r
medium advisory

CrowdStrike Falcon Data Security Introduction

CrowdStrike's Falcon Data Security aims to protect sensitive data by providing visibility into data movement across various environments and preventing data theft.

data-security data-loss-prevention crowdstrike
2r 2t
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike's agentic MDR combines automation, AI agents, and human oversight for rapid breach response, while SOC Transformation Services modernize security operations for an agentic SOC approach.

agentic-soc mdr soc-transformation
3r
critical advisory

Compromised trivy-action GitHub Action Enables Credential Theft

The trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.

supply-chain credential-theft github-actions
2r 1t
high advisory

Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)

The Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.

ssrf wordpress oxygen-theme cve-2025-12886
2r 1t
high advisory

eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)

CVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.

cve-2026-1679 buffer-overflow kernel-memory-corruption
2r 2t
high advisory

WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)

WeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.

cve-2026-33991 sql-injection web-application
2r 1t
high advisory

OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope

The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.

openclaw privilege-escalation vulnerability
2r 1t
high advisory

MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability

A vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.

minio s3 metadata-injection denial-of-service
2r 1t
critical advisory

Giskard-agents ChatWorkflow.chat() Server-Side Template Injection

Giskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.

ssti jinja2 rce giskard-agents vulnerability
2r 1t
high advisory

LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)

LinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.

ssrf linkace vulnerability
2r 1t
high advisory

UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)

UniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.

unifi mitm credential-theft cve-2019-25652
2r 2t
critical advisory

Totolink LR350 Remote Buffer Overflow Vulnerability (CVE-2026-4976)

A buffer overflow vulnerability in Totolink LR350 version 9.3.5u.6369_B20220309 allows a remote attacker to execute arbitrary code by manipulating the 'ssid' argument in the setWiFiGuestCfg function.

cve-2026-4976 buffer-overflow totolink router remote-code-execution
2r 1t
critical advisory

Gematik Authenticator Authentication Flow Hijacking Vulnerability (CVE-2026-33875)

Gematik Authenticator versions prior to 4.16.0 are vulnerable to authentication flow hijacking via malicious deep links, potentially allowing attackers to authenticate with victim user identities.

cve-2026-33875 authentication-hijacking gematik-authenticator deeplink
2r 2t
critical advisory

Tenda AC7 Stack-Based Buffer Overflow in SetSysTimeCfg

A stack-based buffer overflow vulnerability exists in Tenda AC7 version 15.03.06.44 within the fromSetSysTime function of the /goform/SetSysTimeCfg component's POST Request Handler, allowing a remote attacker to potentially execute arbitrary code by manipulating the 'Time' argument.

cve buffer-overflow router
2r 1t
high advisory

AWS SDK for PHP CloudFront Policy Document Injection via Special Characters

A vulnerability exists in the AWS SDK for PHP CloudFront signing utilities where special characters in input values are not properly handled when creating policy documents, potentially leading to unintended access restrictions, affecting versions 3.11.7 through 3.371.3.

aws cloudfront injection security
2r 1t 1i
high advisory

Langflow IDOR Vulnerability Allows Cross-User Flow Manipulation

Langflow versions 1.5.0 and earlier contain an IDOR vulnerability (CVE-2026-34046) that allows authenticated users to read, modify, and delete flows belonging to other users due to a missing ownership check, potentially exposing sensitive information and enabling unauthorized control over AI agent logic.

idor langflow vulnerability
2r 3t
high advisory

@mobilenext/mobile-mcp Path Traversal Vulnerability

The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.

path-traversal file-write privilege-escalation persistence
2r 2t
critical advisory

letta-ai letta 0.16.4 Remote Code Injection Vulnerability (CVE-2026-4965)

letta-ai letta version 0.16.4 contains a remote code injection vulnerability (CVE-2026-4965) in the resolve_type function of ast_parsers.py, stemming from improper neutralization of directives in dynamically evaluated code, allowing unauthenticated remote attackers to execute arbitrary code.

CVE-2026-4965 code-injection letta-ai
2r 2t
high advisory

Moby Authorization Plugin Bypass via Oversized Request Bodies

A vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.

docker authz authorization bypass cve-2026-34040
2r
critical advisory

Tenda AC6 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.

cve-2026-4960 buffer-overflow tenda router
2r 1t
high advisory

Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)

A remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.

cve request-smuggling undertow webserver
2r 1t
medium advisory

Incus Image Cache Poisoning Vulnerability

A vulnerability exists in Incus where it does not properly verify the combined fingerprint when downloading images from simplestreams servers, allowing an attacker to perform image cache poisoning and potentially expose other tenants to running attacker-controlled images.

incus image-poisoning simplestreams
2r 1t 3i
high advisory

Postiz App SSRF Vulnerability via Next.js

A high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.

ssrf vulnerability cloud
2r 1t 1i
critical advisory

Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)

The 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.

path-traversal file-upload cve-2026-5027 web-application
2r 3t
high advisory

mingSoft MCMS Server-Side Request Forgery Vulnerability (CVE-2026-4953)

A server-side request forgery (SSRF) vulnerability (CVE-2026-4953) exists in mingSoft MCMS version 5.5.0, allowing remote attackers to manipulate the 'catchimage' argument in the catchImage function to potentially access or interact with internal resources.

SSRF mingSoft CVE-2026-4953
2r 3t
critical advisory

Group-Office JMAP Contact/Query SQL Injection Vulnerability

An authenticated SQL Injection vulnerability in Group-Office's JMAP Contact/query endpoint allows data extraction, including session tokens, leading to account takeover if unpatched.

sqli cve-2026-33755 group-office jmap
2r 3t
critical advisory

Grafana Enterprise Plugin SQL Expression RCE via CVE-2026-27876

A chained attack leveraging SQL Expressions and a Grafana Enterprise plugin, tracked as CVE-2026-27876, can lead to remote arbitrary code execution on vulnerable Grafana instances with the sqlExpressions feature enabled.

grafana rce sqlexpression
2r 2t 2i
critical advisory

Multiple Vulnerabilities in Canva Affinity, TP-Link, and HikVision Devices

Cisco Talos disclosed multiple vulnerabilities in Canva Affinity, TP-Link Archer AX53, and HikVision Ultra Face Recognition Terminal products which could lead to sensitive information disclosure, arbitrary code execution, or credentials leak if exploited.

vulnerability code-execution information-disclosure
3r 6t
high advisory

OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.

openclaw symlink-traversal vulnerability npm rce persistence
2r 2t
high advisory

Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)

A stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.

cve buffer_overflow compiler
2r 2t
critical advisory

Tenda AC5 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4903)

A stack-based buffer overflow vulnerability exists in Tenda AC5 version 15.03.06.47, allowing remote attackers to execute arbitrary code by manipulating the `PPPOEPassword` argument in the `formQuickIndex` function of the `/goform/QuickIndex` component.

cve-2026-4903 buffer-overflow tenda
2r 1t
high advisory

LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)

An out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.

libpng png oob CVE-2026-33636 vulnerability defense-evasion privilege-escalation
2r 2t
high advisory

Kestra Orchestration Platform XSS Vulnerability (CVE-2026-33664)

Kestra versions up to 1.3.3 are vulnerable to a cross-site scripting (XSS) vulnerability (CVE-2026-33664) allowing arbitrary JavaScript execution by viewing crafted flow metadata.

kestra xss cve-2026-33664 orchestration
2r 1t
high advisory

EVerest Out-of-Bounds Access Vulnerability (CVE-2026-26008)

EVerest, an EV charging software stack, has an out-of-bounds access vulnerability in versions prior to 2026.02.0, which can lead to remote crash or memory corruption when the CSMS sends UpdateAllowedEnergyTransferModes over the network.

cve ev-charging out-of-bounds denial-of-service
2r 2t 2i
high advisory

EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)

A stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.

everest buffer-overflow cve-2026-23995 ev-charging
2r 3t
high advisory

CVE-2026-4926: Regular Expression Denial of Service

CVE-2026-4926 describes a denial-of-service vulnerability due to an inefficient regular expression complexity issue when handling multiple sequential optional groups, leading to exponential growth and resource exhaustion.

denial-of-service regex cve
2r 2t
high advisory

BadAML Injection Allows Arbitrary Code Execution in Confidential VMs

The BadAML injection attack allows arbitrary code execution in confidential VMs by exploiting the ACPI interface, enabling attackers with host control to execute malicious AML code within the guest.

badaml acpi injection confidential-computing
2r 1t
high advisory

Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)

CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.

openshift kubernetes networkpolicy unauthorized-access
2r 1t 2i
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Tool

Multiple critical vulnerabilities in n8n, including prototype pollution, code injection, and SQL injection, allow authenticated users to achieve remote code execution, read sensitive files, and perform unauthorized database operations.

n8n vulnerability rce sqli code-injection
3r 2t
high advisory

Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)

Doveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.

vulnerability timing oracle credential access doveadm
2r 1t
medium advisory

ManageSieve AUTHENTICATE Command Denial-of-Service Vulnerability (CVE-2025-59032)

CVE-2025-59032 describes a vulnerability in ManageSieve's AUTHENTICATE command, where using a literal as a SASL initial response can crash the ManageSieve service, leading to a denial-of-service condition.

denial-of-service managesieve cve-2025-59032 mail-service
2r 1t 1i
high advisory

Spring AI Redis Store TAG Injection Vulnerability (CVE-2026-22744)

CVE-2026-22744 is a code injection vulnerability in Spring AI's RedisFilterExpressionConverter which allows an attacker to inject arbitrary commands into RediSearch TAG blocks via unescaped user-controlled strings, affecting versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4.

injection spring-ai redis
2r 1t
critical advisory

Spring AI SimpleVectorStore SpEL Injection Vulnerability (CVE-2026-22738)

A SpEL injection vulnerability exists in Spring AI's SimpleVectorStore when a user-supplied value is used as a filter expression key, potentially allowing malicious actors to execute arbitrary code in vulnerable applications.

spel-injection spring-ai cve-2026-22738 code-execution
2r 1t 1i
high advisory

Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)

Spring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.

ssrf spring-ai bedrockproxychatmodel cve-2026-22742
2r 1t 2i
high advisory

Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.

cve-2026-4910 sql-injection streamax webserver
2r 1t 5i
high advisory

cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects

The cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.

cpp-httplib credential-leak cve-2026-33745 http-redirect credential-access cross-origin
2r 1t
critical advisory

Tenda AC5 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-4905) exists in Tenda AC5 firmware version 15.03.06.47 allowing remote attackers to execute arbitrary code by manipulating the 'index' argument in a POST request to the /goform/WifiWpsOOB endpoint.

buffer-overflow tenda router cve-2026-4905
2r 1t
critical advisory

vLLM Remote Code Execution Vulnerability (CVE-2026-27893)

vLLM versions before 0.18.0 are vulnerable to remote code execution due to hardcoded trust of remote code, even when explicitly disabled by the user, allowing attackers to execute arbitrary code via malicious model repositories.

vLLM RCE CVE-2026-27893
2r 1t 1i
critical advisory

Incus Instance Template Vulnerability CVE-2026-33897

A vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.

incus template-injection privilege-escalation CVE-2026-33897 linux
3r 1t
high advisory

C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)

The c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.

denial-of-service pyasn c2cciutils dependency-vulnerability
2r 1t
high advisory

Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)

A path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.

path-traversal cms laravel web-application
2r 1t
high advisory

Forge Ed25519 Signature Forgery Vulnerability

Forge is vulnerable to signature forgery in Ed25519 due to a missing check that S < L, allowing non-canonical signatures and potentially bypassing authentication/authorization logic, affecting versions before 1.4.0.

ed25519 signature-forgery forge javascript
2r 1t
high advisory

Node-Forge Certificate Chain Verification Bypass due to basicConstraints Violation

Node-forge's certificate chain verification fails to enforce RFC 5280 basicConstraints, allowing leaf certificates without basicConstraints and keyUsage extensions to act as Certificate Authorities, leading to potential certificate forgery and man-in-the-middle attacks.

certificate-forgery man-in-the-middle node-forge basicConstraints
2r 3t 1i
high advisory

OpenClaw ACP Chat Command Injection Vulnerability

A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.

openclaw acp chat-command-injection vulnerability
2r
critical advisory

Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338

CVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.

CVE-2023-7338 ruckus rce os command injection
2r 3t 2i
high advisory

Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)

Ory Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.

xss ory-polis cve-2026-33506 cloud
2r 1t
high advisory

OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability

The openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.

supply-chain vulnerability npm
2r
high advisory

Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing

Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.

netty request-smuggling http
2r 1t 2i
high advisory

Netty HTTP/2 CONTINUATION Frame Flood Denial of Service

A denial of service vulnerability exists in Netty's HTTP/2 server implementation where an unauthenticated user can exhaust server CPU resources by sending a flood of CONTINUATION frames with zero-byte payloads, bypassing size-based mitigations and leading to service unavailability with minimal bandwidth usage; affected versions include netty-codec-http2 < 4.1.132.Final and netty-codec-http2 versions >= 4.2.0.Alpha1 and < 4.2.10.Final.

denial-of-service http2 netty cve-2026-33871
1r
critical advisory

OpenBao OIDC Direct Callback Authentication Bypass Vulnerability

OpenBao versions before 2.5.2 lack user confirmation for OIDC direct callback mode, allowing attackers to perform remote phishing and bypass authentication.

openbao oidc authentication-bypass phishing
2r 1t
high advisory

Ory Kratos SQL Injection Vulnerability in ListCourierMessages API

A SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.

ory-kratos sql-injection cve-2026-33503 cloud
2r 1t
high advisory

Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)

Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.

cve-2026-3108 mattermost terminal-injection
2r 1t
high advisory

Kysely SQL Injection Vulnerability (CVE-2026-33468)

A SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.

kysely sql-injection cve-2026-33468
2r 1t
high advisory

SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)

Kysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.

sql-injection kysely cve-2026-33442
2r 1t
medium advisory

EVerest EV Charging Stack Data Race Vulnerability (CVE-2026-26074)

EVerest versions prior to 2026.02.0 exhibit a data race vulnerability (CVE-2026-26074) where concurrent network requests and physical events can corrupt the event queue, leading to potential denial of service or other undefined behavior.

cve-2026-26074 data-race ev-charging everest
2r
critical advisory

n8n Prototype Pollution Vulnerability Leads to Remote Code Execution

A prototype pollution vulnerability in the n8n GSuiteAdmin node allows authenticated users with workflow creation/modification permissions to achieve remote code execution (RCE) by injecting attacker-controlled values into `Object.prototype`.

n8n prototype-pollution rce
2r 1t
high advisory

CPCI85 and SICORE Base System XML Out-of-Bounds Write Vulnerability

An unauthenticated attacker can exploit an out-of-bounds write vulnerability in CPCI85 Central Processing/Communication and SICORE Base System by sending a malicious XML request, potentially causing a service crash leading to a denial-of-service condition.

cve-2026-27664 denial-of-service xml
2r 1t
high advisory

EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.

buffer overflow EV charging code execution
2r 3t
critical advisory

EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)

EVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.

everest rce buffer-overflow cve-2026-22790
2r 1t 1i
high advisory

Fluent Booking WordPress Plugin Stored XSS Vulnerability

The Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.

wordpress xss cve-2026-2231
2r 1t
high advisory

HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)

CVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.

cve-2025-55262 sql-injection web-application
2r 1t
high advisory

HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)

A missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.

privilege-escalation access-control web-application
2r 1t 1i
critical advisory

Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)

A command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.

command-injection rce foreman
2r 1t
high advisory

Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)

Online Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.

sql-injection cve-2018-25207 web-application
2r 1t 4i
high advisory

KomSeo Cart 1.3 SQL Injection Vulnerability

KomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.

sqli vulnerability web-application
2r 1t
high advisory

ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability

ASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.

sql-injection vulnerability asp.net
2r 1t
critical advisory

Wecodex Hotel CMS 1.0 SQL Injection Vulnerability

Wecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.

sqli web-application authentication-bypass
2r 1t
critical advisory

School Management System CMS 1.0 SQL Injection Vulnerability

School Management System CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing attackers to bypass authentication by injecting SQL code through the username parameter.

sql-injection web-application vulnerability
2r 1t
critical advisory

SiYuan Note Taking Application Directory Traversal Vulnerability

SiYuan note taking application is vulnerable to a directory traversal via the /api/file/readDir endpoint, which does not require authentication, allowing an attacker to enumerate the directory structure and retrieve file names, potentially leading to arbitrary document reading.

directory-traversal siyuan cve-2026-33670
2r 1t
high advisory

OpenEMR XXE Vulnerability (CVE-2026-33913)

OpenEMR before version 8.0.0.3 is vulnerable to XML External Entity (XXE) injection, allowing an authenticated user with access to the Carecoordination module to upload a crafted CCDA document and read arbitrary files from the server.

cve-2026-33913 xxe openemr web-application
2r 1i
high advisory

OpenEMR Missing Authorization Allows Unauthorized Data Deletion

OpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.

openemr authorization-bypass data-deletion
2r 1t
critical advisory

node-tesseract-ocr OS Command Injection Vulnerability

The node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.

command-injection nodejs tesseract-ocr cve-2026-26832
2r 1t 5i
high advisory

NATS Server WebSocket Frame Length Overflow Denial of Service

A vulnerability in NATS server allows a remote, unauthenticated attacker to cause a denial of service by sending a crafted WebSocket frame, leading to a server crash due to missing validation on WebSocket frame length.

nats websocket denial-of-service CVE-2026-27889 server-crash
2r 1t
critical advisory

n8n Merge Node AlaSQL Injection Vulnerability

An authenticated user with workflow creation/modification permissions can exploit insufficient restrictions in the n8n Merge node's AlaSQL sandbox to achieve remote code execution by reading local files or executing commands on the n8n host.

n8n rce alaqsl injection
2r 1t
critical advisory

Malicious LiteLLM Versions Harvest Credentials

Compromised versions of the LiteLLM package (1.82.7 and 1.82.8) on PyPI contained malware designed to harvest sensitive credentials and files, exfiltrating them to a remote API, impacting users who installed and ran the package.

supply-chain malware credential-theft
2r 2t
medium advisory

GitLab Improper HTML Sanitization Vulnerability (CVE-2026-2995)

CVE-2026-2995 is a vulnerability in GitLab EE versions 15.4 to 18.10.1 where an authenticated user can add email addresses to other user accounts due to improper HTML sanitization, potentially leading to account takeover or information disclosure.

gitlab html-injection cve-2026-2995
2r 2t 1i
medium advisory

GitLab GraphQL Denial of Service Vulnerability (CVE-2026-3988)

CVE-2026-3988 is a denial of service vulnerability in GitLab CE/EE allowing unauthenticated users to crash instances by sending malformed GraphQL requests, affecting versions 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1.

denial-of-service graphql gitlab cve-2026-3988
2r 1t
high advisory

GitLab GraphQL CSRF Vulnerability (CVE-2026-3857)

CVE-2026-3857 describes a vulnerability in GitLab CE/EE versions 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1, where an unauthenticated user can execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection, potentially leading to data modification or privilege escalation.

gitlab csrf cve-2026-3857 graphql
2r 2t 1i
high advisory

SQL Injection Vulnerability in Simple Laundry System 1.0

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.

sqli web-application vulnerability
2r 1t 6i
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.

sqli vulnerability web-application
2r 1t
high advisory

code-projects Online Food Ordering System SQL Injection Vulnerability (CVE-2026-4844)

CVE-2026-4844 describes a SQL injection vulnerability in the Admin Login Module of code-projects Online Food Ordering System 1.0, which can be exploited remotely by manipulating the Username argument in the /admin.php file.

sql-injection web-application cve-2026-4844
2r 1t
critical advisory

Netcore Power 15AX Remote Command Execution Vulnerability

CVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.

command-injection rce vulnerability netcore router
2r 1t
medium advisory

Blackhole for Bad Bots WordPress Plugin Stored XSS Vulnerability

The Blackhole for Bad Bots WordPress plugin through version 3.8 is vulnerable to stored cross-site scripting (XSS) via the User-Agent HTTP header, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the plugin's admin page.

wordpress xss plugin cve-2026-4329
2r 1t
high advisory

SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)

A remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.

sqli web-application cve-2026-4838
2r 1t 6i
critical advisory

Masteriyo LMS WordPress Plugin Privilege Escalation Vulnerability

The Masteriyo LMS plugin for WordPress is vulnerable to privilege escalation, allowing authenticated users with student-level access or higher to gain administrator privileges by manipulating the 'InstructorsController::prepare_object_for_database' function.

wordpress privilege-escalation cve-2026-4484
2r 1t
critical advisory

WP Job Portal Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4758)

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with subscriber-level access or higher to delete arbitrary files, potentially leading to remote code execution.

cve wordpress file-deletion remote-code-execution
2r 3t
high advisory

OpenEMR Blind SQL Injection Vulnerability in Patient Search (CVE-2026-29187)

OpenEMR versions prior to 8.0.0.3 are susceptible to a blind SQL injection vulnerability in the Patient Search functionality, allowing authenticated attackers to execute arbitrary SQL commands by manipulating HTTP parameter keys.

sqli openemr vulnerability
2r 1t
medium advisory

IBM InfoSphere Information Server Plaintext Credential Storage Vulnerability

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 stores user credentials in plaintext, allowing local users to read sensitive information.

cve-2025-36258 credential-access plaintext-storage infosphere
2r 1t
high advisory

Picomatch ReDoS Vulnerability via Extglob Quantifiers

Picomatch is vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns with quantifiers, leading to excessive CPU consumption and denial of service.

picomatch ReDoS denial-of-service extglob
2r 1t
high advisory

Protobuf PHP Library Denial of Service Vulnerability

A denial-of-service vulnerability exists in the Protobuf PHP library due to maliciously crafted messages with negative varints or deep recursion, leading to application crashes and impacting service availability.

protobuf dos php
2r 1t
high advisory

Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability

The code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.

laravel file-upload rce code16/sharp
2r 1t 5i
critical advisory

SiYuan Arbitrary Document Reading Vulnerability in Publishing Service

SiYuan is vulnerable to arbitrary document reading via the publishing service, allowing attackers to retrieve document IDs and view the content of all documents, including encrypted or prohibited ones, by exploiting the `/api/file/readDir` and `/api/block/getChildBlocks` interfaces.

siyuan arbitrary-document-access vulnerability webserver
2r 1t
critical advisory

LiquidJS replace_first Filter Exponential Memory Amplification DoS

The `replace_first` filter in LiquidJS is vulnerable to exponential memory amplification due to its use of JavaScript's `String.prototype.replace()` and mishandling of the `$&` backreference pattern, allowing attackers to bypass the `memoryLimit` and cause denial of service.

liquidjs denial-of-service memory-amplification
2r 1t
high advisory

OpenCart Core SQL Injection Vulnerability (CVE-2024-58341)

OpenCart Core 4.0.2.3 is vulnerable to SQL injection via the 'search' parameter, enabling unauthenticated attackers to manipulate database queries and extract sensitive information through boolean-based or time-based blind SQL injection.

cve-2024-58341 sql-injection opencart
2r 1t
critical advisory

pdf-image npm Package Command Injection Vulnerability (CVE-2026-26830)

The pdf-image npm package through version 2.0.0 is vulnerable to OS command injection via the pdfFilePath parameter due to improper sanitization, potentially leading to arbitrary code execution.

command-injection npm CVE-2026-26830 pdf
2r 1t 1i
high advisory

Kiteworks Core Access Control Vulnerability (CVE-2026-23514)

Kiteworks Core versions 9.2.0 and 9.2.1 contain an access control vulnerability (CVE-2026-23514) due to improper ownership management, allowing authenticated users to access unauthorized content, which can be mitigated by upgrading to version 9.2.2 or later.

access-control vulnerability kiteworks
2r 1t 1i
critical advisory

CVE-2026-4729 Memory Safety Vulnerabilities in Firefox and Thunderbird

Firefox 148 and Thunderbird 148 contain memory safety bugs that could potentially be exploited to execute arbitrary code, impacting versions prior to 149.

cve-2026-4729 memory-corruption firefox thunderbird rce
2r 8t 1i
high advisory

SourceCodester Online Catering Reservation SQL Injection Vulnerability (CVE-2026-4615)

A SQL injection vulnerability exists in SourceCodester Online Catering Reservation 1.0's `/search.php` file, allowing remote attackers to execute arbitrary SQL commands by manipulating the `rcode` argument.

sql-injection cve-2026-4615 web-application
2r 1t 5i
high advisory

Salvo Web Framework Denial of Service Vulnerability (CVE-2026-33241)

The Salvo web framework before version 0.89.3 is vulnerable to denial of service due to unbounded memory allocation when parsing form data, enabling attackers to crash services by sending large payloads.

denial-of-service web-framework rust
2r 1t
high advisory

Palo Alto Networks Recruiting Impersonation Phishing Campaign

Since August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.

phishing recruiting social-engineering scam
2r 2t 6i
critical advisory

Multiple Vulnerabilities in GnuPG and Gpg4win Allow for Arbitrary Code Execution and Denial of Service

Multiple vulnerabilities exist in GnuPG and Gpg4win that could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

gnupg gpg4win vulnerability code-execution denial-of-service
2r 2t
critical advisory

LiteLLM Package Compromised with Credential-Stealing Code via Trivy

The LiteLLM package was compromised and infected with credential-stealing code through a supply chain attack leveraging the Trivy vulnerability scanner.

supply-chain credential-theft llm trivy
2r 1t
high advisory

Langflow Path Traversal Vulnerability (CVE-2026-33497)

A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.

path-traversal vulnerability web-application
2r 1t
critical advisory

Langflow GitHub Actions Shell Injection Vulnerability

Unauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.

shell-injection github-actions supply-chain
2r 2t 1i
critical advisory

Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)

A remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.

cve-2026-4673 chrome webaudio heap overflow code execution
2r 1t
critical advisory

GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials

GoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.

vulnerability hardcoded-credentials goharbor
2r 1t
critical advisory

Firefox and Thunderbird Memory Safety Vulnerability (CVE-2026-4720)

A memory safety vulnerability (CVE-2026-4720) in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 could lead to memory corruption and potential arbitrary code execution if successfully exploited.

cve-2026-4720 firefox thunderbird memory-corruption arbitrary-code-execution
2r 2t 1i
high advisory

Device Code Phishing Campaign Targeting Cloud Platforms

A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.

credential-access initial-access phishing oauth
2r 2t
high advisory

CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability

A heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.

cve-2026-4675 heap-buffer-overflow webgl chrome remote-code-execution
2r 2t
medium advisory

CPython Zipfile Module Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in the zipfile module of CPython to manipulate files on affected systems.

cpython zipfile file-manipulation vulnerability
2r 1t
high advisory

CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)

An unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.

codesys dos cve-2026-3509 ics ot
2r 1t
high advisory

Blinko Pre-1.8.4 OS Command Injection Vulnerability

Blinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.

cve-2026-23882 command-injection blinko
2r 1t 4i
high advisory

Apache CXF Vulnerability Allows DoS and Information Disclosure

An anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.

apache-cxf denial-of-service information-disclosure webserver
2r 2t
high advisory

IBM WebSphere Application Server Liberty Multiple Vulnerabilities

A remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.

websphere vulnerability privilege-escalation defense-evasion information-disclosure
2r 3t
high advisory

TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation

A remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.

tibco vulnerability information-disclosure data-manipulation
2r 2t
critical advisory

Langflow Vulnerability Allows Arbitrary Code Execution

A vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.

langflow code-execution vulnerability
2r 1t
critical advisory

Multiple Vulnerabilities in Redis

Multiple vulnerabilities in Redis allow an attacker to execute arbitrary program code and perform a denial-of-service attack.

redis vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Red Hat Developer Hub

Multiple vulnerabilities in Red Hat Developer Hub allow a remote attacker to perform denial of service, execute arbitrary code, bypass security measures, and manipulate data.

redhat developer hub vulnerability denial of service code execution
2r 8t
high advisory

Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.

jboss undertow denial-of-service cache-poisoning session-hijacking webserver
2r 3t
high advisory

Multiple Vulnerabilities in Grub Bootloader

Multiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.

bootloader grub2 vulnerability denial-of-service arbitrary-code-execution
2r 2t
high advisory

RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.

kubernetes privilege-escalation cloud
2r 1t
critical advisory

Multiple Vulnerabilities in Apache Tomcat Allow for Remote Code Execution and Data Manipulation

Multiple vulnerabilities in Apache Tomcat can be exploited by a remote, authenticated or anonymous attacker to execute arbitrary code, bypass security measures, manipulate data, and cause a denial of service.

apache-tomcat vulnerability remote-code-execution data-manipulation denial-of-service
2r 3t
medium advisory

Red Hat OpenShift GitOps Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.

openshift gitops vulnerability cloud
2r 1t
critical advisory

IBM Tivoli Netcool/OMNIbus Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in IBM Tivoli Netcool/OMNIbus to achieve arbitrary code execution, information disclosure, file manipulation, or denial of service.

ibm tivoli netcool omnibus vulnerability code-execution dos
2r 3t
critical advisory

Asterisk and Digium Certified Asterisk Vulnerabilities

An authenticated remote attacker can exploit vulnerabilities in Asterisk and Digium Certified Asterisk to achieve arbitrary code execution, denial of service, or information disclosure.

asterisk voip code-execution dos information-disclosure
2r 8t
high advisory

Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments

Uncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.

cloud vm-sprawl identity-abuse
2r 7t
critical advisory

Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS

A remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.

rhel code-execution denial-of-service linux
2r 3t
high advisory

Checkmk Vulnerability Allows Session Hijacking

An authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.

checkmk session-hijacking vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Vim Allow Local Code Execution and DoS

Multiple vulnerabilities in vim allow a local attacker to execute arbitrary code, cause a denial-of-service condition, or manipulate data.

vim vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Langflow Allow for Arbitrary Code Execution and Information Disclosure

Multiple vulnerabilities in Langflow could be exploited by an attacker to execute arbitrary program code, disclose information, and potentially manipulate data, leading to potential system compromise.

langflow vulnerability code-execution information-disclosure
2r 4t
high advisory

Froxlor Vulnerability Allows File Manipulation and Information Disclosure

A vulnerability in Froxlor allows an attacker to manipulate files and disclose sensitive information, potentially leading to data breaches or system compromise.

froxlor vulnerability file-manipulation information-disclosure
2r 1t
critical advisory

CODESYS Multiple Vulnerabilities Allow Arbitrary Code Execution and DoS

Multiple vulnerabilities in CODESYS allow a remote attacker to execute arbitrary program code and conduct a denial-of-service attack.

codesys vulnerability arbitrary-code-execution denial-of-service ics
2r 2t
critical advisory

Multiple Vulnerabilities in GStreamer

Multiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition, memory corruption, and potentially execute arbitrary code.

gstreamer vulnerability denial-of-service memory-corruption code-execution
3r 2t
critical advisory

Critical Unauthenticated RCE Vulnerability Exploited in Microsoft SharePoint

A remote code execution vulnerability in Microsoft SharePoint (CVE not specified) is being actively exploited by unauthenticated attackers, prompting urgent patching recommendations for internet-facing servers.

sharepoint rce vulnerability
2r 2t
high advisory

Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs

The 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.

linux kernel vulnerability workqueue
2r 1t
high advisory

Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior

A remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.

craftcms rce vulnerability webserver
2r 1t
critical advisory

Vikunja Account Reactivation Vulnerability (CVE-2026-33316)

A critical vulnerability in Vikunja versions prior to 2.2.0 allows disabled users to bypass administrator controls and reactivate their accounts by exploiting a flaw in the password reset logic.

vikunja account-reactivation vulnerability
3r 1t
high advisory

Free5GC AMF Denial-of-Service Vulnerability (CVE-2026-30653)

A remote attacker can exploit CVE-2026-30653 in Free5GC v4.2.0 and earlier by sending crafted requests to the AMF component's HandleAuthenticationFailure function, leading to a denial-of-service condition.

free5gc denial-of-service cve-2026-30653 amf
2r 2t
high advisory

NGINX ngx_mail_auth_http_module Denial-of-Service Vulnerability (CVE-2026-27651)

NGINX Plus and NGINX Open Source are vulnerable to a denial-of-service condition (CVE-2026-27651) when the ngx_mail_auth_http_module is enabled, CRAM-MD5 or APOP authentication is used, and the authentication server permits retry via the Auth-Wait response header, leading to worker process termination.

nginx denial-of-service mail proxy cve-2026-27651
2r 2t 1i
critical advisory

GlassWorm Supply Chain Attack Using Unicode Encoding and Credential Theft

The GlassWorm campaign employs Unicode variation selectors to conceal malicious code within supply chain artifacts, subsequently querying a Solana wallet for C2 URLs and exfiltrating sensitive credentials.

supply-chain credential-theft unicode-encoding
2r 4t
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0

A SQL injection vulnerability (CVE-2026-4612) exists in itsourcecode Free Hotel Reservation System 1.0 within the Parameter Handler component, allowing remote attackers to execute arbitrary SQL commands via the account_id parameter in the /hotel/admin/mod_users/index.php script.

cve-2026-4612 sql-injection web-application
2r 1t
critical advisory

Census CSWeb 8.0.1 Configuration File Disclosure Vulnerability

Census CSWeb 8.0.1 is vulnerable to unauthenticated remote configuration file disclosure via HTTP requests to the `/app/config` path, potentially exposing sensitive secrets; fixed in 8.1.0 alpha.

cve-2025-60949 information-disclosure webserver
2r 1t
critical advisory

Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4723)

A use-after-free vulnerability, CVE-2026-4723, in the JavaScript Engine of Mozilla Firefox and Thunderbird before version 149 could allow arbitrary code execution if successfully exploited by an attacker.

use-after-free firefox thunderbird javascript cve-2026-4723
2r 1t
critical advisory

Mozilla Firefox and Thunderbird Canvas2D Use-After-Free Vulnerability (CVE-2026-4725)

A use-after-free vulnerability in the Canvas2D component of Mozilla Firefox and Thunderbird versions before 149 allows for a potential sandbox escape.

use-after-free sandbox-escape firefox thunderbird
2r 1t 1i
critical advisory

Uninitialized Memory Vulnerability in Firefox Canvas2D (CVE-2026-4715)

CVE-2026-4715 is a critical vulnerability involving uninitialized memory in the Graphics: Canvas2D component of Firefox, Firefox ESR, and Thunderbird, potentially leading to information disclosure or arbitrary code execution.

cve-2026-4715 firefox thunderbird uninitialized-memory vulnerability
2r
medium advisory

Mozilla Firefox and Thunderbird Graphics Text Component Vulnerability (CVE-2026-4719)

CVE-2026-4719 describes an incorrect boundary condition in the Graphics: Text component of Mozilla Firefox and Thunderbird, potentially leading to a denial-of-service condition in vulnerable versions.

cve vulnerability firefox thunderbird
2r 2t
critical advisory

Firefox Netmonitor Privilege Escalation Vulnerability (CVE-2026-4717)

CVE-2026-4717 is a critical privilege escalation vulnerability in the Netmonitor component of Firefox, Firefox ESR, and Thunderbird, potentially allowing an attacker to gain elevated privileges on a vulnerable system.

privilege-escalation firefox thunderbird cve-2026-4717
2r 1t 1i
medium advisory

WebRTC Signaling Denial-of-Service Vulnerability (CVE-2026-4704)

CVE-2026-4704 is a denial-of-service vulnerability in the WebRTC Signaling component affecting Firefox, Firefox ESR, and Thunderbird, potentially disrupting service availability.

webrtc denial-of-service firefox thunderbird
2r 1t
critical advisory

Firefox and Thunderbird Mitigation Bypass Vulnerability (CVE-2026-4700)

CVE-2026-4700 is a critical vulnerability in the Networking: HTTP component of Firefox, Firefox ESR, and Thunderbird, allowing a mitigation bypass in versions prior to Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

cve-2026-4700 firefox thunderbird mitigation-bypass
2r 2t
medium advisory

Mozilla Firefox and Thunderbird WebCodecs Boundary Condition Vulnerability (CVE-2026-4695)

An incorrect boundary condition in the Audio/Video Web Codecs component in Mozilla Firefox and Thunderbird (CVE-2026-4695) could lead to a denial-of-service (DoS) condition due to a vulnerability that affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

cve-2026-4695 firefox thunderbird webcodecs denial-of-service
2r 1t
medium advisory

Mozilla Firefox and Thunderbird Web Codecs Denial-of-Service Vulnerability (CVE-2026-4697)

CVE-2026-4697 is a denial-of-service vulnerability due to incorrect boundary conditions in the Audio/Video Web Codecs component of Mozilla Firefox and Thunderbird, potentially leading to application crashes.

cve-2026-4697 denial-of-service mozilla firefox thunderbird
2r 1t 1i
medium advisory

Mozilla Firefox and Thunderbird Audio/Video Playback Denial-of-Service Vulnerability (CVE-2026-4693)

CVE-2026-4693 is a vulnerability due to incorrect boundary conditions in the Audio/Video: Playback component of Mozilla Firefox and Thunderbird, potentially leading to a denial-of-service condition.

cve denial-of-service firefox thunderbird
2r 1t 1i
critical advisory

Firefox and Thunderbird JIT Miscompilation Vulnerability (CVE-2026-4698)

A critical JIT miscompilation vulnerability (CVE-2026-4698) in the JavaScript engine affects Firefox and Thunderbird, potentially leading to remote code execution.

firefox thunderbird jit miscompilation rce cve-2026-4698 type-confusion
2r 5t
medium advisory

Mozilla Firefox Canvas2D Improper Boundary Condition Vulnerability (CVE-2026-4685)

An improper boundary condition vulnerability in the Canvas2D component of Mozilla Firefox, Firefox ESR, and Thunderbird (CVE-2026-4685) could allow for a denial-of-service condition.

cve-2026-4685 firefox thunderbird denial-of-service canvas2d
2r 2t
critical advisory

Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4688)

A use-after-free vulnerability in the Disability Access APIs component of Mozilla Firefox and Thunderbird (CVE-2026-4688) allows for sandbox escape, potentially leading to arbitrary code execution outside the sandbox.

use-after-free sandbox-escape cve-2026-4688
2r 1t
critical advisory

Firefox and Thunderbird Sandbox Escape Vulnerability (CVE-2026-4687)

CVE-2026-4687 is a sandbox escape vulnerability in Firefox and Thunderbird due to incorrect boundary conditions in the Telemetry component, potentially allowing an attacker to execute arbitrary code outside the sandbox.

sandbox-escape firefox thunderbird cve-2026-4687
2r 2t
high advisory

CVE-2026-4690: Mozilla Firefox, Firefox ESR, and Thunderbird XPCOM Sandbox Escape

A sandbox escape vulnerability, identified as CVE-2026-4690, exists in the XPCOM component of Mozilla Firefox, Firefox ESR, and Thunderbird due to incorrect boundary conditions and an integer overflow, potentially allowing an attacker to execute arbitrary code outside the sandbox.

sandbox escape integer overflow mozilla firefox mozilla thunderbird cve-2026-4690
2r 1t 1i
critical advisory

Multiple Vulnerabilities in Cpython Allow Remote Code Execution

A remote, authenticated attacker can exploit multiple vulnerabilities in Cpython to manipulate files or execute arbitrary code.

cpython vulnerability code execution
2r 1t
critical advisory

Oracle MySQL Multiple Vulnerabilities

A remote attacker, either anonymous or authenticated, can exploit multiple vulnerabilities in Oracle MySQL to compromise confidentiality, integrity, and availability.

mysql vulnerability database
2r 1t
critical advisory

GNU libc Vulnerability Allows Local Code Execution

A local attacker can exploit a vulnerability in GNU libc to execute arbitrary program code on Linux systems.

glibc code-execution linux
2r 1t
high advisory

libpng Vulnerability Allows Code Execution

A vulnerability in libpng allows a remote, anonymous attacker to potentially execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.

libpng code-execution vulnerability
2r 4t
critical advisory

Citrix Systems NetScaler Vulnerabilities Allow Information Disclosure and Session Hijacking

An anonymous or authenticated remote attacker can exploit multiple vulnerabilities in Citrix Systems NetScaler to disclose information and take over a user session.

citrix netscaler vulnerability session-hijacking information-disclosure
2r 2t
critical advisory

Tabs Mail Carrier 2.5.1 MAIL FROM Buffer Overflow Vulnerability

Tabs Mail Carrier 2.5.1 is vulnerable to a buffer overflow in the MAIL FROM SMTP command, allowing remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter with an oversized buffer to overwrite the EIP register and execute a bind shell payload via port 25.

cve-2019-25646 buffer-overflow smtp code-execution
2r 1t
critical advisory

PhreeBooks ERP 5.2.3 Remote Code Execution Vulnerability

PhreeBooks ERP 5.2.3 is vulnerable to remote code execution, allowing authenticated attackers to upload and execute arbitrary PHP files via the image manager, leading to reverse shell connections and system command execution.

rce vulnerability php
2r 3t
critical advisory

Netartmedia Vlog System SQL Injection Vulnerability

Netartmedia Vlog System is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter in the forgotten_password module.

sqli vulnerability web-application
2r 1t 3i
critical advisory

eNdonesia Portal v8.7 SQL Injection Vulnerability

eNdonesia Portal v8.7 is vulnerable to SQL injection allowing unauthenticated attackers to execute arbitrary SQL queries via the bid parameter in banners.php, potentially leading to sensitive data extraction.

sql-injection web-application cve-2019-25643
2r 1t
critical advisory

Bootstrapy CMS Unauthenticated SQL Injection Vulnerabilities

Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through POST parameters to extract sensitive database information or cause denial of service.

sql-injection bootstrapy-cms vulnerability
3r 1t 3i
high advisory

Inout Article Base CMS SQL Injection Vulnerability (CVE-2019-25640)

Inout Article Base CMS is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters via XOR-based payloads in GET requests to portalLogin.php, potentially leading to sensitive information extraction or denial-of-service.

sql-injection cve-2019-25640 inout-article-base-cms
2r 1t 4i
critical advisory

Zeeways Matrimony CMS Unauthenticated SQL Injection Vulnerability

Zeeways Matrimony CMS is vulnerable to SQL injection via the profile_list endpoint, where an unauthenticated attacker can inject SQL code via the up_cast, s_mother, and s_religion parameters, potentially allowing them to extract sensitive information.

sql-injection web-application matrimony-cms
2r 1t 4i
high advisory

Zeeways Jobsite CMS SQL Injection Vulnerability (CVE-2019-25636)

Zeeways Jobsite CMS is vulnerable to SQL injection, allowing unauthenticated attackers to inject SQL code through the 'id' GET parameter in crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php to extract sensitive database information.

sql-injection cve-2019-25636 web-application
2r 1t 4i
high advisory

X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability

X-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.

buffer-overflow code-execution windows cve-2019-25637
2r 1t
high advisory

Meeplace Business Review Script SQL Injection Vulnerability (CVE-2019-25638)

Meeplace Business Review Script is vulnerable to SQL injection via the 'id' parameter in the addclick.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries and potentially extract sensitive database information or cause a denial of service.

sql-injection web-application cve-2019-25638
2r 1t 4i
high advisory

Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)

Base64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.

cve-2019-25634 buffer-overflow seh-overwrite code-execution
2r 2t
critical advisory

PhreeBooks ERP 5.2.3 Arbitrary File Upload Vulnerability

PhreeBooks ERP 5.2.3 is vulnerable to arbitrary file upload in the Image Manager component, allowing authenticated attackers to upload malicious PHP files leading to remote code execution.

phreebooks file-upload rce
2r 2t
high advisory

AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)

AIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.

cve-2019-25631 buffer-overflow seh aida64 windows
2r 3t
high advisory

FlexHEX 2.71 Local Buffer Overflow Vulnerability (CVE-2019-25627)

FlexHEX 2.71 is vulnerable to a local buffer overflow in the Stream Name field, allowing local attackers to execute arbitrary code via a structured exception handler (SEH) overflow.

buffer-overflow seh-overflow local-privilege-escalation windows
2r 2t
critical advisory

Download Accelerator Plus (DAP) SEH Buffer Overflow Vulnerability

Download Accelerator Plus DAP 10.0.6.0 is vulnerable to a structured exception handler buffer overflow, allowing remote attackers to execute arbitrary code via malicious crafted URLs by overwriting SEH pointers and executing embedded shellcode.

cve-2019-25628 buffer-overflow seh-overflow
2r 1t 4i
high advisory

AIDA64 Extreme 5.99.4900 Structured Exception Handler Buffer Overflow

AIDA64 Extreme 5.99.4900 is vulnerable to a structured exception handler buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious CSV log file path through the Hardware Monitoring logging preferences.

aida64 buffer-overflow vulnerability
2r 1t 4i
high advisory

Compromised Litellm PyPI Package Versions

Versions 1.82.7 and 1.82.8 of the Litellm package on PyPI were compromised in a supply chain attack, potentially impacting numerous users, with recommendations to avoid updating to these versions.

supply-chain pypi litellm compromise
2r 4t 1i
high advisory

Multiple Vulnerabilities in cPanel/WHM

An anonymous remote attacker can exploit multiple vulnerabilities in cPanel/WHM to bypass security measures, perform XSS and SSRF attacks, disclose information, and potentially execute code.

cPanel WHM XSS SSRF vulnerability
2r 2t
high advisory

WWBN AVideo Unauthenticated decryptString Vulnerability

WWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.

cve-2026-33512 avideo improper-authentication api-vulnerability
2r 1t
high advisory

WP Job Portal Plugin SQL Injection Vulnerability

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.

sql-injection wordpress plugin
2r 1t
critical advisory

Unauthenticated CLI Escape Vulnerability (CVE-2026-3587)

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface of a device, leading to full compromise and root access on the underlying Linux-based OS, as described in CVE-2026-3587.

cve cli privilege_escalation linux
2r 2t 1i
critical advisory

TOTOLINK X6000R Remote Command Injection Vulnerability

A remote command injection vulnerability exists in TOTOLINK X6000R routers, specifically versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826, allowing attackers to execute arbitrary commands via manipulation of the Hostname argument in the setLanCfg function.

totolink rce command-injection cve-2026-4611
2r 1t
high advisory

strongSwan EAP-TTLS AVP Integer Underflow Vulnerability (CVE-2026-25075)

An integer underflow vulnerability in strongSwan's EAP-TTLS AVP parser allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication, leading to excessive memory allocation or a NULL pointer dereference.

denial-of-service integer-underflow strongSwan CVE-2026-25075
2r 1t
high advisory

SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)

A remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection cve-2026-4624 web-application
2r 1t
critical advisory

ReviewX WordPress Plugin Arbitrary Method Call Vulnerability

The ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.

wordpress woocommerce reviewx rce vulnerability
2r 1t
medium advisory

OwnTone Server DAAP Request NULL Pointer Dereference Denial-of-Service (CVE-2026-26828)

A NULL pointer dereference vulnerability in the daap_reply_playlists function of owntone-server allows attackers to cause a Denial of Service (DoS) by sending a crafted DAAP request.

cve-2026-26828 denial-of-service owntone-server
2r 2t 1i
critical advisory

Oracle Fusion Middleware RCE Vulnerability (CVE-2026-21992)

CVE-2026-21992 allows an unauthenticated attacker to gain network access via HTTP and execute code remotely on Oracle Identity Manager and Oracle Web Services Manager.

vulnerability rce oracle
2r 2t
high advisory

OpenClaw Improper Header Validation Leads to Credential Leakage

OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.

cve-2026-32913 credential-access header-injection openclaw
2r 1t
high advisory

MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)

A missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.

CVE-2026-4562 authentication-bypass web-application
2r 1t
high advisory

Lucky Pasta Shellcode Loader for Windows

A shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.

shellcode windows jit defense-evasion
2r 3t 2i
high advisory

JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow

JetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.

buffer-overflow privilege-escalation execution windows
2r 2t 5i
medium advisory

Easy Chat Server 3.1 Denial of Service Vulnerability (CVE-2019-25613)

Easy Chat Server 3.1 is vulnerable to a denial-of-service attack where a remote attacker can crash the application by sending oversized data in the message parameter via a POST request to the body2.ghp endpoint after establishing a session, leading to service unavailability.

dos cve-2019-25613 easy-chat-server
2r 1t 5i
medium advisory

DNS Queries to RMM Domains from Non-Browser Processes

Detection of DNS queries to known remote monitoring and management (RMM) domains originating from non-browser processes on Windows systems indicates potential abuse of legitimate software for command and control.

rmm command-and-control windows
2r 74i
high advisory

Crunchyroll Data Breach via Telus Supply Chain Compromise

Crunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.

supply-chain data-breach credential-theft phishing
2r 3t 1i
medium advisory

CrowdStrike Falcon Flex for Services Expansion

CrowdStrike is expanding the Falcon Flex model to its services offering to provide organizations with more flexible access to incident response and proactive security services.

incident response security services MDR
2r 2t
critical advisory

Critical RCE Vulnerability in Langflow AI Pipelines (CVE-2026-33017)

A critical remote code execution vulnerability, CVE-2026-33017, exists in Langflow AI pipelines prior to version 1.9.0 that allows an unauthenticated remote attacker to execute code with full server process privileges, impacting availability, integrity, and confidentiality.

langflow rce cve-2026-33017 ai-pipeline
2r 2t
high advisory

Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)

Connect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.

cve-2026-32299 connect-cms authorization-bypass
2r 1t 1i
high advisory

Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)

CVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.

path-traversal cve-2025-60946 web-application
2r 2t
high advisory

Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability

A remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.

file-upload remote-code-execution web-application
2r 2t
medium advisory

VMware Tanzu Spring Framework and Spring Security Vulnerabilities Allow Security Bypass

An anonymous, remote attacker can exploit multiple vulnerabilities in VMware Tanzu Spring Security and VMware Tanzu Spring Framework to bypass security measures.

vmware spring security-bypass web-application
2r 1t
medium advisory

Znuny Cross-Site Scripting Vulnerability

An anonymous remote attacker can exploit a vulnerability in Znuny to perform a cross-site scripting attack, potentially leading to information disclosure or session hijacking.

znuny xss cross-site scripting web application
2r 1t
high advisory

OpenSSH Vulnerabilities Allow Local Code Execution

A local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.

openssh code-execution privilege-escalation
2r 1t
medium advisory

cURL Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in cURL to manipulate files on a vulnerable system.

curl vulnerability file-manipulation
2r 2t
high advisory

PostgreSQL JDBC Driver SQL Injection Vulnerability

An anonymous, remote attacker can exploit a vulnerability in the PostgreSQL JDBC Driver to perform SQL injection attacks.

sql-injection postgresql jdbc
2r 1t
critical advisory

Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service

Multiple vulnerabilities in libpng allow a remote, anonymous attacker to perform denial of service attacks and execute arbitrary code.

libpng vulnerability denial-of-service code execution
2r 2t
high advisory

Apache CXF Multiple Vulnerabilities Allow Information Disclosure and SSRF

A remote attacker can exploit multiple vulnerabilities in Apache CXF to disclose information and perform Server-Side Request Forgery (SSRF) attacks.

apache-cxf ssrf information-disclosure
2r 1t
critical advisory

GIMP Vulnerability Allows Remote Code Execution

A remote, anonymous attacker can exploit a vulnerability in GIMP to execute arbitrary code on a targeted system.

gimp code-execution vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.

freerdp rdp vulnerability denial-of-service code-execution
2r 2t
medium advisory

Apache Commons FileUpload Denial of Service Vulnerability

A remote, anonymous attacker can exploit a vulnerability in Apache Commons FileUpload to perform a denial of service attack.

apache commons-fileupload denial-of-service vulnerability
2r 1t
medium advisory

Apache Commons BeanUtils Security Bypass Vulnerability

An authenticated remote attacker can exploit a vulnerability in Apache Commons BeanUtils to bypass security measures, potentially leading to unauthorized access or privilege escalation.

apache-commons-beanutils vulnerability security-bypass
1r 1t
medium advisory

MIT Kerberos Security Bypass Vulnerability

An anonymous, remote attacker can exploit a vulnerability in MIT Kerberos to bypass security measures.

kerberos authentication security-bypass
2r 1t
high advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation

A local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.

libxslt rhel code-execution file-manipulation linux
2r 3t
medium advisory

Android-ImageMagick7 Memory Leak Vulnerability (CVE-2026-33852)

A missing release of memory vulnerability (CVE-2026-33852) in MolotovCherry Android-ImageMagick7 before version 7.1.2-11 can lead to a denial-of-service condition due to memory exhaustion.

cve memory leak denial of service android
2r 1t 1i
critical advisory

RetroDebugger Out-of-Bounds Read Vulnerability (CVE-2026-4753)

RetroDebugger before v0.64.72 is vulnerable to an out-of-bounds read (CVE-2026-4753), potentially leading to information disclosure or denial of service.

cve-2026-4753 out-of-bounds read retrodebugger
2r 2t 1i
critical advisory

Out-of-bounds Read Vulnerability in fabiangreffrath woof (CVE-2026-4750)

CVE-2026-4750 is a critical out-of-bounds read vulnerability affecting fabiangreffrath woof versions before 15.3.0, potentially leading to information disclosure or denial of service.

cve-2026-4750 out-of-bounds read webserver woof
2r 1t
high advisory

Out-of-bounds Write Vulnerability in DualSenseY-v2

CVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.

cve vulnerability oob-write dualsensey-v2
2r 3t
high advisory

doslib Memory Buffer Overflow Vulnerability (CVE-2026-33851)

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in joncampbell123's doslib before version doslib-20250729, potentially leading to arbitrary code execution.

cve-2026-33851 buffer-overflow doslib
2r 3t
critical advisory

Android-ImageMagick7 Out-of-Bounds Write Vulnerability (CVE-2026-33854)

An unauthenticated, remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-33854) in MolotovCherry Android-ImageMagick7 versions before 7.1.2-10 by enticing a user to open a malicious image, potentially leading to arbitrary code execution.

cve out-of-bounds write android imagemagick
2r 1t 1i
high advisory

linkingvision rapidvms Improper Memory Buffer Restriction Vulnerability (CVE-2026-33847)

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms before PR#96 could lead to arbitrary code execution.

cve buffer-overflow rapidvms
2r 2t 1i
high advisory

Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)

CVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.

incorrect-authorization privilege-escalation web-application
2r 1t
high advisory

Galaxy Software Services Vitals ESP Missing Authentication Vulnerability (CVE-2026-4640)

Vitals ESP developed by Galaxy Software Services suffers from a missing authentication vulnerability (CVE-2026-4640), enabling unauthenticated remote attackers to execute functions and obtain sensitive information.

cve-2026-4640 missing-authentication vitals-esp
2r 1t 3i
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)

CVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.

sql-injection web-application cve-2026-4632
2r 1t
high advisory

D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)

CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.

command-injection router legacy-device
2r 2t
high advisory

SourceCodester Online Admission System 1.0 SQL Injection Vulnerability

A SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.

sql-injection web-application vulnerability
2r 1t 6i
high advisory

DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.

ssrf cve-2026-4623 jeson-crm webserver
2r 10t
high advisory

Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)

A use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.

cve-2026-4678 use-after-free chrome webgpu
2r 1t
high advisory

Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)

A remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.

cve-2026-4677 chrome webaudio out-of-bounds read
2r 1t 1i
high advisory

Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)

A use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

use-after-free sandbox-escape chrome cve-2026-4676
2r 1t
high advisory

Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)

A remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.

cve-2026-4679 chrome integer-overflow memory-corruption
2r 3t
critical advisory

Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)

A use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.

CVE-2026-4680 use-after-free chrome fedcm
2r 1t 1i
high advisory

Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)

A remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.

cve out-of-bounds read chrome
2r 1t 2i
high advisory

Spring Cloud Config Server Path Traversal Vulnerability (CVE-2026-22739)

A path traversal vulnerability exists in Spring Cloud Config Server versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2, allowing unauthenticated remote attackers to access files outside configured search directories when using the native file system backend.

cve-2026-22739 path-traversal spring-cloud
2r 1t 1i
high advisory

SourceCodester E-Commerce Site SQL Injection Vulnerability (CVE-2026-4613)

A remote SQL injection vulnerability (CVE-2026-4613) exists in SourceCodester E-Commerce Site 1.0 within the /products.php file due to improper input sanitization of the 'Search' argument, potentially allowing attackers to read or modify sensitive database information.

sql-injection web-application ecommerce cve-2026-4613
2r 1t
critical advisory

Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)

CVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.

wordpress authentication-bypass plugin-vulnerability cve-2026-4021
2r 3t 1i
high advisory

Go MCP SDK Vulnerable to Cross-Site POST Requests (CVE-2026-33252)

The Go MCP SDK before v1.4.1 is vulnerable to cross-site POST requests due to insufficient origin validation and content type enforcement, potentially leading to arbitrary tool execution on local servers in stateless or sessionless deployments.

cve-2026-33252 cross-site request forgery go-mcp-sdk
1r 1t
critical advisory

Tekton Pipelines Git Resolver Path Traversal Vulnerability

The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.

tekton path-traversal kubernetes cve-2026-33211 cloud
2r 1t
high advisory

Salvo Web Framework Path Traversal Vulnerability

Salvo web framework versions 0.39.0 through 0.89.2 are vulnerable to Path Traversal and Access Control Bypass, allowing unauthenticated external attackers to bypass proxy routing constraints and access unintended backend paths.

path-traversal access-control-bypass web-framework
2r 1t
medium advisory

Ruby on Rails Active Storage DoS Vulnerability (CVE-2026-33174)

A denial-of-service vulnerability (CVE-2026-33174) exists in Ruby on Rails Active Storage versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1 due to unbounded memory allocation when handling large or unbounded Range headers in proxy delivery mode.

rails active-storage dos cve-2026-33174
2r 1t
critical advisory

Blinko Privilege Escalation via upsertUser Endpoint

An authenticated user can exploit the Blinko upsertUser endpoint to escalate privileges, modify other users' passwords, and achieve account takeover due to missing authentication and verification checks.

privilege-escalation cve-2026-23480 blinko
2r 1t
high advisory

Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.

xss connect-cms cabinet-plugin
2r 1t
critical advisory

WWBN AVideo SQL Injection Vulnerability (CVE-2026-33723)

WWBN AVideo platform versions up to 26.0 are vulnerable to SQL injection (CVE-2026-33723), allowing authenticated attackers to inject arbitrary SQL commands via the 'user_id' POST parameter and extract sensitive data such as password hashes, API keys, and encryption salts.

avideo sqli cve-2026-33723 web-application
2r 1t
high advisory

WWBN AVideo Privilege Escalation via Moderator Account

WWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.

avideo privilege-escalation web-application
2r 1t
high advisory

Schneider Electric Modicon PLC Denial-of-Service Vulnerability

Team82 disclosed vulnerabilities in Schneider Electric Modicon Controllers M241, M251, and M262 PLC lines, which can allow an attacker to cause a denial-of-service condition and affect controller availability.

plc denial-of-service industrial-control-system modicon
2r 1t 2i
medium advisory

Citrix NetScaler ADC and Gateway Vulnerabilities

Citrix has released a security advisory addressing multiple vulnerabilities in NetScaler ADC and NetScaler Gateway that could lead to sensitive information disclosure and user session mix-up under specific configurations.

citrix netscaler vulnerability information-disclosure
2r
high advisory

Erupt Framework SQL Injection Vulnerability (CVE-2026-4594)

A SQL injection vulnerability (CVE-2026-4594) exists in erupts erupt up to version 1.13.3, allowing remote attackers to execute arbitrary SQL commands by manipulating the sort.field argument in the geneEruptHqlOrderBy function.

sql-injection vulnerability erupt
2r 1t
critical advisory

AVideo Unauthenticated Server-Side Request Forgery Vulnerability

AVideo versions up to 26.0 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `plugin/Live/test.php` endpoint, allowing attackers to make the server send arbitrary HTTP requests, potentially exposing internal resources and cloud metadata.

ssrf avideo cve-2026-33502 webserver
2r 1t
high advisory

WWBN AVideo Unauthorized File Access and Deletion Vulnerability

WWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.

avideo file-access vulnerability
2r 2t
high advisory

cgltf Integer Overflow Vulnerability in Sparse Accessor Validation

cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors, allowing attackers to trigger out-of-bounds reads via crafted glTF/GLB files, leading to denial of service and potential memory disclosure.

integer-overflow denial-of-service memory-disclosure glTF cgltf
2r 2t
critical advisory

Iperius Backup 6.1.0 Privilege Escalation via Malicious Backup Jobs (CVE-2019-25608)

Iperius Backup 6.1.0 is vulnerable to privilege escalation, allowing low-privilege users to execute arbitrary programs with elevated privileges by creating malicious backup jobs that execute pre- or post-backup scripts with SYSTEM privileges.

privilege escalation cve-2019-25608 iperius backup
2r 2t
critical advisory

WWBN AVideo Channel Password Bypass Vulnerability (CVE-2026-33297)

WWBN AVideo versions prior to 26.0 are vulnerable to a credential access vulnerability where passwords containing non-numeric characters are incorrectly processed, effectively setting the password to '0' and allowing trivial channel access bypass.

cve-2026-33297 credential-access web-application
2r 1t
high advisory

Notepad2 PROPSYS.dll Uncontrolled Search Path Vulnerability (CVE-2026-4545)

CVE-2026-4545 describes a vulnerability in Flos Freeware Notepad2 4.2.25, where manipulating PROPSYS.dll leads to an uncontrolled search path, potentially allowing a local attacker to execute arbitrary code with elevated privileges.

cve uncontrolled search path privilege escalation
2r 1t
critical advisory

Lavavo CD Ripper 4.20 SEH Buffer Overflow Vulnerability

Lavavo CD Ripper 4.20 is vulnerable to a structured exception handling (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field leading to arbitrary code execution and a bind shell.

buffer-overflow seh cve-2019-25615 local-privilege-escalation windows
2r 1t
high advisory

FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)

FTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.

buffer-overflow code-execution ftp
2r 1t
high advisory

EquityPandit 1.0 Insecure Logging Vulnerability (CVE-2019-25605)

EquityPandit 1.0 contains an insecure logging vulnerability (CVE-2019-25605) that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge, specifically exposing plaintext passwords during the forgot password function.

insecure-logging credential-access android
2r 1t
high advisory

Admin Express 1.2.5.485 Local SEH Buffer Overflow Vulnerability

Admin Express 1.2.5.485 is susceptible to a local structured exception handling buffer overflow vulnerability, enabling local attackers to execute arbitrary code via a crafted payload in the Folder Path field of the System Compare feature.

cve-2019-25612 buffer-overflow local-privilege-escalation windows
2r 2t
critical advisory

Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)

An unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.

cve-2026-32968 joomla rce command-injection
2r 1t 3i
critical advisory

TuneClone 2.20 SEH Buffer Overflow Vulnerability (CVE-2019-25603)

TuneClone 2.20 is vulnerable to a structured exception handler (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious license code string via the application's license registration feature.

cve-2019-25603 seh-overflow buffer-overflow code-execution
2r 1t 4i
critical advisory

Tenda F453 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-4553)

A stack-based buffer overflow vulnerability exists in Tenda F453 version 1.0.0.3 in the fromNatlimit function of the /goform/Natlimit Parameters Handler component, triggered remotely by manipulating the 'page' argument, allowing for potential arbitrary code execution.

cve-2026-4553 tenda buffer-overflow router
2r 5t
critical advisory

MiniFtp Buffer Overflow Vulnerability (CVE-2019-25611)

MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function allowing local attackers to execute arbitrary code by supplying oversized configuration values in the miniftpd.conf file.

cve-2019-25611 buffer-overflow privilege-escalation miniftp
2r 2t
critical advisory

Linksys MR9600 SmartConnect OS Command Injection (CVE-2026-4558)

A remote OS command injection vulnerability exists in the Linksys MR9600 router version 2.0.6.206937, allowing attackers to execute arbitrary commands by manipulating specific function arguments via the SmartConnect.lua file.

CVE-2026-4558 linksys command-injection network-device
2r 1t
high advisory

DVDXPlayer Pro 5.5 Local Buffer Overflow Vulnerability (CVE-2019-25604)

DVDXPlayer Pro 5.5 is vulnerable to a local buffer overflow, allowing local attackers to execute arbitrary code by crafting malicious playlist files.

buffer-overflow seh-overwrite cve-2019-25604 dvdxplayer
2r 2t
critical advisory

Axessh 4.2 Stack-Based Buffer Overflow Vulnerability

Axessh 4.2 is vulnerable to a stack-based buffer overflow in the log file name field, allowing local attackers to execute arbitrary code by supplying an excessively long filename.

buffer-overflow privilege-escalation cve-2019-25607
2r 2t 6i
high advisory

Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking

A supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.

supply-chain github agent-skills repository-hijacking
2r 1t 2i
high advisory

Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)

A guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.

xen xenstore denial-of-service CVE-2026-23555 hypervisor vulnerability linux
2r 1t
high advisory

Jsrsasign < 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)

Jsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.

jsrsasign vulnerability signature-bypass
2r 1t
high advisory

Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)

Jsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.

denial-of-service javascript node.js jsrsasign vulnerability
2r 1t
critical advisory

jsrsasign DSA Signing Vulnerability (CVE-2026-4601)

jsrsasign versions before 11.1.1 are vulnerable to a missing cryptographic step in the DSA signing implementation, allowing an attacker to recover the private key by manipulating the signature generation process.

jsrsasign dsa missing-cryptographic-step CVE-2026-4601
2r 1t
critical advisory

Tenda A15 Router Stack-Based Buffer Overflow (CVE-2026-4567)

A stack-based buffer overflow vulnerability (CVE-2026-4567) exists in the UploadCfg function of the /cgi-bin/UploadCfg file in Tenda A15 firmware version 15.13.07.13, allowing remote attackers to execute arbitrary code by manipulating the File argument.

cve-2026-4567 stack-based buffer overflow tenda router remote code execution
2r 1t 7i
critical advisory

Belkin F9K1122 Router Stack-Based Buffer Overflow

A stack-based buffer overflow vulnerability exists in Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWISP5G' function.

cve-2026-4566 buffer-overflow router rce
2r 1t
critical advisory

Tenda AC21 Router Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.

tenda ac21 buffer_overflow cve-2026-4565 router
2r 1t
high advisory

WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)

The WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.

wordpress sqli cve-2026-2580 web-application
2r 1t
medium advisory

Inner Warden Security Agent Capabilities

The open-source Inner Warden project is a security agent leveraging eBPF for kernel-level monitoring and autonomous response actions like IP blocking and process termination, aiming to create a distributed security mesh.

ebpf security-agent autonomous-response privilege-escalation c2-blocking linux
2r 1t
high advisory

Trivy Scanner Compromised in Supply Chain Attack

The widely used Trivy scanner has been compromised in an ongoing supply chain attack, potentially impacting numerous organizations using the tool for vulnerability management.

supply-chain vulnerability-scanner trivy
2r 3t
high advisory

GhostLoader Malware Targeting macOS via GitHub and AI Workflows

GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.

github malware macos credential-theft ai
2r 1t
critical advisory

UniFi Network Application Vulnerabilities CVE-2026-22557 and CVE-2026-22558

A combination of path traversal (CVE-2026-22557) and NoSQL injection (CVE-2026-22558) vulnerabilities in the UniFi Network Application allows attackers to access files, escalate privileges, and potentially compromise the entire system.

unifi path-traversal nosql-injection cve-2026-22557 cve-2026-22558
2r 2t
high advisory

Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft

Attackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.

supply-chain github-actions ci/cd tag-hijacking
2r 4t
medium advisory

RagaSerpent 'Tax Audit' Campaign Targeting Multiple Countries

The RagaSerpent cluster, also known as SideWinder-Adjacent, is conducting targeted attacks across multiple countries between 2025 and 2026, associated with a 'Tax Audit' themed campaign.

RagaSerpent SideWinder Tax Audit Spearphishing
2r 1t
critical advisory

Critical Vulnerabilities in Quest KACE SMA Allow System Takeover

Multiple critical vulnerabilities in Quest KACE Systems Management Appliance (SMA), including authentication bypass and 2FA bypass, allow unauthenticated attackers to achieve system takeover and cause denial of service; active exploitation is reported.

quest-kace vulnerability authentication-bypass 2fa-bypass denial-of-service sma
2r 4t
high advisory

Claude Code Workspace Trust Dialog Bypass via Settings Loading Order (CVE-2026-33068)

A maliciously crafted `.claude/settings.json` file in a Claude Code repository (versions prior to 2.1.53) can bypass the workspace trust confirmation dialog by exploiting a configuration loading order defect, allowing for arbitrary code execution within a supposedly untrusted workspace.

claude-code workspace-trust cve-2026-33068 bypass
2r 1t
high advisory

Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration

The Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.

malware data-exfiltration cobra-docguard speagle
2r 1t
critical advisory

Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)

CVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.

CVE-2026-20963 sharepoint deserialization cisa-kev
2r 1t 1i
high advisory

Potential snap-confine Privilege Escalation via CVE-2026-3888

An unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.

privilege-escalation linux cve-2026-3888
2r 1t
high advisory

Disruption of Large IoT DDoS Botnets

Law enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.

iot ddos botnet disruption
2r 1t
high advisory

SnappyClient Malware Delivered via HijackLoader

SnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.

snappyclient hijackloader malware infostealer keylogger
2r 3t
high advisory

Vulnerabilities in Paxton Net2 Access Control Units

Vulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.

access-control physical-security vulnerability
2r 8t 1i
high advisory

CISA Urges Endpoint Management System Hardening After Cyberattack

CISA is urging hardening of endpoint management systems following a cyberattack against a US organization, highlighting the potential for significant impact via compromised management infrastructure.

endpoint-management supply-chain cisa
2r 5t
high advisory

DarkSword iOS Exploit Used in Infostealer Attack

A new exploit dubbed 'DarkSword' is being actively exploited in infostealer campaigns targeting iPhones, potentially leading to unauthorized data access and device compromise.

ios exploit infostealer darksword
2r 3t
high advisory

Memory Exhaustion Vulnerability in Widely Used Python Library

A memory exhaustion vulnerability (CVE-2026-33155) exists in a widely used Python library, affecting services like SageMaker, DataHub, and acryl-datahub due to an incomplete patch for CVE-2025-58367, requiring pinning to version 8.6.2.

memory-exhaustion vulnerability denial-of-service python supply-chain
2r 1t
high advisory

MOTW Bypass via CAB, TAR, and 7-Zip Chaining

A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.

motw bypass phishing defense-evasion archive 7-zip cab tar
2r 2t 1i
high advisory

Vulnerabilities Disclosed in IP KVM Devices from Multiple Vendors

Researchers have disclosed unspecified vulnerabilities in IP KVM devices from four manufacturers, potentially allowing attackers to gain unauthorized access to connected systems.

ip-kvm vulnerability remote-access
2r 2t
high advisory

CVE-2026-22729: JSONPath Injection Vulnerability in Spring AI's PgVectorStore

CVE-2026-22729 is a JSONPath Injection vulnerability found in Spring AI's PgVectorStore, potentially allowing for unauthorized data access or modification.

cve-2026-22729 jsonpath-injection spring-ai
2r 1t
critical advisory

Critical XSS Vulnerabilities in AFFiNE

Two critical XSS vulnerabilities, Reflected XSS in the /image-proxy endpoint and Stored XSS in bookmark cards, were discovered in AFFiNE, a self-hosted alternative to Notion, with the vendor being unresponsive.

xss vulnerability affine
2r 1t 2i
high advisory

CISA Urges Securing Microsoft Intune Systems Following Stryker Breach

CISA is urging US organizations to secure their Microsoft Intune systems due to a breach at Stryker, highlighting potential vulnerabilities in cloud-based device management that could lead to unauthorized access and control over managed devices.

microsoft-intune cloud-security device-management cisa-alert
2r 6t
high advisory

DarkSword iOS Exploit Chain Proliferation

The DarkSword exploit chain targets iOS versions 18 and under by exploiting a WebKit vulnerability, and is being adopted by multiple threat actors for initial access and execution.

ios exploit webkit darksword
1r 2t
high advisory

CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0) to protect AI agents from prompt injection, data exposure, and unauthorized actions, enabling safer deployment of AI applications.

ai-security prompt-injection data-protection guardrails agentic-ai
2r 6t
medium advisory

StoatWaffle Malware Used by WaterPlum Actor

StoatWaffle is malware employed by the WaterPlum threat actor, used for an unknown purpose.

WaterPlum stoatwaffle malware
2r 1t
high advisory

Interlock Ransomware Campaign Targeting Enterprise Firewalls

The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.

ransomware firewall network
2r 3t
high advisory

ScreenConnect 26.1 Cryptographic Material Protection Vulnerability

ScreenConnect version 26.1 has a vulnerability related to the insufficient protection of server-level cryptographic material, potentially allowing unauthorized access and data compromise.

screenconnect vulnerability cryptographic-material
2r 1t
high advisory

RegPwnBOF Registry Symlink Race Condition Exploit

RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.

registry symlink race-condition accessibility privilege-escalation persistence windows
2r 2t
critical advisory

Ubuntu 24.04 Snapd Local Privilege Escalation (CVE-2026-3888)

CVE-2026-3888 allows a local attacker to escalate privileges to root on Ubuntu 24.04 systems due to a vulnerability in the snapd service.

privilege-escalation snapd ubuntu CVE-2026-3888
2r 1t
high advisory

EmEditor Supply Chain Compromise Delivering Infostealer

A trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.

supply-chain infostealer windows
2r 1t
high advisory

Entra ID Federated Identity Credential Issuer Modified

Modification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.

azure entra_id federated_identity persistence privilege_escalation
2r 2t
high advisory

DarkSword iOS Exploit Kit Targeting iOS Devices

The DarkSword exploit kit targets iOS devices, leveraging unknown vulnerabilities to compromise devices.

ios exploit-kit darksword
2r 3t
low advisory

SOC Analyst Toolkit with Threat Hunting Queries

A free, offline SOC toolkit aimed at Tier 1 analysts includes IR checklists, triage playbooks, and threat hunting guides mapped to MITRE ATT&CK, with Splunk and Elastic queries for threats such as Kerberoasting, Pass-the-Hash, LOLBAS, scheduled task persistence, and C2 on non-standard ports.

soc blueteam threat-hunting
2r 1t 2i
medium advisory

NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)

A phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).

credential-access netntlm phishing windows
2r 1t
medium advisory

Self-Hosted Email Threat Detection Tool

A user created a self-hosted email threat detection tool, named VerdictMail, employing IMAP IDLE for real-time monitoring and multi-stage enrichment via SPF, DKIM, DMARC, DNSBL, WHOIS, URLhaus, and VirusTotal, coupled with an LLM for threat assessment.

email-security threat-detection imap
2r
high advisory

Credential Guard Bypass and Detection Strategies

This brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.

credential-guard bypass windows
2r 2t 1i
high advisory

Angular Cross-Site Scripting (XSS) Vulnerability

A cross-site scripting (XSS) vulnerability exists in Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, allowing attackers to execute arbitrary code within the context of the vulnerable application, potentially leading to session hijacking, data exfiltration, and unauthorized actions.

angular xss vulnerability
2r 5t
medium advisory

Iranian Botnet Operation Exposed via Open Directory

An Iranian botnet operation utilizing a 15-node relay network and active C2 infrastructure was exposed through an open directory.

botnet iran C2
1r 1t 1i
medium advisory

Azure Service Principal Sign-In Followed by Arc Cluster Credential Access

Detects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.

azure azure-arc credential-access initial-access
2r 2t
high advisory

GlassWorm Threat: DLL Injection and Chrome Hijacking

The GlassWorm threat involves DLL injection and Chrome hijacking via COM abuse, confirming a full supply chain loop, potentially leading to data theft and system compromise.

dll-injection chrome-hijacking com-abuse supply-chain
2r 2t
medium advisory

Persistnux - Linux Persistence Detection Tool

Persistnux is a bash-based tool designed to identify known Linux persistence mechanisms used by attackers to maintain access to compromised systems, generating detailed reports for DFIR analysis.

persistence linux dfir
3r 3t
critical advisory

CrackArmor: AppArmor Flaws Enable Local Privilege Escalation

Qualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.

apparmor privilege-escalation linux
2r 1t
medium advisory

HushSpec: Security Policy Specification for AI Agent Action Boundaries

HushSpec is an open specification under development to standardize security policies at the action boundary of AI agents, focusing on actions such as file access, network egress, and shell execution, aiming to create a portable and engine-agnostic policy layer.

AI-Agent security-policy action-boundary
2r 1t 2i
medium advisory

Stealthy WMI Lateral Movement via StealthyWMIExec.py

The StealthyWMIExec.py script facilitates lateral movement via WMI, potentially evading standard detection mechanisms by employing stealthy techniques.

lateral-movement wmi windows
2r 1t
medium advisory

GlassWorm Campaign Deploying Wave 3 Windows Payload

The GlassWorm campaign has been observed deploying a Wave 3 Windows payload, indicating ongoing malicious activity targeting Windows systems.

glassworm malware windows
2r 2t
high advisory

Unscoped API Keys in AI Agent Frameworks

A research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.

ai-agent api-key authorization credential-theft
2r 1t 2i
high advisory

Mirai C2 Remote Denial-of-Service Vulnerability (CVE-2024-45163)

CVE-2024-45163 is a remote denial-of-service vulnerability affecting Mirai command and control (C2) infrastructure, potentially disrupting botnet operations and related malicious activities.

cve-2024-45163 mirai dos iot
2r 1t
low advisory

JPCERT/CC Study on Reverse Engineering Rust Binaries

JPCERT/CC published a study on the reverse engineering of binaries created with the Rust programming language, providing insights for malware analysis and detection engineering.

rust reverse-engineering malware-analysis
2r
high advisory

PylangGhost RAT Observed on npm Registry

A new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.

supply-chain rat npm pylangghost
2r 1t
medium advisory

Maltrail IOC Feed Update for Multiple Threats

This brief summarizes IOCs extracted from the Maltrail feed on March 15, 2026, covering domains and URLs associated with threats targeting macOS and Android platforms, including OSX_Atomic, FakeApp, Android_Joker, Lummack2, APT_Sidewinder, APT_Kimsuky, and Hak5Cloud_C2.

maltrail ioc osx android apt
3r 6t 50i
high advisory

Fileless Multi-Stage Remcos RAT via Phishing

A fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.

remcos rat fileless phishing
2r 4t
high advisory

Malware Spreading Through Fake 'Claude Code' Google Ads

Malware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.

malware google_ads initial_access windows macos
2r 1t
high advisory

Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories

The Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.

supply-chain unicode malware github
3r 4t 1i
medium advisory

GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis

Analysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.

malware github infrastructure
2r 2t
high advisory

Phishing Campaign Abusing Google Cloud Storage Redirectors

A phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.

phishing redirect google-cloud-storage
2r 1t 2i
high advisory

Multiple Network Intrusion Attempts Detected

Multiple network-based intrusion attempts were detected on 2026-03-14, targeting PHP information exposure, Fortigate VPN exploitation, sensitive file access, and credential exposure.

network-intrusion vulnerability-exploitation information-disclosure
3r 2t 8i
critical advisory

Multiple Critical Vulnerabilities in Veeam Backup & Replication Allow Remote Code Execution

Multiple critical vulnerabilities in Veeam Backup & Replication, including CVE-2026-21666, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708, allow for remote code execution, privilege escalation, and arbitrary file manipulation by authenticated users, potentially leading to a complete compromise of the backup infrastructure.

veeam rce vulnerability privilege-escalation
2r 3t
medium advisory

KRVTZ-NET IDS Alerts Analysis: Network Scanning and Exploitation Attempts

Multiple IDS alerts indicate potential network reconnaissance, vulnerability exploitation attempts targeting Fortigate VPN (CVE-2023-27997), and ColdFusion servers originating from various IP addresses on March 13, 2026.

network-scanning vulnerability-exploitation fortigate coldfusion cve-2023-27997
3r 4t 13i
high advisory

RegPwn Windows Local Privilege Escalation Vulnerability

RegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.

windows lpe privilege-escalation
2r 1t
medium advisory

Kubernetes Sensitive Role Creation or Modification

This rule detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs (e.g., bind, escalate, impersonate), potentially leading to privilege escalation or unauthorized access within the cluster.

kubernetes rbac privilege-escalation persistence
2r 2t
medium advisory

Kubernetes Endpoint Permission Enumeration

A single user and source IP attempts to enumerate Kubernetes endpoints, issuing API requests across multiple endpoints to identify accessible resources for further exploitation.

kubernetes enumeration discovery
2r 1t
critical advisory

Apache Artemis and ActiveMQ Artemis Authentication Bypass Vulnerability

CVE-2026-27446 allows an unauthenticated remote attacker to inject malicious messages or exfiltrate data from Apache Artemis and ActiveMQ Artemis brokers due to a missing authentication check in the Core protocol.

apache-artemis apache-activemq authentication-bypass message-injection data-exfiltration
2r 5t
low advisory

AWS STS Role Assumption by User

Detection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.

aws privilege-escalation lateral-movement
2r 2t
high advisory

Fortigate VPN CVE-2023-27997 Exploitation Attempt

IDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.

fortigate vpn cve-2023-27997 exploit initial-access
2r 1t 1i
medium advisory

Maltrail IOCs Report: Tracking Multiple Threat Actors

This brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.

maltrail threat-intelligence apt malware
3r 5t 27i
critical advisory

Critical Unauthenticated RCE Vulnerability in Junos OS Evolved

A critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.

junos rce vulnerability
2r 3t
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Platform

Multiple critical vulnerabilities in n8n versions prior to 2.10.1, 2.9.3, and 1.123.22 enable authenticated users to execute arbitrary code and system commands, potentially leading to full system compromise.

n8n code-injection sql-injection vulnerability
3r 3t
high advisory

Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution

Multiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.

ics denial-of-service out-of-bounds write
2r 3t
critical advisory

Multiple Vulnerabilities in SWITCH EV Charging Stations

Multiple vulnerabilities in SWITCH EV swtchenergy.com charging stations could allow attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data due to missing authentication, rate limiting issues, session expiration flaws, and exposed credentials.

electric-vehicle charging-station websocket
2r 7t 1i
critical advisory

Mobility46 Charging Station Vulnerabilities Allow Unauthorized Control and Disruption

Multiple vulnerabilities in Mobility46 charging stations allow attackers to gain unauthorized administrative control or disrupt charging services through missing authentication, improper authentication restrictions, insufficient session expiration, and exposed credentials.

mobility46 charging-station vulnerability ics
2r 3t 1i
critical advisory

Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)

A critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.

zyxel router command injection cve-2026-13942 upnp
2r 1t
high advisory

Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability

An authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.

cve-2026-1241 authentication-bypass ip-camera ics
2r 1t
critical advisory

EV2GO Charging Station Vulnerabilities Allow Impersonation and Denial of Service

Multiple vulnerabilities in EV2GO charging stations, including missing authentication and session management flaws, could allow attackers to impersonate stations, hijack sessions, and cause denial-of-service conditions.

ev2go charging-station vulnerability denial-of-service
2r 3t 1i
critical advisory

Critical RCE Vulnerability in Cisco Catalyst SD-WAN Controller

A critical remote code execution vulnerability exists in Cisco Catalyst SD-WAN Controllers (CVE-2026-20127) due to improper authentication, allowing unauthenticated remote attackers to bypass authentication and gain administrative privileges, potentially leading to network configuration manipulation.

cisco sd-wan rce vulnerability
2r 2t 4i
critical advisory

Multiple Vulnerabilities in EV Energy ev.energy Charging Stations

Multiple vulnerabilities exist in EV Energy ev.energy that could allow an attacker to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.

ev.energy charging-station ics vulnerability dos
2r
critical advisory

Multiple Vulnerabilities in Chargemap Charging Stations

Unauthenticated attackers can exploit multiple vulnerabilities in Chargemap's charging stations, including missing authentication, improper authentication attempt restrictions, insufficient session expiration, and unprotected credentials, potentially leading to unauthorized control and denial-of-service.

ics ot vulnerability denial-of-service
2r 5t 1i
critical advisory

Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities

Multiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.

ics ot vulnerability
2r 4t
critical advisory

Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution

Multiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.

solarwinds serv-u rce vulnerability
2r 3t
critical advisory

Copeland XWEB and XWEB Pro Multiple Vulnerabilities

Multiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and earlier could allow attackers to bypass authentication, inject commands, and execute arbitrary code, leading to complete system compromise.

copeland xweb vulnerability ics
2r 6t
high advisory

Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent

Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.

fortigate vpn cve-2023-27997 exploit network
3r 2t 3i
critical advisory

VMware Aria Operations Vulnerabilities Allow Remote Code Execution and Privilege Escalation

Multiple vulnerabilities in VMware Aria Operations, Cloud Foundation, and Telco Cloud Platform/Infrastructure could allow unauthenticated remote code execution (CVE-2026-22719) and privilege escalation (CVE-2026-22720, CVE-2026-22721).

vmware aria-operations rce privilege-escalation
2r 2t 3i
critical advisory

Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution

Critical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.

freescout rce vulnerability apache
2r 2t
critical advisory

Ongoing Exploitation of Cisco SD-WAN Systems

Malicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.

cisco-sdwan vulnerability exploitation network
3r 4t
medium advisory

Suspicious AWS EC2 Key Pair Import Activity

The import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.

Elastic Compute Cloud aws cloudtrail ec2 keypair initial-access persistence privilege-escalation
2r 1t
medium advisory

AWS SAML Provider Deletion Activity

An adversary may delete an AWS SAML provider to disrupt administrative access, hindering incident response and potentially escalating privileges within the AWS environment.

aws cloudtrail saml iam deletion impact
2r 2t
medium advisory

Bitbucket Secret Scanning Rule Deleted

Attackers may delete secret scanning rules in Bitbucket to impair defenses and introduce secrets into the code repository undetected, potentially leading to unauthorized access or data breaches.

Bitbucket attack.defense-impairment attack.t1685
2r 1t
critical advisory

OpenC3 COSMOS Script Runner Permissions Bypass

The OpenC3 COSMOS Script Runner widget allows authenticated users to bypass API permissions checks and execute administrative actions by running specially crafted Python and Ruby scripts, leading to data manipulation and privilege escalation.

openc3 cosmos script-runner permissions-bypass privilege-escalation
2r 1t
critical advisory

LiteLLM Proxy API Key Verification SQL Injection

A SQL injection vulnerability exists in LiteLLM versions 1.81.16 to prior to 1.83.7 allowing an unauthenticated attacker to inject SQL queries via a crafted 'Authorization' header, potentially leading to unauthorized data access or modification.

litellm sqli web-application
2r 1t
medium advisory

Suspicious Pod Creation in Kubernetes System Namespace

An attacker may deploy a pod within the kube-system namespace in Kubernetes to mimic legitimate system pods and evade detection.

Kubernetes pod kube-system container
2r 1t
high advisory

LiteLLM Server-Side Template Injection Vulnerability

A server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.

LiteLLM ssti template-injection code-execution
2r 1t
medium advisory

Powercat PowerShell Implementation Detection

Adversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.

Windows command-and-control execution lateral-movement powershell
2r 2t
medium advisory

Active Directory Group Modification by SYSTEM Account

Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.

Active Directory persistence privilege-escalation windows
2r 2t
critical advisory

NornicDB Improper Network Binding Exposes Bolt Server

NornicDB versions prior to 1.0.42-hotfix have an improper network binding vulnerability in its Bolt server, allowing unauthorized remote access because the `--address` CLI flag is not correctly plumbed through to the Bolt server config, causing the Bolt listener to always bind to the wildcard address and expose the database with default credentials.

nornicdb network-binding misconfiguration graph-database
2r 2t
medium advisory

GitHub SSH Certificate Configuration Changed

Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.

Github ssh certificate initial-access persistence privilege-escalation stealth t1078.004
2r 4t
high advisory

WDAC Policy File Creation by Unusual Process

Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.

Microsoft Defender XDR +5 wdac defense-evasion windows
2r 1t
low advisory

Unusual Spike in Okta User Lifecycle Management Change Events

A machine learning job has identified an unusual spike in Okta user lifecycle management change events, indicating potential privileged access activity where threat actors may manipulate user accounts to gain higher access rights or persist within the environment.

privileged-access okta user-lifecycle
2r 4t
high advisory

Untrusted DLL Loaded by Azure AD Connect Authentication Agent

The loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.

Azure AD Connect Authentication Agent credential-access dll-side-loading azure-ad-connect
2r 1t
medium advisory

Potential Privilege Escalation via SUID/SGID on Linux

Attackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.

Elastic Defend privilege-escalation persistence defense-evasion suid sgid
2r 2t
high advisory

MemProcFS Usage for Memory Dump Mounting and Credential Access

Adversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.

credential-access memory-dump memprocfs
2r 3t
medium advisory

Kubernetes Admission Controller Modification

An adversary modifies Kubernetes admission controller configurations to achieve persistence, escalate privileges, or gain unauthorized access to credentials within the cluster.

kubernetes admission-controller privilege-escalation persistence credential-access
2r 2t
medium advisory

go-zserio Unbounded Memory Allocation Vulnerability

go-zserio versions prior to 0.9.1 are vulnerable to unbounded memory allocation when deserializing data, potentially leading to denial of service.

go-zserio memory-allocation denial-of-service
2r 1t
medium advisory

Detect AWS Route Table Modification via CloudTrail

An attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.

AWS EC2 +1 cloud aws network-routing
2r
medium advisory

Bitbucket Global SSH Settings Changed

An attacker modifies Bitbucket global SSH settings to potentially enable unauthorized access and lateral movement.

Bitbucket lateral-movement defense-impairment
2r 2t
high advisory

GitHub Security Feature Disablement

An administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.

GitHub security-configuration defense-evasion
3r 3t
high advisory

OpenCanary HTTPPROXY Login Attempt Detection

Detection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.

OpenCanary honeypot httpproxy lateral-movement
2r 1t
high advisory

OpenCanary Telnet Login Attempt

The OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.

honeypot telnet reconnaissance intrusion opencanary
1r 2t
low advisory

New AWS Network ACL Entry Creation Detected

Detection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.

AWS CloudTrail +1 attack.defense-impairment attack.t1686.001 cloud
2r 1t
medium advisory

MsiExec Child Process Spawning Network Connections for Defense Evasion

Detection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.

Elastic Defend +3 defense-evasion windows msiexec
2r 1t
high advisory

Linux Shell Invocation via Env Command

The 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.

execution linux
2r 1t
critical advisory

Dgraph Pre-Auth DQL Injection Vulnerability

A pre-authentication DQL injection vulnerability in Dgraph's `/mutate` endpoint, when ACL is disabled, allows attackers to exfiltrate the entire database by crafting a malicious `cond` field in an upsert mutation.

Dgraph dql-injection injection database-exfiltration
1r 1t
medium advisory

Bitbucket Audit Log Configuration Modified

An attacker may modify the Bitbucket audit log configuration to impair security monitoring and evade detection.

Bitbucket attack.defense-impairment attack.t1562.004
2r 1t
medium advisory

Persistence via Windows Installer (Msiexec)

Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.

Windows +21 persistence defense-evasion
3r 3t
high advisory

Evolver Path Traversal Vulnerability in `fetch` Command

A path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.

@evomap/evolver path-traversal arbitrary-file-write privilege-escalation evolver
2r 2t
high advisory

GitHub Secret Scanning Feature Disabled

Detection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.

Github attack.defense-impairment attack.t1685
2r 1t
high advisory

Malicious Usage of AWS IMDS Credentials Outside of Expected Services

Compromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.

EC2 attack.privilege-escalation attack.initial-access attack.persistence attack.stealth attack.t1078 attack.t1078.002
2r 3t
medium advisory

Alternate Data Stream Creation/Execution at Volume Root Directory

Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.

Microsoft Defender XDR +2 defense-evasion hide-artifacts alternate-data-stream
2r 1t
medium advisory

Unsigned DLL Loaded by DNS Service

The rule identifies the loading of unusual or unsigned DLLs by the DNS Server process, which can indicate exploitation of the ServerLevelPluginDll functionality, potentially leading to privilege escalation and remote code execution with SYSTEM privileges.

Elastic Defend privilege-escalation execution persistence windows
2r 3t
high advisory

Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing

A high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.

Traefik authentication-bypass webserver
2r 1t
medium advisory

russh Keyboard-Interactive Authentication Denial-of-Service

A denial-of-service vulnerability exists in the russh crate, where a malicious client can crash any russh-based server implementing keyboard-interactive authentication by sending a crafted SSH_MSG_USERAUTH_INFO_RESPONSE message with a large response count, leading to excessive memory allocation and an out-of-memory crash without requiring any credentials.

russh denial-of-service keyboard-interactive
2r 2t
medium advisory

Potential Veeam Credential Access via SQL Commands

Attackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.

Microsoft Defender XDR +1 veeam credential-access mssql windows ransomware
2r 5t
critical advisory

OpenSC Stack Buffer Overflow Vulnerability (CVE-2025-66215)

CVE-2025-66215 is a critical stack buffer overflow vulnerability within the OpenSC project, specifically affecting the `card-oberthur` component, potentially leading to arbitrary code execution.

OpenSC stack-buffer-overflow cve-2025-66215 smart-card
2r 1c
critical advisory

OpenSC Stack Buffer Overflow Vulnerability (CVE-2025-49010)

CVE-2025-49010 is a critical stack buffer overflow vulnerability within the GET RESPONSE function of OpenSC, potentially leading to arbitrary code execution.

OpenSC buffer-overflow cve-2025-49010
2r 1c
high advisory

Detecting Potential PowerShell Pass-the-Hash/Relay Scripts

This rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.

Windows credential-access pass-the-hash ntlm-relay powershell
2r 2t
medium advisory

Potential Windows Session Hijacking via CcmExec

Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.

System Center Configuration Manager defense-evasion dll-hijacking sccm
2r 1t
medium advisory

NTDS Dump via Wbadmin

Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.

Microsoft Defender XDR +4 credential-access windows wbadmin ntds.dit
2r 2t
medium advisory

Microsoft Management Console File Execution from Unusual Path

Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.

Microsoft Management Console File +2 execution defense-evasion windows
2r 4t
critical advisory

Grafana Vulnerability Allows Remote Code Execution

An authenticated remote attacker can exploit a vulnerability in Grafana to execute arbitrary code, potentially leading to system compromise and data exfiltration.

Grafana code-execution vulnerability
2r 1t
medium advisory

DNS Global Query Block List Modified or Disabled

Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.

Elastic Defend +4 defense-evasion registry-modification windows
2r 3t
high advisory

Suspicious Registry Hive Access via RegBack

This rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.

Endpoint Defense +6 credential-access regback windows
2r 1t
high advisory

SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation

A missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.

SimpleHelp privilege-escalation missing-authorization cloud
2r 1t 1c
critical advisory

SimpleHelp Path Traversal Vulnerability (CVE-2024-57728)

CVE-2024-57728 is a path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file, potentially leading to arbitrary code execution.

SimpleHelp cve-2024-57728 path-traversal zip-slip
2r 3t 1c
high advisory

Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)

CVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.

Otter Blocks plugin wordpress plugin purchase-bypass CVE-2026-2892 defense-evasion
3r 1t 1c
medium advisory

Roundcube Vulnerabilities Leading to Cross-Site Scripting and Information Disclosure

Multiple vulnerabilities in Roundcube allow an attacker to perform a cross-site scripting attack and disclose confidential information.

Roundcube xss vulnerability
2r 1t 3c
medium advisory

Unauthorized Modification of Azure Conditional Access Policy

An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.

Azure Active Directory azure conditional-access policy-modification attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 +1
2r 2t
low advisory

Suspicious DNS-Named Record Creation in Active Directory Integrated DNS

Detection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.

credential-access windows active-directory
2r 1t
medium advisory

Suspicious ScreenConnect Client Child Process Activity

This rule identifies suspicious child processes spawned by ScreenConnect client processes, potentially indicating unauthorized access and command execution abusing ScreenConnect remote access software to perform malicious activities such as data exfiltration or establishing persistence.

Elastic Defend +3 command-and-control defense-evasion execution persistence screenconnect
2r 11t 2c
medium advisory

Suspicious Child Processes Spawned by JetBrains TeamCity

Detection of suspicious processes spawned by JetBrains TeamCity indicates potential exploitation of remote code execution vulnerabilities, with attackers using command interpreters and system binaries for malicious purposes.

TeamCity supply-chain initial-access
2r 17t 1c
high advisory

Windows Parent Process PID Spoofing Detection

Adversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.

Elastic Defend defense-evasion process-injection windows
3r 1t
medium advisory

Azure AD Root Certificate Authority Added for Passwordless Authentication

An attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.

Azure Active Directory attack.credential-access attack.persistence attack.privilege-escalation attack.defense-impairment attack.t1556
2r 4t
high advisory

OpenCanary SSH Connection Attempt

An SSH connection attempt to an OpenCanary node indicates a potential adversary probing for vulnerable services or attempting unauthorized access within a network.

OpenCanary honeypot ssh reconnaissance
2r 1t
high advisory

Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability

The Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.

argo-workflows/v4 argo-workflows kubernetes configmap authorization vulnerability
2r 1t
high advisory

Potential ADIDNS Poisoning via Wildcard Record Creation

Attackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.

Active Directory Integrated DNS credential-access adidns windows active-directory
2r 1t
medium advisory

Veeam Backup Library Loaded by Unusual Process

Detects potential credential decryption operations by PowerShell or unsigned processes using the Veeam.Backup.Common.dll library, indicating potential credential access attempts to target backups as part of destructive operations.

Veeam Backup credential-access veeam powershell
2r 3t
critical advisory

GStreamer Multiple Vulnerabilities Allow Remote Code Execution and Denial of Service

Multiple vulnerabilities in GStreamer could be exploited by a remote, anonymous attacker to execute arbitrary code or cause a denial of service condition.

GStreamer rce dos
2r 2t 5c
critical advisory

GStreamer Multiple Vulnerabilities Allow for Remote Code Execution and Denial of Service

Multiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition or execute arbitrary code.

GStreamer vulnerability denial-of-service remote-code-execution
2r 2t 5c
high advisory

GitHub Push Protection Disabled

An administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.

GitHub Enterprise Cloud attack.defense-impairment attack.t1685
2r 1t
high advisory

OpenCanary SSH Login Attempt Detection

Detects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.

OpenCanary honeypot ssh initial-access
2r 1t
medium advisory

GenAI Process Connection to Unusual Domain on macOS

This rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.

Copilot +22 genai command and control macos network connection
2r 1t
medium advisory

Zserio Runtime Unbounded Memory Allocation Vulnerability

A crafted payload can force memory allocations of up to 16 GB, leading to a denial-of-service condition in applications using the Zserio serialization framework, including those within the automotive Navigation Data Standard (NDS).

Navigation Data Standard +1 zserio denial-of-service memory-allocation nds
2r 1t
medium advisory

Monetr Lunch Flow SSRF Vulnerability

A server-side request forgery (SSRF) vulnerability in Monetr's Lunch Flow integration allows authenticated users on self-hosted instances to send HTTP GET requests to arbitrary URLs, potentially exposing sensitive information.

Monetr ssrf monitr github-advisory
2r 1t 1i
medium advisory

Kubernetes Event Deletion for Defense Evasion

An adversary may delete Kubernetes events to evade detection and hide malicious activity within a Kubernetes environment by removing audit logs.

Kubernetes stealth defense-evasion
2r 1t
critical advisory

Dgraph Unauthenticated Admin Token Disclosure via /debug/vars

Dgraph versions prior to 25.3.3 expose the admin token via the `/debug/vars` endpoint, allowing unauthenticated attackers to bypass authentication and gain administrative access.

Dgraph authentication-bypass admin-token-disclosure
3r 2t
low advisory

Potential Data Exfiltration to Unusual Geographic Region via Machine Learning

A machine learning job has detected potential data exfiltration activity to an unusual geographical region, specifically by region name, indicating exfiltration over command and control channels.

data-exfiltration machine-learning network-traffic
2r 1t
high advisory

Okta Admin Console Unusual Behavior Detection

This brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.

Okta Identity Engine okta identity privilege-escalation persistence defense-evasion initial-access
2r 4t
low advisory

Unusual Remote File Size Indicating Lateral Movement

A machine learning job has detected an unusually high file size shared by a remote host, indicating potential lateral movement as attackers bundle data into a single large file transfer to evade detection when exfiltrating valuable information.

lateral-movement data-exfiltration machine-learning
2r 3t
high advisory

Grafana Privilege Escalation Vulnerability

A remote, authenticated attacker can exploit a vulnerability in Grafana to escalate privileges.

Grafana privilege-escalation web-application
2r 1t
medium advisory

Azure AD Certificate-Based Authentication Enabled

Enabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.

Azure Active Directory azure certificate-based-authentication persistence privilege-escalation
2r 1t
medium advisory

Bitbucket Global Secret Scanning Rule Deletion

An adversary with administrative privileges may delete global secret scanning rules in Bitbucket to impair defenses and exfiltrate sensitive data without detection.

Bitbucket attack.defense-impairment attack.t1685
2r 1t
medium advisory

Potential Abuse of AWS Console GetSigninToken

Adversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.

AWS CloudTrail aws cloud lateral-movement credential-access
2r 2t
low advisory

GitHub Push Protection Bypass Detection

Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.

Github defense-impairment t1685
2r
critical advisory

ConnectWise ScreenConnect Path Traversal Vulnerability (CVE-2024-1708)

CVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect that could allow an attacker to execute remote code or directly impact confidential data and critical systems.

ScreenConnect path-traversal remote-code-execution cve-2024-1708 connectwise
2r 1t 1c
medium advisory

Bitbucket Repository Exempted from Secret Scanning

An attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.

Bitbucket Server attack.defense-impairment attack.t1685 bitbucket
2r 1t
low advisory

Bitbucket Project Secret Scanning Allowlist Added

An adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.

Bitbucket attack.defense-impairment attack.t1685
2r
medium advisory

Bitbucket User Login Failure Detection

Detection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.

Bitbucket authentication brute-force credential-access initial-access
2r 3t
high advisory

Okta Password Entered in AlternateID Field

Okta logs may contain user passwords if a user mistakenly enters their password into the username field during login, potentially exposing credentials in logs.

Okta Identity Engine attack.credential-access attack.t1552 okta password-leak
2r 1t
critical advisory

Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

Breeze Cache plugin wordpress plugin file-upload rce
2r 1t 1c
medium advisory

Suspicious Child Processes from Communication Applications

The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.

Elastic Defend +12 defense-evasion persistence windows
3r 3t
medium advisory

Network-Level Authentication (NLA) Disabled via Registry Modification

Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.

Microsoft Defender XDR +4 defense-evasion lateral-movement registry-modification windows
2r 2t
high advisory

Azure Identity Protection Suspicious Browser Activity

A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.

Azure identity-protection suspicious-browser
2r 6t
medium advisory

Azure Firewall Rule Collection Modification or Deletion

An attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.

Azure Firewall azure firewall defense-impairment
2r 2t
medium advisory

Potential Enumeration via Active Directory Web Service

Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.

Active Directory Web Service active-directory enumeration adws discovery windows
2r 3t
high advisory

Wireless Credential Dumping via Netsh

Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.

Defender XDR +2 credential-access netsh windows
2r 2t
medium advisory

Windows Console History Clearing

Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.

M365 Defender +1 defense-evasion powershell windows
2r 2t
high advisory

TYPO3 CMS 14.2.0 Stores Passwords in Cleartext

TYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.

CMS Backend typo3 cleartext-password credential-access cve-2026-6553
1r 1t
medium advisory

System File Ownership Change for Defense Evasion

Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.

Microsoft Defender XDR +2 defense-evasion persistence windows
3r 1t
medium advisory

Suspicious Windows Process Cluster from Parent Process via Machine Learning

A machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.

defense-evasion lolbin windows
2r 2t
low advisory

Spike in Number of RDP Connections from a Single Source IP

A machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.

lateral-movement rdp elastic
2r 2t
medium advisory

Service Reconnaissance via WMIC.exe

Adversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.

Windows attack.execution attack.t1047
2r 1t
high advisory

Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation

A vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.

Saltcorn Data privilege-escalation web-application cloud
2r 1t
high advisory

PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)

PrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.

prefect CVE-2026-7723 authentication-bypass websocket prefecthq
2r 1t 1c
medium advisory

Potential Account Takeover via Mixed Logon Types

A Windows account, usually a service account, exhibiting a sudden shift in logon type patterns may indicate account compromise and lateral movement.

account-takeover privilege-escalation windows
2r 1t
critical advisory

PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load

PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.

PhpSpreadsheet ssrf rce php deserialization
2r 2t
low advisory

Netsh Helper DLL Persistence

Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.

Microsoft Defender XDR +3 persistence windows netsh registry
2r 2t
high advisory

Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)

Kentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.

Kentico Xperience path traversal cve-2025-2749 kentico
2r 1t 1c
medium advisory

Expired or Revoked Driver Loaded

An expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.

Elastic Defend privilege-escalation defense-evasion windows
2r 3t
low advisory

Detection of New GitHub Actions Secrets Creation

This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.

GitHub Actions github persistence privilege-escalation initial-access
3r 3t
critical advisory

CVE-2022-2068 c_rehash Command Injection Vulnerability

CVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.

cve-2022-2068 command-injection c_rehash certificate-management
2r 1t 1c
high advisory

CI4MS Authenticated Remote Code Execution via Theme Upload

CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.

ci4-cms-erp/ci4ms code-execution web-application php
2r 2t
high advisory

changedetection.io XXE Vulnerability

A vulnerability in changedetection.io versions 0.54.9 and earlier allows a remote attacker to perform XML External Entity (XXE) attacks, potentially exposing sensitive local files.

changedetection.io XXE vulnerability
2r 1t
high advisory

Azure AD Sign-In with Unfamiliar Properties

This alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.

Azure Active Directory azure identity_protection sign-in account_compromise risk_detection
2r 4t
high advisory

Azure AD Sign-in from New Country/Region

Detection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.

Entra ID attack.stealth attack.t1078 attack.persistence attack.privilege-escalation attack.initial-access
2r 1t
low advisory

MsXsl.exe Network Connection for Defense Evasion

Msxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.

Elastic Defend +1 defense-evasion command-and-control windows msxsl
2r 2t
medium advisory

Azure AD Authentication from Unexpected Geo-locations

Detection of successful authentications originating from geographic locations outside of an organization's expected operational footprint, potentially indicating compromised credentials or unauthorized access.

Azure Active Directory azuread authentication geo-location unauthorized-access credential-compromise privilege-escalation
2r 1t
medium advisory

VaultCmd Usage for Listing Windows Credentials

Adversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.

Microsoft Defender XDR +1 credential-access windows vaultcmd
2r 2t
medium advisory

Suspicious Registry Modifications by Scripting Engines

The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.

Windows defense-evasion persistence execution registry-modification
2r 3t
high advisory

Suspicious Managed Code Hosting Process

This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.

M365 Defender +3 defense-evasion windows managed code lolbin
2r 1t
high advisory

rust-openssl AES Key Wrap Out-of-Bounds Write Vulnerability

The rust-openssl package is vulnerable to an out-of-bounds write due to an incorrect bounds assertion in the `aes::unwrap_key()` function, potentially leading to arbitrary code execution if attacker-controlled buffer sizes are permitted.

openssl aes keywrap oob-write memory-corruption
2r
medium advisory

Program Files Directory Masquerading

Adversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.

Elastic Defend +2 defense-evasion masquerading windows
2r 1t
medium advisory

Okta Policy Rule Modification or Deletion

An Okta policy rule was modified or deleted, potentially weakening security controls.

okta identity policy attack.impact
2r 1t
medium advisory

Multiple Logon Failure from the Same Source Address

Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.

Windows credential-access brute-force password-spraying
2r 2t
medium advisory

Kubernetes Cluster Enumeration via Audit Logs

Attackers attempt to enumerate and discover sensitive information within a Kubernetes cluster by leveraging common shells, utilities, and specialized tools, as reflected in audit logs.

kubernetes enumeration cloud
3r 2t
high advisory

AWS Identity API Access from Rare ASN Organizations

This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.

aws cloudtrail initial-access credential-access
2r 1t
medium advisory

Admidio SAML Assertion Consumer Service (ACS) URL Validation Bypass

Admidio's SAML IdP implementation in its SSO module is vulnerable to sending SAML responses to unvalidated Assertion Consumer Service URLs, allowing an attacker to craft a SAML AuthnRequest with an arbitrary AssertionConsumerServiceURL, causing the IdP to send the signed SAML response, containing user identity attributes, to an attacker-controlled URL, enabling impersonation of the victim user on the legitimate SP by replaying the SAML assertion.

admidio saml sso acs-bypass cve-2026-41670
2r 2t 2i
high advisory

Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability

A SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.

EEMS Enterprise Power Operation and Maintenance Cloud Platform sql-injection web-application vulnerability
2r 1t 1c
high advisory

Potential Remote Install via MsiExec

This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.

Microsoft Defender XDR +3 defense-evasion windows msiexec remote-install
2r 1t
low advisory

Potential Exploitation of an Unquoted Service Path Vulnerability

This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.

Microsoft Defender XDR +4 privilege-escalation unquoted-service-path windows
2r 1t
medium advisory

Potential Abuse of Certreq for File Transfer via HTTP POST

Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.

Microsoft Defender XDR +2 lolbin command-and-control exfiltration certreq
2r 4t
medium advisory

Windows Registry Classes Autorun Keys Modification for Persistence

Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.

Windows attack.privilege-escalation attack.persistence attack.t1547.001
3r 1t
medium advisory

Remote File Download via Script Interpreter

Attackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.

Windows Script Host command-and-control execution windows script_interpreter
2r 3t
medium advisory

Kerberos Pre-authentication Disabled for User Account

Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.

Active Directory kerberos credential-access as-rep-roasting active-directory windows
3r 4t
medium advisory

Detection of Obfuscated IP Address Usage in Download Commands

This brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.

Windows discovery evasion obfuscation
2r 2t
high advisory

AMSI Enable Registry Key Modification for Defense Evasion

Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.

Microsoft Defender XDR +4 defense-evasion amsi registry windows
2r 1t
low advisory

Microsoft Office 'Office Test' Registry Persistence Abuse

Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.

Microsoft Office +4 persistence registry windows
2r 2t
medium advisory

Kyverno Controller Denial of Service via forEach Mutation Panic

An unchecked type assertion in Kyverno versions v1.13.0 to v1.17.1 allows a user with permission to create a Policy or ClusterPolicy to crash the cluster-wide background controller into a persistent CrashLoopBackOff, leading to a denial of service, by crafting a malicious policy that triggers a nil pointer dereference in the forEach mutation handler.

Kyverno denial-of-service kubernetes policy-engine
2r 2t
medium advisory

Active Directory msPKIAccountCredentials Modification

Attackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.

Active Directory privilege-escalation credential-roaming active-directory windows
2r 2t
medium advisory

XSL Script Execution via COM Interface in Microsoft Office

Adversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.

Microsoft Office +3 xsl-script com-interface office-macro
2r 5t
medium advisory

Okta Network Zone Deactivation or Deletion

An Okta network zone was deactivated or deleted, potentially indicating malicious activity aimed at bypassing security controls.

Okta Identity Engine okta network-zone impact
2r 1t
high advisory

Suspicious Alternate Data Stream (ADS) File Creation

Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.

M365 Defender +3 defense-evasion ads file-creation windows
2r 1t
high advisory

xmldom XML Node Injection via Comment Serialization

The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.

xmldom xml injection deserialization vulnerability
2r 1t
medium advisory

System Shells Launched via Windows Services

Attackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.

Windows +2 persistence execution privilege_escalation
2r 4t
high advisory

S3Browser IAM Policy Creation with Default Bucket Name

An AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.

AWS IAM +1 aws iam s3browser s3 policy cloudtrail
2r 3t
high advisory

Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)

CVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.

cve-2026-24082 use-after-free memory corruption qualcomm
2r 1t 1c
high advisory

PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access

Detection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.

PowerShell credential-access kerberos windows
2r 1t
high advisory

Potential Kerberos Coercion via DNS-Based SPN Spoofing

Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.

Active Directory kerberos coercion dns spn spoofing credential-access
2r 1t
critical advisory

MindsDB Unrestricted File Upload Vulnerability (CVE-2026-7711)

CVE-2026-7711 allows for remote, unrestricted file uploads in MindsDB up to version 26.01 due to insufficient validation in the `exec` function of `proc_wrapper.py`, potentially leading to code execution or data exfiltration.

MindsDB cve vulnerability file-upload
2r 1t 1c
medium advisory

LSASS Credential Dumping via Windows Error Reporting (WER) Abuse

Attackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.

Elastic Defend +2 credential-access windows lsass wepw
2r 2t
high advisory

i18next-http-middleware Prototype Pollution and Path Traversal Vulnerability

Versions of i18next-http-middleware before 3.9.3 are vulnerable to prototype pollution, path traversal, and server-side request forgery (SSRF) due to improper validation of user-controlled language and namespace parameters, potentially leading to denial of service or remote code execution.

i18next-http-middleware prototype-pollution path-traversal ssrf denial-of-service i18next
2r 2t
low advisory

Group Policy Discovery via Microsoft GPResult Utility

Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.

M365 Defender +1 discovery windows group_policy
2r 1t
low advisory

Detection of Malicious Browser Extension Installation

This rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.

Elastic Defend +2 persistence browser-extension windows
2r
high advisory

Azure AD Device Registration Policy Changes Detected

Monitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.

Azure Active Directory azure device-registration policy-change
2r 1t
medium advisory

Unusual Network Connection via RunDLL32

The rule detects unusual outbound network connections made by rundll32.exe, specifically when executed with minimal arguments, which may indicate command and control activity or defense evasion tactics on Windows systems.

Elastic Defend +1 defense-evasion command-and-control windows
2r 2t
medium advisory

Persistence via BITS Job Notify Cmdline

Adversaries can achieve persistence by abusing the Background Intelligent Transfer Service (BITS) SetNotifyCmdLine method to execute a program after a job finishes, leading to arbitrary code execution and system compromise.

Defender XDR +2 persistence bits windows
2r 1t
medium advisory

Google Workspace Suspicious Login Activity

Detect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.

Google Workspace initial-access privilege-escalation defense-evasion persistence gworkspace
3r 1t
high advisory

CVE-2026-3229 Integer Overflow in Certificate Chain Allocation

CVE-2026-3229 is an integer overflow vulnerability in certificate chain allocation affecting a Microsoft product, potentially leading to denial of service or arbitrary code execution.

integer_overflow certificate_chain denial_of_service code_execution cve
2r 1c
high advisory

Unusual Executable File Creation by a System Critical Process

The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.

Microsoft Defender XDR +3 defense-evasion execution windows
2r 1t
medium advisory

Okta Identity Provider Creation Detected

An adversary may create a rogue identity provider within Okta to establish persistence and potentially escalate privileges by impersonating legitimate users or bypassing multi-factor authentication.

Okta identityprovider persistence
3r 2t
high advisory

i18next-fs-backend Path Traversal Vulnerability

i18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.

i18next-fs-backend path-traversal i18next arbitrary-file-read arbitrary-file-write code-execution
2r 1t
high advisory

First Time Seen Account Performing DCSync

Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.

Active Directory credential-access privilege-escalation windows active-directory
2r 1t
medium advisory

Detecting Rare SMB Connections for Potential NTLM Credential Theft

This brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.

Elastic Defend +2 exfiltration credential-access windows smb ntlm
2r 2t
high advisory

CVE-2026-41445 KissFFT Integer Overflow leads to Heap Buffer Overflow

CVE-2026-41445 is a reported integer overflow vulnerability in the KissFFT library that could lead to a heap buffer overflow.

integer-overflow heap-overflow kissfft
1r 1t 1c
low advisory

Unusually High Mean of RDP Session Duration Detected by Machine Learning

A machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.

lateral-movement rdp machine-learning
3r 2t
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via elFinder Connector

Xerte Online Toolkits versions 3.15 and earlier are vulnerable to unauthenticated remote code execution due to a missing authentication check in the elFinder connector, allowing arbitrary file operations that can be chained with other vulnerabilities.

Xerte Online Toolkits CVE-2026-34413 xerte rce
2r 1t 1c
medium advisory

Windows Script Execution from Archive File

This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.

M365 Defender +2 execution windows scripting archive
2r 3t
medium advisory

Unusual Process Performing NewCredentials Logon

Anomalous NewCredentials logon events triggered by uncommon processes may indicate access token manipulation for privilege escalation.

privilege-escalation token-manipulation windows
2r 1t
low advisory

Unusual Group Name Accessed by User via Privileged Access Detection

A machine learning job detected a user accessing an uncommon group name for privileged operations, potentially indicating privilege escalation or unauthorized account manipulation on a Windows system.

privileged-access-detection privilege-escalation windows
2r 5t
medium advisory

Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability

A cross-site scripting (XSS) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) could allow attackers to execute arbitrary JavaScript within a user's session, potentially leading to unauthorized access to sensitive information.

Zimbra Collaboration Suite xss vulnerability zimbra
2r 1t 1c
high advisory

radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)

A command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.

radare2 command-injection CVE-2026-40517
2r 1t 1c
medium advisory

Potential Privilege Escalation via SUID/SGID Abuse on Linux

This rule detects potential privilege escalation attempts on Linux systems by identifying processes running with root privileges but initiated by non-root users, indicative of SUID/SGID abuse.

Elastic Defend privilege-escalation persistence suid sgid
2r 3t
high advisory

NocoBase SQL Injection via Missing Validation on Update Endpoint

A SQL injection vulnerability exists in nocobase plugin-collection-sql versions 2.0.32 and earlier due to missing validation on the sqlCollection:update endpoint, allowing attackers with collection management permissions to execute arbitrary SQL queries and exfiltrate data.

plugin-collection-sql sql-injection web-application nocobase
2r 1t
medium advisory

Nimiq Node Panic due to Invalid BLS Key

An unauthenticated peer can crash a Nimiq node by sending a malformed election macro block containing an invalid BLS voting key, leading to a denial of service.

nimiq-primitives denial-of-service nimiq bls
2r 3t
high advisory

Multiple Alerts in Different ATT&CK Tactics by Host

This rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.

threat-detection higher-order-rule
3r 3t
high advisory

Icinga Web Reflected XSS Vulnerability via Malformed Search Requests

A reflected cross-site scripting (XSS) vulnerability exists in Icinga Web versions 0.13.0 and earlier, allowing attackers to inject malicious JavaScript into a victim's browser through malformed search requests, potentially leading to arbitrary code execution within the Icinga Web context.

Icinga Web +1 xss web-application icinga
2r 1t
medium advisory

First Time Seen Remote Monitoring and Management Tool Execution

Detects the execution of previously unseen remote monitoring and management (RMM) tools or remote access software on compromised Windows endpoints, often leveraged for command-and-control, persistence, and execution of malicious commands.

Elastic Defend +101 remote-access rmm command-and-control persistence
3r
medium advisory

Executable File Creation with Multiple Extensions

Detection of executable files created with multiple extensions, a masquerading technique to evade defenses.

Elastic Defend +3 defense-evasion execution masquerading windows
2r 2t
high advisory

engramx vulnerable to CSRF enabling graph exfiltration and prompt injection

The engramx HTTP server, enabled by default and binding to 127.0.0.1:7337, is vulnerable to CSRF and prompt injection attacks, allowing a malicious website to exfiltrate the local knowledge graph and inject persistent prompt-injection payloads.

engramx csrf prompt-injection
2r 2t
high advisory

CVE-2026-31611: ksmbd Sub-Authority Validation Vulnerability

CVE-2026-31611 is a vulnerability in ksmbd, requiring at least three sub-authorities before reading sub_auth[2], potentially leading to unauthorized access or code execution.

cve-2026-31611 ksmbd smb vulnerability
2r 1t 1c
critical advisory

CVE-2026-31609 SMB Client Double-Free Vulnerability

CVE-2026-31609 is a critical double-free vulnerability in the SMB client, specifically within the smbd_free_send_io() function after smbd_send_batch_flush(), potentially leading to arbitrary code execution.

smb double-free cve-2026-31609 rce
2r 1c
high advisory

Credential Acquisition via Registry Hive Dumping

Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.

Elastic Endgame +6 credential-access registry-dump windows
2r 1t
high advisory

CoreDNS TSIG Authentication Bypass Vulnerability

CoreDNS versions prior to 1.14.3 are vulnerable to TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports, allowing unauthenticated network attackers to bypass authentication and potentially access TSIG-protected zone data or submit dynamic DNS updates.

coredns tsig authentication-bypass
2r 1t
high advisory

Azure AD Threat Intelligence Detection

This brief focuses on detecting unusual user activity and sign-in patterns flagged by Azure AD Threat Intelligence, which may indicate stealthy attacks, persistence attempts, privilege escalation, or initial access.

Azure Active Directory azuread threat-intelligence risk-detection
2r 1t
medium advisory

UAC Bypass via Windows Firewall MMC Snap-In Hijack

Attackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.

Windows uac-bypass privilege-escalation windows-firewall mmc
2r 2t
high advisory

Potential Process Injection via PowerShell

This detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.

Windows Defender Advanced Threat Protection process injection powershell defense evasion
2r 2t
high advisory

Multiple Alerts Involving a User Detection

This rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.

Elastic Security threat-detection higher-order-rule
2r 3t
low advisory

Spike in Number of Processes in an RDP Session

A machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.

lateral-movement threat-detection windows
2r 2t
low advisory

Windows Defender Disabled via Registry Modification

Attackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.

Windows Defender +1 defense-evasion windows registry modification
2r 3t
low advisory

Unusual Process Spawned by a Parent Process via Machine Learning

A machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.

defense-evasion lolbins windows machine-learning
2r 2t
high advisory

Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection

Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.

Windows defense-evasion privilege-escalation process-injection
2r 2t
medium advisory

Spoofing AD FS Signing Logs via Azure AD Hybrid Health Service

A threat actor can create a new, rogue AD Health ADFS service within Azure and then create a fake server instance, which can be leveraged to spoof AD FS signing logs without compromising on-prem AD FS servers.

Azure Active Directory +1 cloud azure adfs defense-impairment
2r 1t
high advisory

Renamed Automation Script Interpreter

Detects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.

Elastic Defend +1 defense-evasion masquerading autoit autohotkey kix32 windows
2r 1t
low advisory

Okta User Account Created

Detection of new user account creation in Okta, which could indicate malicious activity related to credential access.

Okta identity user-creation credential-access
2r 1t
medium advisory

Okta Security Threat Detected

This alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.

Okta identity threat-detection attack.command-and-control
2r 1t
medium advisory

Okta Admin Role Assignment Creation

Detection of new admin role assignments in Okta, potentially indicating privilege escalation or persistence attempts by malicious actors.

Okta identity privilege-escalation persistence
2r 1t
critical advisory

ksmbd Out-of-Bounds Write Vulnerability in QUERY_INFO (CVE-2026-31432)

CVE-2026-31432 is a critical out-of-bounds write vulnerability in ksmbd, specifically within the QUERY_INFO functionality when handling compound requests, potentially leading to code execution or denial of service.

ksmbd smb out-of-bounds write cve-2026-31432
2r 1c
high advisory

GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks

A vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.

GitPython code-execution git-hooks command-injection
2r 1t 1c
medium advisory

Curl or Wget Execution from Container Context

This rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.

Auditd Manager command-and-control execution container auditd linux
2r 2t
high advisory

BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery

A server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.

HyperChat ssrf vulnerability webserver
2r 1t 1c
medium advisory

Azure Authentication Method Change Detection

An attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.

Azure persistence privilege-escalation
2r 3t
medium advisory

AWS CloudTrail Logging Disabled or Modified

Detection of AWS CloudTrail being disabled, deleted, or updated by an adversary to impair defenses and evade detection.

AWS CloudTrail defense-impairment cloud
3r 1t
high advisory

Qualcomm Camera Sensor Memory Corruption Vulnerability

CVE-2025-47405 is a memory corruption vulnerability in Qualcomm products related to processing camera sensor input/output control codes with invalid output buffers, potentially leading to arbitrary code execution.

cve-2025-47405 memory corruption camera sensor qualcomm
2r 1c
medium advisory

AWS KMS Key Policy Updated via PutKeyPolicy

Detection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.

KMS cloud aws privilege-escalation defense-evasion
2r 2t
medium advisory

CVE-2026-34293: Unspecified Vulnerability in Microsoft Product

CVE-2026-34293 is an unspecified vulnerability affecting a Microsoft product, for which details are currently unavailable, posing a potential risk to affected systems.

cve vulnerability microsoft
2r 1c
low advisory

Unusual Remote File Directory Lateral Movement Detection

An Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.

lateral-movement machine-learning elastic
2r 2t
medium advisory

Suspicious WMIC XSL Script Execution

This rule detects suspicious execution of scripts via WMIC, potentially used for allowlist bypass, by identifying WMIC executions with atypical arguments and the loading of specific libraries like jscript.dll or vbscript.dll for defense evasion and execution.

Elastic Defend defense-evasion execution windows
2r 3t
medium advisory

ProblemChild ML Detection of Suspicious Windows Processes

The ProblemChild machine learning model has detected a user with suspicious Windows processes exhibiting unusually high malicious probability scores, potentially indicating defense evasion via masquerading or LOLbins.

defense-evasion windows machine-learning
2r 2t
medium advisory

Potential Ransomware Behavior - Note Files Dropped via SMB

This rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.

Elastic Defend ransomware impact lateral-movement windows
2r 4t
medium advisory

CVE-2026-31613 SMB Client Out-of-Bounds Read Vulnerability

CVE-2026-31613 is an out-of-bounds read vulnerability in the SMB client when parsing symlink error responses, requiring patching to prevent potential information disclosure or denial-of-service.

cve-2026-31613 smb out-of-bounds read vulnerability
2r 1t 1c
high advisory

Azure Privileged Identity Management (PIM) Invalid License Detection

Detection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).

Azure pim privileged-identity-management invalid-license
2r 1t
high advisory

Admidio Inverted 2FA Reset Allows Privilege Escalation

A logic error in Admidio's two-factor authentication reset inverts the authorization check, allowing non-admin users to remove other users' TOTP, including administrators, reducing their security to password-only authentication in versions 5.0.8 and earlier.

admidio 2fa bypass privilege-escalation
2r 2t
medium advisory

Detection of Sensitive LDAP Attribute Access

This rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.

Active Directory +1 credential-access privilege-escalation collection windows
2r 5t
high advisory

Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)

Cisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.

Catalyst SD-WAN Manager cve vulnerability cisco sd-wan
2r 1t 1c
high advisory

NetExec File Creation Detection

This brief covers the detection of NetExec, a post-exploitation and lateral movement tool, through monitoring for unique file creation patterns associated with its execution and file extraction in Windows environments.

netexec crackmapexec lateral-movement post-exploitation hacktool
2r 3t
medium advisory

Okta End-User Reports Suspicious Account Activity

An Okta end-user reports potentially suspicious activity on their account, indicating possible compromise or unauthorized access.

Okta identity suspicious-activity
2r 1t
medium advisory

Detect Suspicious Windows Service Installation

This detection identifies the creation of new Windows services with suspicious command values, often used for privilege escalation and persistence by malicious actors.

persistence privilege_escalation windows service_creation
2r 1t
low advisory

NLTEST.EXE Used for Domain Trust Discovery

Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.

Windows NT Domain discovery domain trust lateral movement windows
2r 2t
medium advisory

Windows Sandbox Abuse with Sensitive Configuration

This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.

Microsoft Defender XDR +4 defense-evasion windows-sandbox windows
3r 1t
high advisory

PowerShell Kerberos Ticket Request via KerberosRequestorSecurityToken

This rule detects PowerShell scripts that request Kerberos service tickets using KerberosRequestorSecurityToken, potentially indicating Kerberoasting attacks for offline password cracking of service accounts.

Elastic Security kerberoasting credential_access windows
2r 1t
medium advisory

PhpSpreadsheet XML Reader Denial of Service via Unbounded Row Index

PhpSpreadsheet is vulnerable to a denial-of-service attack by crafting a SpreadsheetML XML file with an excessively large row index, which exhausts server CPU resources due to unbounded iteration.

PhpSpreadsheet denial-of-service xml
2r 1t
medium advisory

Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation

Adversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.

Elastic Defend persistence defense-evasion execution windows dll-injection
2r 4t 5i
medium advisory

Azure Kubernetes Events Deleted

Adversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.

Azure Kubernetes Service azure kubernetes defense-evasion
2r 1t
low advisory

Uncommon Destination Port Connection by Web Server on Linux

The rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.

Elastic Defend persistence execution command-and-control web shell linux
2r 4t
high advisory

Detecting External RPC Traffic for Initial Access

This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.

Elasticsearch initial-access network rpc
2r 2t
high advisory

Microsoft Build Engine Started by an Office Application

The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.

Microsoft Build Engine +2 defense-evasion execution msbuild windows
2r 1t
high advisory

Potential Antimalware Scan Interface Bypass via PowerShell

This rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.

defense-evasion amsi powershell windows
3r 1t
medium advisory

Unauthorized Removal of Azure Conditional Access Policy

An unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.

Azure Active Directory azure conditional-access privilege-escalation credential-access persistence defense-impairment
2r 3t
medium advisory

Successful AWS Console Login Without MFA

Successful AWS console logins without multi-factor authentication can indicate compromised credentials, misconfigured security settings, or unauthorized access attempts.

AWS Management Console aws cloudtrail mfa initial-access
2r 1t
high advisory

PowerShell Share Enumeration via ShareFinder or Native APIs

Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.

PowerShell discovery share-enumeration lateral-movement ransomware
2r 1t
low advisory

Potential DGA Activity Detected by Machine Learning

A machine learning job detected potential DGA (domain generation algorithm) activity indicative of malware command and control (C2) channels, identifying source IP addresses making DNS requests with a high probability of being DGA-generated, a technique used by adversaries to evade detection.

dga command-and-control machine-learning
2r 2t
high advisory

Azure AD Activity From Anonymous IP Address

Detection of user activity originating from an IP address identified as an anonymous proxy, potentially indicating unauthorized access, privilege escalation, or persistence within an Azure Active Directory environment.

Azure Active Directory azuread anonymous-proxy identity-protection
2r 4t
medium advisory

Linux Service Stop and Disable Detection

Attackers may halt or disable security services on Linux systems to evade defenses, maintain persistence, or disrupt operations, detected through the use of utilities like 'systemctl', 'service', and 'chkconfig'.

attack.defense-evasion attack.t1562 attack.impact attack.t1489
3r 2t
high advisory

PowerShell Invoke-NinjaCopy Script Detection

The Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.

Windows credential-access powershell ninjacopy
2r 1t
high advisory

Windows EventLog Autologger Session Disabled via Registry Modification

Adversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.

Windows attack.defense-evasion attack.t1562.002
2r 1t
high advisory

Potential Local NTLM Relay via HTTP

Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.

Microsoft Defender XDR +1 ntlm-relay credential-access windows webdav
2r 1t
medium advisory

Multiple Logon Failure Followed by Logon Success

This rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.

Windows Security Event Logs credential-access brute-force windows
2r 1t
low advisory

Account Discovery Command via SYSTEM Account

The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.

Elastic Defend +5 discovery privilege-escalation windows
3r 3t
medium advisory

Suspicious WMI Image Load from MS Office

Adversaries may exploit Windows Management Instrumentation (WMI) to execute code stealthily, bypassing traditional security measures by loading `wmiutils.dll` from Microsoft Office applications, potentially indicating malicious execution.

WINWORD.EXE +4 wmi image load office execution
2r 1t
high advisory

Suspicious LSASS Access via Malicious Secondary Logon Service

An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.

Windows credential-access lsass seclogon
3r 1t
medium advisory

rustls-webpki Denial-of-Service Vulnerability via Malformed CRL BIT STRING

A denial-of-service vulnerability exists in rustls-webpki versions prior to 0.103.13 and between 0.104.0-alpha.1 and 0.104.0-alpha.7 due to a panic in `bit_string_flags()` when processing a malformed CRL BIT STRING, triggered when CRL checking is enabled and an attacker provides a crafted CRL.

rustls-webpki denial-of-service crl
2r 1t
medium advisory

Persistence via Scheduled Job Creation

This detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.

Microsoft Defender XDR +5 persistence windows
2r 1t
high advisory

OpenClaw MCP Loopback Token Spoofing Vulnerability

A vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.

openclaw vulnerability npm token spoofing
2r 1t
low advisory

Okta Group Lifecycle Change Spike Indicating Privilege Escalation

A machine learning job has identified an unusual spike in Okta group lifecycle change events, indicating potential privilege escalation activity, where adversaries may be altering group structures to escalate privileges, maintain persistence, or facilitate lateral movement within an organization’s identity management system.

privileged-access okta group-lifecycle
2r 4t
medium advisory

MSBuild Making Network Connections Indicating Potential Defense Evasion

MsBuild.exe making outbound network connections may indicate adversarial activity as attackers leverage MsBuild to execute code and evade detection.

MSBuild defense-evasion command-and-control
2r 2t
medium advisory

LSASS Process Access via Windows API

Detection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.

Microsoft Defender XDR +1 credential-access lsass windows
2r 2t
high advisory

liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)

A SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.

yu-picture sql-injection cve-2026-7060 web-application
2r 1t 1c
medium advisory

Linux Log Clearing Attempts via Common Utilities

Adversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.

defense-evasion log-clearing linux
3r 1t
high advisory

Contour HTTPProxy Lua Code Injection via Cookie Path Rewrite

Contour's Cookie Rewriting feature is vulnerable to Lua code injection; an attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in the `spec.routes[].cookieRewritePolicies[].pathRewrite.value` or `spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value` fields, resulting in arbitrary code execution in the Envoy proxy.

Contour lua code-injection httpproxy cve-2026-41246
2r 3t
low advisory

Unusual Source IP for Okta Privileged Operations Detected

A machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.

privileged-access okta machine-learning
2r 3t
medium advisory

Suspicious WerFault Child Process Abuse

This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.

Microsoft Defender XDR +2 defense-evasion persistence privilege-escalation masquerading
2r 3t
medium advisory

PowerShell Script Block Logging Disabled via Registry Modification

Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.

Defender XDR +2 defense-evasion powershell registry
2r 2t
medium advisory

Potential Timestomping of Executable Files on Windows

This rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.

Windows defense-evasion timestomp
2r 1t
high advisory

Potential LSASS Clone Creation via PssCaptureSnapShot

Detection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.

credential-access lsass process-injection
2r 1t
medium advisory

MSBuild Making Network Connections

Detection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.

MSBuild defense-evasion windows
2r 2t
high advisory

Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function

A path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.

kaggle-mcp path-traversal web-application cve
2r 1t 1c
medium advisory

IIS AppCmd Tool Used to Dump Service Account Credentials

Attackers with access to IIS web servers may use the AppCmd command-line tool to dump sensitive configuration data, including application pool credentials, potentially leading to lateral movement and privilege escalation.

IIS credential-access appcmd windows
2r 2t
high advisory

GitPython Command Injection Vulnerability

GitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.

GitPython command-injection vulnerability
2r 1t
critical advisory

Evolver Remote Code Execution via Command Injection in `_extractLLM()`

A command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.

@evomap/evolver command-injection rce evolver
2r 1t
medium advisory

Disabling Windows Defender Security Settings via PowerShell

Attackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.

Windows Defender defense-evasion powershell windows
2r 2t
medium advisory

Detection of Custom Shim Database Installation for Persistence

Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.

Windows +7 persistence app-compat shim
2r 1t
high advisory

Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)

Adversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.

defense-evasion ads rundll32 windows
2r 1t
medium advisory

CoreDNS DoH GET Query Denial-of-Service

CoreDNS is vulnerable to a denial-of-service attack where processing oversized DNS-over-HTTPS GET requests exhausts resources prior to returning an error.

CoreDNS cve dos
2r 1t
high advisory

rust-openssl Deriver::derive and PkeyCtxRef::derive Buffer Overflow Vulnerability (CVE-2026-41676)

CVE-2026-41676 is a buffer overflow vulnerability in rust-openssl's Deriver::derive and PkeyCtxRef::derive functions when used with OpenSSL 1.1.1, potentially leading to denial of service or arbitrary code execution.

rust-openssl openssl buffer overflow cve-2026-41676
2r 1c
high advisory

Royal Elementor Addons Plugin SSRF Vulnerability

The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.

Royal Elementor Addons <= 1.7.1057 wordpress ssrf cve-2026-6229 plugin
2r 1t 1c
high advisory

Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment

Exploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.

Struts 2 apache-struts webshell cve-2023-50164 initial-access persistence command-and-control
2r 3t 1c
low advisory

Suspicious PDF Reader Child Process Activity

Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.

Elastic Defend execution initial-access defense-evasion discovery
2r 13t
medium advisory

Detection of Downloaded URL Files Used in Phishing Campaigns

This detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.

Elastic Defend phishing execution url-file windows
2r 3t
high advisory

Detection of Wevtutil.exe Used to Disable Event Logs

The execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.

Splunk Enterprise +2 defense-evasion ransomware windows
2r 1t
low advisory

GitHub Repository Archive Status Changed

Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.

GitHub repository archive unarchive persistence impact defense-impairment
2r 3t
medium advisory

Unusual Service Host Child Process - Childless Service

This detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.

m365_defender +3 process_injection privilege_escalation defense_evasion windows
2r 2t
medium advisory

UAC Bypass via DiskCleanup Scheduled Task Hijack

Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.

Defender XDR +1 uac-bypass privilege-escalation windows diskcleanup scheduled-task
2r 3t
medium advisory

Process Execution from Suspicious Windows Directories

Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.

Windows +2 defense-evasion masquerading
2r 1t
medium advisory

Persistence via Malicious Microsoft Outlook VBA Template

Attackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.

Outlook persistence vba windows
2r 1t
medium advisory

Kubernetes Sensitive Role Creation or Modification

Detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs, potentially leading to privilege escalation or unauthorized access within the cluster.

Kubernetes rbac privilege-escalation persistence
2r 2t
medium advisory

Detection of Command and Control Activity via Commonly Abused Web Services

This rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.

OneDrive +7 command-and-control windows threat-detection
2r 2t
medium advisory

DCOM Lateral Movement via ShellWindows/ShellBrowserWindow

This analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.

Windows lateral-movement dcom
2r 2t
medium advisory

Abuse of Windows Update Client for DLL Loading

The Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.

Windows Auto Update Client defense-evasion execution lolbas windows
2r 3t
medium advisory

Disable Windows Event and Security Logs Using Built-in Tools

Attackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.

Microsoft Defender XDR +2 defense-evasion windows eventlog
3r 3t
medium advisory

Incoming Execution via PowerShell Remoting

This rule identifies remote execution via Windows PowerShell remoting, which allows a user to run any Windows PowerShell command on one or more remote computers, potentially indicating lateral movement.

Elastic Defend +2 lateral-movement powershell remoting
2r 2t
low advisory

Unusual Time or Day for an RDP Session Detected by Machine Learning

A machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.

lateral-movement threat-detection windows
2r 2t
high advisory

Azure PIM Account Stale Sign-in Alert

Detection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.

Azure Privileged Identity Management azure pim stale_account
2r 1t
medium advisory

Okta Session Hijacking via Multiple Device Token Hashes

Detection of multiple device token hashes and source IPs for a single Okta session, indicating potential session hijacking and unauthorized access to Okta resources.

okta session-hijacking credential-access
2r 2t
medium advisory

Process Activity via Compiled HTML File Execution

Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.

Microsoft HTML Help system +5 execution defense-evasion compiled-html windows proxy-execution
2r 5t
medium advisory

Azure Firewall Modification or Deletion Detected

An Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.

Azure firewall defense-evasion
2r 1t
medium advisory

Azure AD Bitlocker Key Retrieval

An adversary with sufficient privileges in Azure Active Directory may attempt to retrieve BitLocker keys to decrypt drives for lateral movement or data exfiltration.

Azure Active Directory azure bitlocker key-retrieval persistence privilege-escalation
2r 3t
high advisory

Azure PIM Elevation Approved or Denied

Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.

Azure pim privilege-escalation persistence
2r 3t
high advisory

Azure AD User Added to Global or Device Admin Role

An attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.

Azure Active Directory azuread role-assignment privilege-escalation persistence
2r 3t
high advisory

WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)

The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.

Drag and Drop File Upload for Contact Form 7 plugin wordpress file-upload rce plugin CVE-2026-5364
2r 1t 1c
high advisory

PowerShell P/Invoke Process Injection API Chain Detection

This analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.

PowerShell +3 process-injection pinvoke defense-evasion
2r 8t
high advisory

Kubernetes RBAC Wildcard Elevation on Existing Role

The rule detects when a Kubernetes Role or ClusterRole is patched or updated to grant wildcard verbs and resources, effectively granting cluster-admin-like privileges, which is often a deliberate privilege expansion and could indicate malicious activity.

kubernetes rbac privilege-escalation
2r 1t
medium advisory

Cisco 802.1X (dot1x) Disabled on Network Interface

Detection of manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface, potentially allowing unauthorized network access and lateral movement.

IOS attack.defense-evasion attack.persistence attack.credential-access attack.t1562.001 attack.t1556.004
2r 2t
high advisory

Azure PIM Role Activation Without MFA

Detection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.

Azure pim mfa privilege-escalation
2r 1t
medium advisory

Detection of Downloaded Shortcut Files

This rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.

Elastic Defend phishing lnk execution windows
2r 3t
medium advisory

Suspicious AWS SAML Activity Detection

This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.

AWS IAM +1 aws saml cloudtrail initial-access lateral-movement persistence privilege-escalation stealth
2r 3t
medium advisory

User Added to Group with Conditional Access Policy Modification Access

An attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.

Azure Active Directory attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 attack.t1556
3r 4t
medium advisory

Kubernetes Secret Access by Node or Pod Service Account

This rule detects Kubernetes audit events where a node or pod service account attempts to read secrets directly, which is often a sign of credential access.

kubernetes credential-access cloud
2r 1t
medium advisory

Symbolic Link Creation to Shadow Copies for Credential Access

Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.

Microsoft Defender XDR +3 credential-access defense-evasion windows
2r 3t
medium advisory

Outlook Security Settings Registry Modification

Attackers modify Outlook security settings via registry changes to enable malicious mail rules and bypass security controls, potentially leading to persistence and data compromise.

Microsoft Outlook persistence registry_modification outlook email
2r 1t
medium advisory

InstallUtil Process Making Network Connections for Defense Evasion

Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.

Elastic Defend +1 defense-evasion proxy-execution windows
2r 1t
high advisory

Browser Process Spawned from an Unusual Parent

Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.

Edge +4 credential-access windows browser-exploitation
2r 1t
medium advisory

Third-party Backup Files Deleted via Unexpected Process

This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.

Elastic Defend +5 impact backup deletion ransomware
2r 2t
medium advisory

Azure Network Firewall Policy Modification or Deletion

An adversary may modify or delete Azure Network Firewall Policies to impair defenses and potentially impact network security.

Azure Network Firewall attack.impact attack.defense-impairment attack.t1686.001
3r
critical advisory

Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)

Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.

FH303/A300 firmware cve-2018-25318 tenda dns-hijacking network
2r 1t 1c
low advisory

Suspicious Windows Process Cluster Detection via Machine Learning

A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.

defense-evasion masquerading LOLbins windows
2r 2t
high advisory

Suspicious PowerShell Script Using Cryptography Namespace

The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.

Splunk Enterprise +2 powershell cryptography malware asyncrat xworm vip keylogger
2r 1t
medium advisory

Suspicious Execution via Scheduled Task

This rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.

Windows persistence execution
2r 2t
high advisory

PowerShell Suspicious Payload Encoded and Compressed

Detects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.

Windows Defender Advanced Threat Protection defense-evasion powershell windows
2r 1t
high advisory

itsourcecode Electronic Judging System SQL Injection Vulnerability (CVE-2026-7555)

A remote SQL injection vulnerability (CVE-2026-7555) exists in itsourcecode Electronic Judging System 1.0 via manipulation of the Username argument in the /intrams/login.php file, potentially leading to unauthorized data access and modification.

Electronic Judging System 1.0 sql-injection vulnerability web-application
2r 1t 1c
high advisory

AWS GuardDuty Detector Deletion or Disablement

Attackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.

GuardDuty defense-impairment aws cloudtrail
3r
medium advisory

Potential Credential Access via LSASS Handle Duplication

Detection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.

Windows credential-access lsass duplicatehandle mirrordump
2r 1t
high advisory

Detect Application AppID URI Configuration Changes in Azure

Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.

Azure Active Directory azure appid uri application serviceprincipal credential-access privilege-escalation
2r 2t
high advisory

SeEnableDelegationPrivilege Assignment Detection

Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.

Active Directory credential-access persistence windows active-directory
3r 2t
low advisory

Windows Account Discovery of Administrator Accounts

Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.

M365 Defender +2 discovery account-discovery windows
2r 4t
medium advisory

Network Connection via Compiled HTML File

This rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.

HTML Help execution defense-evasion command-and-control malicious-file html-help
2r 3t
high advisory

Mimikatz MemSSP Log File Detection

This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.

Elastic Defend +3 credential-access mimikatz memssp windows
2r 1t 1i
high advisory

Long Base64 Encoded Command via Scripting Interpreter

Detection of oversized command lines used by Python, PowerShell, Node.js, or Deno interpreters containing base64 decoding or encoded-command patterns, indicating potential evasion and malicious execution.

Elastic Endpoint defense-evasion execution scripting-interpreter base64 command-line
2r 5t
medium advisory

Windows Subsystem for Linux Distribution Installed via Registry Modification

This rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.

Windows Subsystem for Linux +4 wsl defense-evasion windows
2r 3t
low advisory

Spike in Bytes Sent to an External Device via Airdrop

A machine learning job has detected a spike in bytes of data written to an external device via Airdrop, potentially indicating illicit data copying or transfer activities.

data-exfiltration macos airdrop
2r 1t
medium advisory

MSBuild запускает необычные процессы

Adversaries may exploit MSBuild to execute malicious scripts or compile code, bypassing security controls; this rule detects unusual processes initiated by MSBuild, such as PowerShell or C# compiler, signaling potential misuse for executing unauthorized or harmful actions.

MSBuild +3 defense-evasion execution
2r 3t
medium advisory

Malicious Azure Kubernetes Admission Controller Configuration

An adversary can exploit Kubernetes Admission Controllers in Azure to achieve persistence, privilege escalation, or credential access by manipulating webhook configurations.

azure kubernetes admission-controller persistence privilege-escalation credential-access
2r 4t
low advisory

High Command Line Entropy Detected for Privileged Commands on Linux

A machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.

privileged-access-detection machine-learning linux
2r 2t
high advisory

Detection of Invoke-Obfuscation via Standard Input

This brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.

Windows defense-evasion obfuscation powershell
2r 2t
medium advisory

Detection of Bcdedit Boot Configuration Modification

This rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.

Microsoft Defender XDR +2 boot-configuration bcdedit impact windows
2r 1t
high advisory

Azure AD Temporary Access Pass Added to Account

Detection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.

Azure Active Directory azuread temporary-access-pass privilege-escalation initial-access persistence
2r 4t
medium advisory

Azure AD Authentication to Important Apps Using Single-Factor Authentication

Detection of successful Azure AD authentications to critical applications that only required single-factor authentication, potentially indicating a security lapse or policy violation leading to unauthorized access.

Azure Active Directory attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 3t
high advisory

Adversaries Disabling Important Scheduled Tasks

Adversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.

Windows attack.impact attack.t1489
2r 1t
medium advisory

Detection of Azure Application Deletion

This alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.

Azure application deletion impact t1489
2r 1t
medium advisory

Remote File Download via PowerShell

Detects PowerShell being used to download executable files from untrusted remote destinations, a common technique for attackers to introduce tooling or malware into a compromised environment.

PowerShell command-and-control file-download windows
2r 2t
high advisory

Non-Firefox Process Accessing Firefox Profile Directory

This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.

Firefox +3 credential-access malware
2r 1t
medium advisory

Windows Time-Based Evasion via Choice Exec

Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.

Windows +3 time-based-evasion malware persistence defense-evasion
2r 1t
high advisory

Windows Service Security Descriptor Tampering via sc.exe

Adversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.

Splunk Enterprise +2 defense-evasion privilege-escalation windows
2r 2t
medium advisory

Windows Backup Deletion via Wbadmin

Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.

Microsoft Defender XDR +3 impact backup-deletion windows
2r 2t
low advisory

Unusual Remote File Extension Detected via Machine Learning

An Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.

lateral-movement machine-learning elastic
2r 2t
medium advisory

Unusual Network Activity from Windows System Binaries

Detection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.

Windows defense-evasion proxy-execution
3r 5t
high advisory

Suspicious Process Access via Direct System Call

Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.

EdgeWebView +4 defense-evasion execution windows
2r 3t
high advisory

Suspicious MSIExec Remote Download

The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.

Splunk Enterprise +3 endpoint msiexec remote-download windows
2r 2t
medium advisory

Suspicious Modification of Sensitive Linux Files

This threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.

file-integrity privilege-escalation persistence linux
3r 1t
medium advisory

Suspicious Enumeration Commands Spawned via WMIPrvSE

This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.

Elastic Defend +3 enumeration wmi discovery execution windows
2r 12t
high advisory

Suspicious Child Processes Spawned by WScript or CScript

Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.

Splunk Enterprise +2 wscript cscript lolbin malware defense-evasion
2r 3t
high advisory

Suspicious Antimalware Scan Interface DLL Creation

An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.

Microsoft Defender XDR +4 defense-evasion amsi-bypass dll-hijacking windows
2r 1t
low advisory

Spike in Special Privilege Use Events

A machine learning job detected an unusual increase in special privilege usage events on Windows, such as privileged operations and service calls, potentially indicating unauthorized privileged access and privilege escalation attempts.

privileged-access-detection privilege-escalation windows
2r 4t
high advisory

SourceCodester Hotel Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.

Hotel Management System 1.0 sqli vulnerability web application
2r 1t 1c
high advisory

Script Execution via Microsoft HTML Application

Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.

Windows +8 defense-evasion script-execution
3r 1t
high advisory

PowerShell Obfuscation via Concatenated Dynamic Command Invocation

This rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.

Elastic License v2 defense-evasion powershell obfuscation
2r 1t
high advisory

Potential Remote Credential Access via Registry

Detects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.

Elastic Defend credential-access lateral-movement windows
2r 2t
high advisory

Potential NTLM Relay Attack against a Computer Account

This rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.

Windows Security Event Logs credential-access ntlm-relay windows
2r
high advisory

Okta Alerts Following Unusual Proxy Authentication

Attackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.

Okta identity cloud initial-access
2r 1t
high advisory

Nsenter to PID Namespace via Auditd

This rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.

privilege-escalation linux container
2r 1t
low advisory

Machine Learning Detects High Bytes Written to External Device

A machine learning job has detected high bytes of data written to an external device, potentially indicating illicit data copying or transfer activities leading to data exfiltration over a physical medium such as USB.

data-exfiltration machine-learning endpoint
2r 1t
medium advisory

Execution of Persistent Suspicious Programs via Run Keys

This analytic identifies suspicious programs such as script interpreters, rundll32, or MSBuild being executed shortly after user logon, indicating potential persistence mechanisms abusing the registry run keys.

Elastic Defend persistence windows threat-detection
2r 8t
low advisory

Detection of Command and Control Activity via Common Web Services

This rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.

Elastic Defend +10 command-and-control webservice windows
2r 1t
high advisory

Detection of Azure Subscription Permission Elevation

Detection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.

Azure attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
high advisory

Conhost Proxy Execution for Defense Evasion

Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.

Elastic Defend +2 defense-evasion proxy-execution windows
3r 1t
medium advisory

Azure AD User Password Reset Detection

Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.

Azure Active Directory azure password-reset privilege-escalation initial-access persistence credential-access stealth
2r 1t
medium advisory

Azure AD Guest to Member User Type Conversion

An adversary may convert a guest user account to a member account in Azure Active Directory to elevate privileges and gain persistent access to resources.

Azure Active Directory privilege-escalation azure entra guest-account
2r 1t
medium advisory

AWS SES Identity Deletion

Detection of an AWS Simple Email Service (SES) identity deletion event, potentially indicating an adversary attempting to cover their tracks after malicious activity.

Simple Email Service attack.stealth attack.t1070 cloud
2r 1t
high advisory

AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity

This rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.

AWS CloudTrail +1 cloud aws kubernetes lateral-movement credential-access discovery
2r 4t
medium advisory

Attrib.exe Used to Hide Files and Directories

Detection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.

Splunk Enterprise +2 defense-evasion persistence windows
2r 1t
high advisory

Potential Shadow Credentials added to AD Object

This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.

Active Directory +2 credential-access shadow-credentials windows
2r 2t
high advisory

Detection of NetExec Hacktool Execution

The threat brief details the detection of NetExec (formerly CrackMapExec), a post-exploitation tool used for Active Directory penetration testing and network enumeration, often employed by threat actors for lateral movement and credential harvesting.

pentest post-exploitation lateral-movement active-directory
2r 2t
critical advisory

WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)

An unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.

Profile Builder Pro plugin php-object-injection wordpress plugin rce
2r 1t 1c
medium advisory

Windows Firewall Disabled via Netsh

Detection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.

Microsoft Defender XDR +1 defense-evasion windows firewall
2r 1t
high advisory

Unusual Process Loading Mozilla NSS/Mozglue Module

Detection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.

Firefox +9 defense-evasion anomaly windows
2r 1t
high advisory

System Restore Disabled via Registry Modification

Attackers may attempt to disable system restore via registry modifications through the command line to prevent recovery after malicious activity.

attack.impact attack.t1490
1r 1t
medium advisory

Suspicious Scripts in the Startup Directory

This rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.

Elastic Defend +1 persistence startup windows attack.persistence
2r 2t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.

Windows execution script-execution malware
2r 1t
medium advisory

Suspicious PowerShell Execution via Windows Script Host

Detection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.

Microsoft Defender XDR +2 initial-access execution windows powershell script
2r 4t
medium advisory

RDP (Remote Desktop Protocol) from the Internet

This rule detects network events indicative of RDP traffic originating from the internet, which poses a significant security risk due to its frequent exploitation as an initial access or backdoor vector.

command-and-control lateral-movement initial-access rdp
2r 3t 1c
high advisory

Nginx-UI SSRF Vulnerability via Cluster Node Proxy

Nginx-UI version 2.3.4 and earlier is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users to access internal services by manipulating cluster node configurations.

Nginx-UI ssrf web-application
2r 1t 1i
high advisory

Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting

This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.

gcloud +6 credential-access cloud cli token-harvesting
3r 2t
medium advisory

MSIExec Spawning Discovery Commands

Detection of msiexec.exe spawning discovery commands indicating potential reconnaissance activity by attackers for system information gathering and lateral movement.

Splunk Enterprise +2 msiexec discovery windows
2r 1t
medium advisory

Linux Cron File Creation for Persistence

An attacker may create new cron files in cron directories to establish persistence on a Linux system, potentially leading to privilege escalation and arbitrary code execution.

persistence privilege-escalation linux
2r 1t
high advisory

Invoke-Obfuscation via Clip.exe

The use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.

Windows defense-evasion execution obfuscation
2r 2t
low advisory

GitHub Self-Hosted Runner Configuration Changes Detected

Detection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.

GitHub Actions github self-hosted-runner audit-log devops supply-chain
3r 8t
high advisory

Excessive Global Administrator Accounts in Azure PIM

Detection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.

Azure pim global_admin privilege_escalation
2r 3t
high advisory

Detection of Python One-Liners with Base64 Decoding

This brief outlines a method to detect malicious use of Python one-liners employing base64 decoding to execute obfuscated payloads, a common tactic for evading traditional security measures.

attack.execution attack.defense-evasion attack.t1059.006 attack.t1027.010
2r 2t
high advisory

Detection of Privileged Identity Management (PIM) Settings Modifications

Detects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.

Azure Active Directory azure pim privilege-escalation persistence
2r 4t
medium advisory

Detection of Azure Service Principal Creation

Detects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.

Azure cloud service principal persistence lateral movement
3r 1t
medium advisory

Azure AD Successful Authentication Increase

This detection identifies a statistically significant (10% or greater) increase in successful sign-ins to Azure Active Directory, potentially indicating credential compromise or account takeover attempts.

Azure Active Directory attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
medium advisory

Azure AD Hybrid Health AD FS Service Deletion for Defense Evasion

Threat actors may delete Azure AD Hybrid Health AD FS service instances after using them to spoof AD FS signing logs for defense evasion.

Azure Active Directory attack.defense-impairment attack.t1578.003 azure
2r 1t
high advisory

AWS SecurityHub Findings Evasion via API Calls

Attackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.

AWS Security Hub aws cloud securityhub defense-evasion
3r 2t
high advisory

AWS Identity Center Identity Provider Modification

An adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.

AWS Identity Center cloud aws identity persistence credential-access defense-evasion
2r 1t
high advisory

AWS IAM User or Access Key Creation via S3 Browser

The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.

AWS IAM cloud aws iam privilege-escalation persistence
2r 2t
high advisory

Detecting RPC Traffic to the Internet

This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.

Elastic License v2 network-traffic initial-access lateral-movement rpc
2r 2t
medium advisory

Azure Service Principal Removal Detection

Detection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.

Azure service principal stealth cloud
2r 1t
high advisory

Proxy Execution via Windows OpenSSH Client

Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.

M365 Defender +2 defense-evasion proxy-execution openssh application-control-bypass
2r
medium advisory

Kubernetes Multi-Resource Discovery Reconnaissance

Adversaries may perform reconnaissance in a Kubernetes environment by rapidly querying multiple resource types to map the environment and identify potential privilege escalation paths.

kubernetes discovery reconnaissance
2r 1t
high advisory

Azure Application URI Configuration Modification

Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.

Azure Active Directory cloud azure application uri modification persistence credential-access privilege-escalation
3r 4t
low advisory

Windows User Account Creation via Net.exe

This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.

Microsoft Defender XDR +2 persistence user-account-creation windows
2r 2t
medium advisory

Unusual Network Connection via DllHost

The rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.

Elastic Defend +2 defense-evasion command-and-control windows
2r 2t
medium advisory

Unsigned DLL Side-Loading from Suspicious Folders by Trusted Processes

This detection identifies a Windows trusted program running from locations often abused by adversaries to masquerade as a trusted program and loading a recently dropped unsigned DLL, which indicates an attempt to evade defenses via side-loading a malicious DLL within the memory space of a signed process.

Elastic Defend defense-evasion dll-sideloading windows
2r 2t
medium advisory

Suspicious Process Writing to Startup Folder for Persistence

Adversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.

Microsoft Defender XDR +2 persistence startup windows
2r 1t
medium advisory

Suspicious PowerShell Engine ImageLoad

This rule identifies instances where the PowerShell engine is loaded by processes other than powershell.exe, potentially indicating attackers attempting to use PowerShell functionality stealthily by using the underlying System.Management.Automation namespace and bypassing PowerShell security features.

Elastic Defend powershell execution windows
2r 1t
medium advisory

Suspicious MSBuild Execution from Scripting Processes

Adversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.

MSBuild defense-evasion execution proxy-execution
2r 6t
medium advisory

Suspicious Execution via Microsoft Office Add-Ins

This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.

Microsoft Office +5 office-addins phishing initial-access
3r 3t
medium advisory

Suspicious Execution from a Mounted Device

Attackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.

Windows defense-evasion execution mounted-device
2r 9t
medium advisory

Suspicious CertUtil Commands Used for Defense Evasion

Attackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.

Windows defense-evasion command-and-control credential-access
2r 3t
medium advisory

Remote Execution via File Shares

This rule identifies the execution of a file that was created by the virtual system process, potentially indicating lateral movement via network file shares in Windows environments.

lateral-movement file-share windows
2r 2t
medium advisory

Remote Execution via File Shares

The rule identifies the execution of a file created by the virtual system process, potentially indicating lateral movement via network file shares, by detecting a sequence of file creation/modification followed by process execution, excluding trusted vendors.

Elastic Defend lateral-movement file-shares windows
2r 2t
medium advisory

Potential RemoteMonologue Attack via Registry Modification

This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.

MsMpEng.exe +4 remotemonologue defense-evasion persistence windows
2r 4t
medium advisory

Potential Defense Evasion via Filter Manager (fltMC.exe)

Adversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.

Defender XDR +3 defense-evasion filter-driver fltMC.exe windows
2r 1t
low advisory

MSBuild Process Injection Detection

The Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.

MSBuild defense-evasion privilege-escalation process-injection
2r 3t
medium advisory

Execution from Unusual Directory - Command Line

This rule identifies process execution from suspicious default Windows directories, which adversaries may abuse to hide malware in trusted paths to evade defenses.

Microsoft Defender XDR +1 execution defense-evasion windows process-execution
2r 2t
medium advisory

Detecting Remote Windows Service Installation for Lateral Movement

This rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.

Windows +4 lateral-movement persistence
2r 3t
high advisory

xmldom XML Injection Vulnerability

The xmldom package is vulnerable to XML injection. The package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. To address this applications that pass untrusted data to createDocumentType() or write untrusted values directly to a DocumentType node's publicId, systemId, or internalSubset properties should audit all serializeToString() call sites and add the option.

@xmldom/xmldom +1 xml-injection xxe dom xmldom
2r 1t
critical advisory

Xerte Online Toolkits Path Traversal Vulnerability

Xerte Online Toolkits 3.15 and earlier are vulnerable to relative path traversal, allowing attackers to move files and potentially achieve remote code execution.

Xerte Online Toolkits path-traversal remote-code-execution xss
2r 2t 1c
high advisory

WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106

Highland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.

Custom Role Manager plugin privilege-escalation wordpress cve
2r 1t 1c
medium advisory

WMI Incoming Lateral Movement

Detection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.

HPWBEM +3 lateral-movement wmi windows
3r 2t
low advisory

Windows USN Journal Deletion via Fsutil

Adversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.

Windows defense-evasion fsutil usn journal
2r 1t
medium advisory

Windows System Restore Disabled via Registry Modification

Attackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.

Windows impact t1490 persistence
2r 1t
medium advisory

Windows Subsystem for Linux Enabled via Dism Utility

Adversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.

Microsoft Defender XDR +2 defense-evasion wsl windows
2r 1t
medium advisory

Windows Script Interpreter Executing Process via WMI

The rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.

Sysmon windows wmi script_execution initial_access execution
2r 4t
medium advisory

Windows Scheduled Tasks AT Command Enabled via Registry Modification

Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.

Windows +5 defense-evasion persistence lateral-movement
2r 2t
medium advisory

Windows Root Certificate Modification Detection

The modification of root certificates on Windows systems by unauthorized processes can allow attackers to masquerade malicious files as valid signed components and intercept/decrypt SSL traffic, leading to defense evasion and data collection.

Elastic Defend +2 defense-evasion persistence root certificate mitm
2r 2t
high advisory

Windows Remote Desktop Network Bruteforce Attempt

This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.

Secure Access Firewall +3 rdp bruteforce credential-access windows network
2r 1t
medium advisory

Windows Netsh Tool Used for Firewall Discovery

The analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.

Splunk Enterprise +2 discovery windows netsh firewall
2r 1t
medium advisory

Windows Host Network Discovery Enabled via Netsh

Attackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.

Microsoft Defender XDR +3 defense-evasion windows firewall
2r 1t
medium advisory

Windows Firewall Disabled via PowerShell

Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.

Microsoft Defender XDR +3 defense-evasion powershell firewall windows
2r 2t
high advisory

Windows Files and Dirs Access Rights Modification via Icacls

Detection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.

Splunk Enterprise +2 defense-evasion persistence windows access-control
2r 1t
medium advisory

Windows Defender Exclusions Added via PowerShell

Adversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.

Microsoft Defender XDR +3 defense-evasion powershell windows
2r 3t
low advisory

Werfault ReflectDebugger Persistence via Registry Modification

Attackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.

Elastic Defend +1 persistence registry_modification werfault
2r 2t
critical advisory

WebPros cPanel & WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)

CVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel & WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

cPanel & WHM +1 cpanel whm wp2 wordpress authentication-bypass cve-2026-41940 initial-access
2r 1t 1c
critical advisory

Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability

Weaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.

E-office cve-2022-50993 file-upload webshell rce
2r 2t 1c
critical advisory

VM2 Sandbox Escape via __lookupGetter__ Vulnerability

VM2 is vulnerable to a sandbox breakout via the `__lookupGetter__` method, enabling attackers to execute arbitrary commands on the host system by exploiting context switching and property descriptor manipulation, leading to remote code execution.

vm2 sandbox-escape rce
3r 2t
medium advisory

User Removed from Group with Conditional Access Policy Modification Access

An attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.

Azure Active Directory azure conditional-access privilege-escalation
2r 3t
medium advisory

User Added to Privileged Group in Active Directory

Adversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.

Active Directory persistence privilege_escalation active_directory
2r 1t
low advisory

Unusual Windows Processes Connecting to Domains Using Free SSL Certificates

This rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.

MicrosoftEdge command-and-control encrypted-channel freessl
2r 1t 4i
low advisory

Unusual System Utilities Initiating Network Connections

Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.

Elastic Defend +1 defense-evasion proxy-execution windows
2r 3t
low advisory

Unusual Scheduled Task Update

This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.

Windows persistence scheduled-task
2r 1t
medium advisory

Unusual Process Connecting to Docker or Containerd Socket

An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.

Auditbeat +4 container privilege-escalation lateral-movement linux
2r 3t
low advisory

Unusual Persistence via Services Registry Modification

Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.

Microsoft Defender XDR +2 persistence windows registry modification
2r 3t
medium advisory

Unusual Parent Process for cmd.exe

The detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.

Elastic Defend +2 execution windows cmd.exe
2r 1t
medium advisory

Unused Privileged Identity Management (PIM) Roles in Azure

Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.

Azure pim privileged-identity-management role-based-access-control initial-access privilege-escalation
2r 1t
high advisory

Unsecured Outlook Credentials Access in Windows Registry

An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.

Outlook credential-access windows
2r 1t
medium advisory

Uncommon Registry Persistence Change Detection

This rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.

Windows persistence registry
2r 2t
medium advisory

Unauthorized Guest User Invitation Attempt in Azure

Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.

Azure privilege-escalation initial-access persistence stealth
2r 1t
medium advisory

Unauthorized Conditional Access Policy Creation in Azure AD

An unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.

Azure Active Directory azure conditional-access privilege-escalation attack.privilege-escalation attack.t1548
2r 1t
high advisory

Unauthorized Access to Chrome Local State File

Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.

Chrome +3 credential-access password-stealing
2r 1t
medium advisory

UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer

This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.

Microsoft Defender XDR +2 uac-bypass privilege-escalation com ieinstal
2r 3t
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

A remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.

A8000RU 7.1cu.643_b20200521 command-injection rce totolink
2r 1t 1c
critical advisory

Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)

A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.

HG3 2.0 300003070 command-injection router tenda
2r 1t 1c
low advisory

Suspicious Whoami Process Activity

This rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.

Microsoft Monitoring Agent +1 discovery windows threat-detection
2r 2t
low advisory

Suspicious Use of sc.exe for Remote Service Manipulation

The rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.

Elastic Defend lateral-movement windows sc.exe
3r 3t
high advisory

Suspicious SUID Binary Execution on Linux

This rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.

privilege-escalation suid linux
3r 2t
medium advisory

Suspicious SolarWinds Child Process Execution

Detection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.

Elastic Defend +3 supply-chain execution solarwinds
2r 2t
medium advisory

Suspicious SMB Connections via LOLBin or Untrusted Process

This rule identifies potentially suspicious processes, excluding those signed by Microsoft, making Server Message Block (SMB) network connections over port 445, which could indicate lateral movement attempts.

Elastic Defend lateral-movement smb windows
3r 1t
medium advisory

Suspicious Script Object Execution via scrobj.dll

Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.

Elastic Defend +3 defense-evasion execution windows
2r 2t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Adversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.

Windows attack.execution attack.t1059
2r 1t
high advisory

Suspicious Process Execution from Unusual File Paths

Attackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.

Splunk Enterprise +2 defense-evasion persistence windows
2r 2t
high advisory

Suspicious Process Accessing Sensitive Identity Files via Auditd

This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.

Elastic Agent Auditd Manager +4 credential-access linux auditd
3r 2t
medium advisory

Suspicious Network Connection via Registration Utility

The native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.

Windows execution defense evasion regsvr32
2r 4t
medium advisory

Suspicious MS Office Child Process

Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.

Microsoft Office +4 initial-access defense-evasion execution discovery windows
2r 18t
medium advisory

Suspicious Mofcomp Activity

This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.

Elastic Defend +4 execution persistence windows
2r 2t
medium advisory

Suspicious Modifications to Windows Security Support Provider (SSP) Registry

Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.

Microsoft Defender XDR +4 persistence defense-evasion registry-modification ssp
2r 2t
high advisory

Suspicious Microsoft Antimalware Service Executable Execution

Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.

Microsoft Antimalware Service Executable +6 defense-evasion execution windows
3r 1t
medium advisory

Suspicious LSASS Process Access

This rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.

Windows Defender +3 credential-access lsass windows
3r 1t
low advisory

Suspicious Image Load (taskschd.dll) from MS Office

Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.

Word +4 persistence execution windows image_load scheduled_task
2r 2t
medium advisory

Suspicious HTML File Creation Leading to Potential Payload Delivery

This detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.

Elastic Defend html-smuggling phishing initial-access windows evasion
3r 3t
low advisory

Suspicious Execution via Windows Subsystem for Linux

Adversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.

Elastic Defend +2 defense-evasion execution credential-access windows
2r 3t
medium advisory

Suspicious Execution from VS Code Extension

Malicious VS Code extensions can execute arbitrary commands, leading to initial access and subsequent payload deployment on Windows systems.

VS Code initial-access execution supply-chain-compromise vscode
2r 9t
medium advisory

Suspicious Endpoint Security Parent Process Detected

This rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.

Elastic Defend +2 defense-evasion process-injection windows
2r 2t
medium advisory

Suspicious Dynamic .NET Compilation via Csc.exe

Attackers may use csc.exe to compile .NET code on the fly to evade detection, often placing the compiler and source code in suspicious locations, which can be detected by monitoring process creation events.

.NET Framework defense-evasion dynamic-compilation csc.exe
2r 1t
medium advisory

Suspicious DNS Queries to RMM Domains from Non-Browser Processes

Detection of DNS queries to remote monitoring and management (RMM) domains from non-browser processes indicating potential misuse of legitimate remote access tools for command and control.

Elastic Endpoint +1 command-and-control remote-access windows
2r
medium advisory

Suspicious Copy from or to System Directory

This threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.

Windows defense-evasion lolbin
3r 1t
medium advisory

Suspicious AWS STS GetSessionToken Usage

The AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.

AWS CloudTrail aws cloud lateral-movement privilege-escalation sts GetSessionToken
2r 2t
medium advisory

Suspicious AWS EC2 Key Pair Creation from Non-Cloud AS

An AWS EC2 CreateKeyPair event triggered by a new principal originating from a network autonomous system (AS) organization not associated with major cloud providers, indicating potential unauthorized access or persistence activity.

Amazon EC2 aws ec2 keypair persistence credential_access lateral_movement
2r 3t
low advisory

Startup or Run Key Registry Modification

Attackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.

Elastic Defend +6 persistence registry runkey
3r 2t
medium advisory

SolarWinds Process Disabling Services via Registry Modification

A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.

Microsoft Defender XDR +1 solarwinds defense-evasion registry-modification supply-chain
2r 3t
medium advisory

Signed Proxy Execution via MS Work Folders

Attackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.

Windows Work Folders +3 defense-evasion masquerading windows
2r 3t
high advisory

Signal K Server WebSocket Login Brute-Force Vulnerability

The Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.

signalk-server credential-access brute-force websocket
1r 1t
medium advisory

Service Startup Type Modification via WMIC

Adversaries use the Windows Management Instrumentation Command-line (WMIC) utility to modify the startup type of services, setting them to 'Manual' or 'Disabled' to impair defenses or disrupt system operations.

Windows attack.execution attack.t1047 attack.defense-evasion attack.t1562.001
2r 2t
high advisory

Server-Side Request Forgery in mcp-data-vis

A server-side request forgery (SSRF) vulnerability exists in AlejandroArciniegas' mcp-data-vis due to improper handling of HTTP requests, potentially allowing remote attackers to make arbitrary requests through the vulnerable server.

mcp-data-vis ssrf vulnerability
2r 1t 1c
medium advisory

SeDebugPrivilege Enabled by a Suspicious Process

The rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.

Windows privilege-escalation token-manipulation
2r 1t
medium advisory

Schtasks Run Task On Demand

Detection of on-demand execution of Windows Scheduled Tasks via the schtasks.exe command-line utility, a common technique for persistence and lateral movement.

Splunk Enterprise +2 schtasks scheduled-task persistence execution
2r 1t
medium advisory

Scheduled Task Creation via Scripting

Detection of scheduled task creation by Windows scripting engines like cscript.exe, wscript.exe, or powershell.exe, used by adversaries to establish persistence on compromised systems.

Elastic Defend +1 persistence scheduled-task windows
3r 3t
high advisory

rust-openssl Stack Buffer Overflow Vulnerability

The rust-openssl crate is vulnerable to a stack-based buffer overflow (CVE-2026-41681) where the `EVP_DigestFinal()` function writes beyond the allocated buffer, potentially corrupting the stack, affecting versions >= 0.10.39 and < 0.10.78.

openssl buffer overflow rust vulnerability
2r
medium advisory

RMM Domain DNS Queries from Non-Browser Processes

Detects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.

Elastic Defend +9 command-and-control rmm dns
2r 75i
medium advisory

Renamed Utility Executed with Short Program Name

This rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.

Elastic Defend +1 defense-evasion masquerading windows
2r 1t
medium advisory

Remote Scheduled Task Creation via RPC

The creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.

Windows lateral-movement execution
2r 2t
medium advisory

Remote Management Access Launch After MSI Install

Detects an MSI installer execution followed by the execution of commonly abused Remote Management Software like ScreenConnect, potentially indicating abuse where an attacker triggers an MSI install then connects via a guest link with a known session key.

Microsoft Defender XDR command and control rmm msi windows remote access
2r
medium advisory

Remote File Download via Desktopimgdownldr Utility

The desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.

Microsoft Defender XDR +1 command-and-control file-download windows desktopimgdownldr
3r 1t
medium advisory

Remote File Copy to a Hidden Share

This rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.

Elastic Defend +2 lateral-movement data-staging windows hidden-share
2r 3t
medium advisory

Registry Persistence via AppInit DLL Modification

Modification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.

Microsoft Windows +6 persistence defense-evasion appinit-dlls registry windows
2r 2t
medium advisory

Registry Persistence via AppCert DLL Modification

Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.

Elastic Defend +3 persistence privilege-escalation appcert-dll
2r 2t
medium advisory

RDP Enabled via Registry Modification

An adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.

Microsoft Defender XDR +1 lateral-movement defense-evasion rdp registry-modification
2r 2t
medium advisory

Rare Connection to WebDAV Target via Rundll32

This rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.

Microsoft Defender XDR +2 credential-access webdav windows
2r 2t
high advisory

pyp2spec Code Injection Vulnerability

pyp2spec before 0.14.1 is vulnerable to code injection by writing PyPI package metadata into generated spec files without escaping RPM macro directives, allowing malicious packages to execute arbitrary commands on the build machine.

pyp2spec code-injection supply-chain rpm linux
3r 1t
high advisory

pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber

pygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.

pygeoapi ssrf ogc api cve-2026-42352 vulnerability cloud
2r 1t
high advisory

pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider

A path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.

pygeoapi path-traversal vulnerability webserver
2r 1t
low advisory

PsExec Lateral Movement via Network Connection

The rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.

Elastic Defend +1 psexec lateral-movement windows
2r 3t
medium advisory

Process Created with a Duplicated Token

This rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.

Windows privilege-escalation token-impersonation
2r 2t
high advisory

Privileged Identity Management (PIM) Alerting Disabled

An adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.

Azure pim alerts privilege-escalation persistence
2r 1t
high advisory

Print.exe Used to Dump Sensitive Files for Credential Access

Attackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.

Windows credential-dumping credential-access print.exe
2r 2t
high advisory

PowerShell Token Obfuscation via Process Creation

Adversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.

Windows defense-evasion token-obfuscation powershell
3r 1t
medium advisory

PowerShell Script with Encryption/Decryption Capabilities

PowerShell scripts employing .NET cryptography APIs are used to encrypt data for impact or decrypt payloads for defense evasion.

Elastic Endpoint Security +1 powershell encryption defense-evasion windows
2r 3t
high advisory

PowerShell P/Invoke API Chain for Process Injection

This brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.

PowerShell process-injection pinvoke
3r 7t
high advisory

PowerShell Obfuscation via String Concatenation

This rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.

PowerShell defense-evasion obfuscation windows
2r 1t
high advisory

PowerShell Obfuscation via Character Array Reconstruction

Detects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.

powershell obfuscation defense-evasion windows
2r 1t
high advisory

PowerShell MiniDump Script Detection

This brief detects PowerShell scripts that reference MiniDumpWriteDump or full-memory minidump types, potentially used to capture process memory from credential-bearing processes like LSASS.

PowerShell credential-access minidump windows
2r 1t
medium advisory

Potential Windows Error Manager Masquerading

Adversaries may masquerade malicious processes as legitimate Windows Error Reporting processes (WerFault.exe or Wermgr.exe) to evade detection by establishing network connections without arguments, thus blending into normal system activity.

Windows Error Reporting defense-evasion masquerading windows
2r 1t
medium advisory

Potential PowerShell Obfuscation via Special Character Overuse

This rule detects PowerShell scripts heavily obfuscated with whitespace and special characters, often used to evade static analysis and AMSI, by identifying scripts with low symbol diversity and a high proportion of whitespace and special characters.

powershell obfuscation defense-evasion windows
2r 3t
medium advisory

Potential Port Monitor or Print Processor Registration Abuse

This rule detects registry modifications indicative of privilege escalation and persistence attempts by adversaries abusing port monitors and print processors to execute malicious DLLs with SYSTEM privileges on Windows systems.

privilege-escalation persistence windows
2r 4t
medium advisory

Potential Persistence via Mandatory User Profile Modification

Adversaries may abuse Windows mandatory profiles by dropping a malicious NTUSER.MAN file containing pre-populated persistence-related registry keys to establish persistence, which can evade traditional registry-based monitoring.

Elastic Defend persistence windows mandatory-profile file-modification
2r 2t
medium advisory

Potential Masquerading as Communication Apps

Attackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.

Slack +9 defense-evasion masquerading windows
2r 3t
high advisory

Potential Machine Account Relay Attack via SMB

The rule identifies potential relay attacks against a machine account by detecting network share access events originating from a remote source IP but utilizing the target server's computer account, which may indicate an SMB relay attack.

Elastic License v2 credential-access smb-relay windows
2r 2t
medium advisory

Potential LSA Authentication Package Abuse

Adversaries can abuse the Local Security Authority (LSA) authentication packages by modifying the Windows registry to achieve privilege escalation or persistence by executing binaries with SYSTEM privileges.

Microsoft Defender XDR +1 privilege-escalation persistence windows
2r 2t
high advisory

Potential Kerberos Relay Attack via Coerced Authentication against a Computer Account

Detects potential Kerberos relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host, indicating an attacker has captured and relayed Kerberos authentication material to execute code on behalf of the compromised system.

kerberos relay credential_access windows
3r 1t 1c
medium advisory

Potential DNS Tunneling via NsLookup

Detection of multiple nslookup.exe executions with explicit query types from a single host, potentially indicating command and control activity via DNS tunneling, where attackers abuse DNS for data infiltration or exfiltration.

M365 Defender +2 dns-tunneling command-and-control windows
2r 2t
high advisory

Potential Credential Access via Windows Utilities

This rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.

Elastic Defend +2 credential-access defense-evasion windows
3r 3t
medium advisory

PhpSpreadsheet CPU Denial of Service via Unbounded Row Number

A vulnerability in PhpSpreadsheet exists where a crafted XLSX file containing a large row number can cause excessive CPU consumption due to unbounded loop iterations, leading to a denial of service.

PhpSpreadsheet denial-of-service xlsx php
2r 1t
medium advisory

Persistence via WMI Event Subscription

Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.

Microsoft Defender XDR +7 persistence execution windows wmi
2r 2t
medium advisory

Persistence via Visual Studio Tools for Office (VSTO) Add-ins

The Visual Studio Tools for Office (VSTO) add-ins can be abused by attackers to establish persistence in Microsoft Office applications by modifying registry keys.

Microsoft Office +1 persistence office vsto
2r 1t
critical advisory

Patreon OAuth Provider ID Collision Vulnerability in go-pkgz/auth

The Patreon OAuth provider in go-pkgz/auth and go-pkgz/auth/v2 maps every authenticated Patreon account to the same local user ID, leading to cross-account access, privilege confusion, and subscription-state leakage.

auth +1 authentication oauth id_collision vulnerability
2r 1t
high advisory

Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server

A path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.

matlab-mcp-server path-traversal web-vulnerability
2r 1t 1c
critical advisory

Pardus Software Center Path Traversal Vulnerability (CVE-2026-5166)

CVE-2026-5166 is a path traversal vulnerability affecting TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center before version 1.0.3, allowing attackers to bypass directory restrictions.

Pardus Software Center cve-2026-5166 path-traversal web-application
2r 1t 1c
high advisory

Outbound SMB Traffic Detection

This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.

Secure Firewall Threat Defense +4 network smb lateral-movement privilege-escalation
2r 1t
critical advisory

OpenMRS Stored Velocity SSTI to RCE via ConceptReferenceRange

OpenMRS is vulnerable to a Stored Velocity SSTI to RCE via ConceptReferenceRange, where the `ConceptReferenceRangeUtility.evaluateCriteria()` method evaluates database-stored criteria strings as Apache Velocity templates without a sandbox, allowing unrestricted Java reflection through template expressions, leading to persistent remote code execution and privilege escalation when a user with the `Manage Concepts` privilege stores a malicious Velocity template expression in a concept's reference range criteria field.

openmrs-api +1 ssti rce velocity openmrs
2r 2t
high advisory

OpenMRS ModuleResourcesServlet Path Traversal Vulnerability

OpenMRS Core versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, contain a path traversal vulnerability in the ModuleResourcesServlet, allowing an unauthenticated attacker to read arbitrary files from the server filesystem by manipulating the URL.

Tomcat +2 path-traversal information-disclosure openmrs
2r 1t
high advisory

OpenClaw Plugin Trust Verification Bypass via Environment Variable Override

OpenClaw before 2026.3.31 allows attackers with control over workspace configuration to inject malicious plugins by overriding the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable through workspace .env files, compromising plugin trust verification.

OpenClaw cve-2026-41396 environment-variable-override plugin-injection
2r 1t 1c
critical advisory

OpenCATS PHP Code Injection Vulnerability (CVE-2026-27760)

Unauthenticated attackers can exploit a PHP code injection vulnerability in OpenCATS versions prior to commit 3002a29 by injecting malicious PHP code into the installer's AJAX endpoint, leading to arbitrary code execution.

OpenCATS code-injection php cve-2026-27760
2r 1t 1c
medium advisory

Okta Unauthorized Application Access Attempt

This brief describes a detection for unauthorized application access attempts within an Okta environment, indicating a potential security breach or misconfiguration.

Okta attack.impact threat-type platform
3r
low advisory

Okta Policy Modification or Deletion Detected

An Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.

Okta Identity Cloud identity okta policy attack.impact
2r 1t
medium advisory

Okta MFA Reset or Deactivation Attempt

An attacker attempts to disable or reset multi-factor authentication (MFA) for a user account in Okta, potentially leading to unauthorized access and account compromise.

Okta Identity Cloud okta mfa credential-access persistence
2r 1t
medium advisory

Okta Group Privilege Change Spike via ML Detection

A machine learning job has identified an unusual spike in Okta group privilege change events, indicating potential privileged access activity where attackers might be elevating privileges by adding themselves or compromised accounts to high-privilege groups, enabling further access or persistence.

okta privilege-escalation machine-learning
2r 4t
low advisory

Okta Group Application Assignment Spike Indicates Privilege Escalation

A machine learning job identified a spike in Okta group application assignment changes, potentially indicating threat actors escalating privileges, maintaining persistence, or moving laterally by assigning applications to groups.

privileged-access privilege-escalation okta
2r 4t
high advisory

Okta FastPass Phishing Attempt Detection

Okta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.

Okta phishing fastpass
2r 1t
medium advisory

Okta Application Sign-On Policy Modified or Deleted

Attackers may modify or delete Okta application sign-on policies to weaken security controls, potentially leading to unauthorized access and data breaches.

Okta identity policy-tampering
2r 1t
medium advisory

Okta Application Modified or Deleted

Detects when an Okta application is modified or deleted, potentially indicating unauthorized changes or removal of critical applications.

Okta application-security identity-management
2r 1t
medium advisory

Okta API Token Revoked

Detection of Okta API token revocation events, indicating potential unauthorized access or compromise.

Okta api token revocation identity
2r 1t
medium advisory

Okta API Token Creation

Detection of Okta API token creation events which can indicate malicious persistence activity.

Okta Identity Cloud persistence okta
2r 1t
medium advisory

Office Application Autorun Registry Key Modification

Adversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.

Microsoft Office attack.privilege-escalation attack.persistence attack.t1547.001
2r 1t
medium advisory

NullSessionPipe Registry Modification for Lateral Movement

Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.

M365 Defender +3 lateral-movement defense-evasion registry-modification
3r 2t
critical advisory

Note Mark OIDC Authentication Bypass via Hardcoded Password

A critical authentication bypass vulnerability in note-mark allows attackers to authenticate as any OIDC-registered user by submitting the password 'null' to the internal login endpoint due to a hardcoded bcrypt hash fallback, potentially leading to account takeover and persistent access.

note-mark authentication-bypass credential-access ghsa
2r 1t
high advisory

Non-Chrome Process Accessing Chrome Login Data

This analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.

Chrome +3 credential-access password-stealing windows
2r 1t
critical advisory

NocoBase SQL Injection via Recursive Eager Loading

NocoBase versions 2.0.32 and earlier are vulnerable to SQL injection due to string concatenation in the `queryParentSQL()` function, allowing attackers with record creation permissions to inject arbitrary SQL and potentially extract sensitive information or execute commands.

NocoBase sqli cve-2026-41640 injection
2r 4t
high advisory

Newly Observed High Severity Detection Alert in Elastic SIEM

This rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.

SIEM threat-detection higher-order-rule elastic-siem
3r
medium advisory

New ActiveSync Allowed Device Added via PowerShell

The rule detects the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device, potentially allowing attackers to gain persistent access to sensitive email data by adding unauthorized devices.

Microsoft Defender XDR +4 exchange activesync powershell persistence
2r 3t
medium advisory

Network Logon Provider Registry Modification

Adversaries may modify the network logon provider registry to register a rogue network logon provider module for persistence and credential access by intercepting authentication credentials in clear text during user logon.

Defender XDR +3 credential-access persistence registry-modification
2r 2t
high advisory

n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay

A credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.

n8n credential-access authorization-bypass
2r 1t
medium advisory

Multiple Remote Management Tool Vendors on Same Host

This rule identifies Windows hosts where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.

AeroAdmin +60 remote-access-tool command-and-control rmm windows
2r
high advisory

Multiple Alerts in Same ATT&CK Tactic by Host

This rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.

Elastic Security threat-detection higher-order-rule attack
2r 4t
medium advisory

Mshta Making Network Connections Indicative of Defense Evasion

Mshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.

Amazon Assistant +3 defense-evasion system-binary-proxy-execution windows
2r 1t
medium advisory

MSBuild Started by System Process for Defense Evasion and Execution

Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.

Elastic Defend +3 defense-evasion execution msbuild proxy-execution windows
2r 2t
high advisory

MiroFish Command Injection Vulnerability (CVE-2026-7058)

A command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.

MiroFish command-injection vulnerability ipc
2r 1t 1c
high advisory

Microsoft IIS Connection String Decryption via aspnet_regiis

An attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.

IIS credential-access aspnet_regiis windows
3r 1t
medium advisory

Microsoft Defender Tampering via Registry Modification

Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.

Microsoft Defender XDR +4 defense-evasion registry-modification windows
2r 2t
medium advisory

Microsoft CVE-2017-3736 Vulnerability

CVE-2017-3736 is a vulnerability tracked by Microsoft, potentially leading to exploitation of affected systems.

vulnerability microsoft
2r
medium advisory

Microsoft Build Engine Executed After Renaming

Attackers may rename the Microsoft Build Engine (MSBuild) executable to evade detection and proxy execution of malicious code.

MSBuild defense-evasion execution masquerading
2r 2t
medium advisory

Microsoft 365 Suspicious Email Delivery

This brief outlines a threat where Microsoft Defender for Office 365 identifies an email as malicious or suspicious but still delivers it to a user's inbox or junk folder, potentially bypassing initial security measures.

Microsoft 365 suspicious-email phishing microsoft365
2r 2t
high advisory

MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name

MCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.

@samanhappy/mcphub path-traversal web-application mcphub
2r 2t
high advisory

mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)

An OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.

mcp-dnstwist command-injection vulnerability
2r 1t 1c
medium advisory

LSA PPL Protection Setting Modification via CommandLine

Attackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.

defense-evasion credential-access windows
2r 1t
low advisory

LOLBIN Network Connection for Defense Evasion

Adversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.

Elastic Defend +2 lolbin defense-evasion windows
2r 1t
high advisory

LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints

Authenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.

litellm rce command-injection
2r 1t
medium advisory

liquidjs Denial of Service via Circular Block Reference

A vulnerability in liquidjs versions prior to 10.25.7 allows for denial of service due to a circular block reference in the layout, causing an infinite recursive loop that exhausts memory and crashes the Node.js process.

liquidjs denial-of-service template-injection
2r 1t
high advisory

Kubernetes Secret Access with Suspicious User Agent

Detects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.

kubernetes credential-access cloud
2r 1t
high advisory

Kubernetes Rapid Secret GET Activity Against Multiple Objects

Detects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.

Kubernetes credential-access threat-detection
2r 1t
high advisory

Kirby CMS Missing Authorization Vulnerability

Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.

cms +1 authorization privilege-escalation web-application
3r 1t
high advisory

Kata Containers CopyFile Policy Subversion via Symlinks

An oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.

kata-containers/kata-containers kata-containers container-escape symlink
3r 2t 1c
high advisory

JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability

A server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.

mcp-chat-studio cve-2026-7147 ssrf
2r 1t 1c
high advisory

Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell

Attackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.

Windows defense-evasion execution powershell obfuscation
2r 2t
low advisory

Ingress Transfer via Windows BITS

Adversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.

Background Intelligent Transfer Service +2 bits ingress-transfer command-and-control defense-evasion windows
2r 2t
medium advisory

Incoming Execution via WinRM Remote Shell

This rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.

Elastic Defend +1 lateral-movement windows winrm remote-execution
2r 1t
medium advisory

i18next-http-middleware HTTP Response Splitting and DoS Vulnerability

i18next-http-middleware versions before 3.9.3 are vulnerable to HTTP response splitting and denial-of-service attacks due to unsanitized Content-Language headers, potentially leading to session fixation, cache poisoning, reflected XSS, or complete service disruption depending on the Node.js version.

i18next-http-middleware crlf-injection http-response-splitting denial-of-service i18next
2r 1t
medium advisory

Host File System Changes via Windows Subsystem for Linux

This rule detects file creation and modification on the host system from the Windows Subsystem for Linux (WSL), potentially indicating defense evasion by adversaries.

Elastic Defend +2 defense-evasion windows wsl
2r 2t
high advisory

Heimdall Authorization Bypass via Case-Sensitive URL-Encoded Slash Handling

Heimdall versions before 0.17.14 are vulnerable to inconsistent path interpretation due to case-sensitive handling of URL-encoded slashes; when `allow_encoded_slashes` is set to `off` (the default), the lowercase `%2f` is not recognized, potentially leading to authorization bypass if the default rule is overly permissive and the upstream service interprets `%2f` as a path separator.

Heimdall authorization-bypass url-encoding
2r 1t
high advisory

Heap/Stack Overflow in rust-openssl with OpenSSL 1.1.x

The rust-openssl crate's `Deriver::derive` and `PkeyCtxRef::derive` functions can cause heap/stack overflows when used with OpenSSL 1.1.x due to insufficient buffer length validation in X25519, X448, DH, and HKDF-extract, affecting rust-openssl versions >= 0.9.27 and < 0.10.78.

openssl buffer-overflow rust cryptography
2r
medium advisory

Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability

The Gravity Forms plugin for WordPress is vulnerable to unauthenticated stored cross-site scripting (XSS) in versions up to 2.10.0, allowing attackers to inject arbitrary JavaScript code into the product name field within repeater fields, which executes when an administrator views the affected entry.

Gravity Forms plugin <= 2.10.0 xss wordpress gravityforms
2r 1t 1c
medium advisory

GPO Scheduled Task or Service Creation/Modification

Detection of the creation or modification of new Group Policy based scheduled tasks or services, which can be abused by attackers with domain admin permissions to execute malicious payloads remotely on domain-joined machines, leading to privilege escalation and persistence.

Elastic Defend +2 group-policy privilege-escalation persistence windows
2r 3t
medium advisory

GPO Scheduled Task Abuse for Privilege Escalation and Lateral Movement

Attackers abuse Group Policy Objects by modifying scheduled task attributes to execute malicious commands across objects controlled by the GPO, potentially leading to privilege escalation and lateral movement.

group-policy scheduled-task privilege-escalation lateral-movement
2r 3t
medium advisory

GPO Modification to Add Startup/Logon Scripts

This rule detects the modification of Group Policy Objects (GPO) to add a startup or logon script to user or computer objects, enabling attackers to achieve privilege escalation and persistence by executing arbitrary commands at scale.

group-policy privilege-escalation persistence windows
2r 3t
medium advisory

GoBGP Remote Denial of Service via Malformed BGP UPDATE Message

A remote Denial of Service (DoS) vulnerability exists in GoBGP version 4.2.0 and earlier, where a malformed BGP UPDATE message can trigger a runtime error (index out of range panic), crashing the GoBGP process. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon, leading to a complete loss of routing capabilities.

GoBGP denial of service bgp network
2r 1t
medium advisory

GoBGP Remote Denial of Service via Malformed BGP Update Message

A denial-of-service vulnerability exists in GoBGP version 4.3.0 where a malformed BGP UPDATE message containing an unrecognized Well-known Path Attribute triggers a nil pointer dereference, causing the BGP daemon to crash.

GoBGP dos bgp routing
2r 1t
high advisory

GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)

A heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.

GnuTLS cve-2026-33846 dtls heap overflow network
2r 1t 1c
high advisory

Frequent Azure PIM Role Activation Detected

Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.

Azure pim role-activation privilege-escalation
2r 3t
high advisory

florensiawidjaja BioinfoMCP Path Traversal Vulnerability

A path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.

BioinfoMCP path-traversal web-application cve-2026-7398
2r 1t 1c
medium advisory

First Time Seen Driver Loaded

The rule identifies the load of previously unseen drivers, which may indicate attackers exploiting vulnerable drivers for privilege escalation and persistence.

Elastic Defend privilege-escalation persistence windows
2r 3t
medium advisory

Execution via Windows Subsystem for Linux

This detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.

Microsoft Defender XDR +3 defense-evasion execution windows wsl
2r 2t
medium advisory

Execution via Local SxS Shared Module

This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.

M365 Defender +4 execution defense-evasion dll-hijacking
2r 2t
medium advisory

Execution of a Downloaded Windows Script

This rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.

Elastic Defend execution windows scripting threat-detection
3r 7t
low advisory

Execution from Removable Media with Network Connection

Detects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.

Elastic Defend initial-access removable-media windows
2r 1t
high advisory

Executable or Script Creation in Temporary Paths

Adversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.

defense-evasion persistence privilege-escalation execution temp-directory file-creation
2r 1t
medium advisory

Exchange Mailbox Export via PowerShell

Adversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.

Microsoft Defender XDR +2 collection execution powershell exchange mailbox
2r 4t
medium advisory

Enumeration of Privileged Local Groups Membership

An unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.

Windows discovery privileged-access
2r 1t
medium advisory

Encoded Executable Stored in the Registry

This rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.

Elastic Defend +3 defense-evasion registry windows
2r 3t 1i
critical advisory

Electerm Command Injection Vulnerability via runLinux Function

A command injection vulnerability exists in electerm's install.js due to insufficient validation in the runLinux() function, allowing attackers to execute arbitrary commands by manipulating remote release metadata.

electerm command-injection npm
2r 1t
low advisory

DNS-over-HTTPS Enabled via Registry Modification

Detection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.

Edge +2 defense-evasion dns-over-https registry-modification
3r 2t
high advisory

Disabling LSA Protection via Registry Modification

Adversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.

Elastic Defend +3 defense-evasion windows registry
2r 1t
critical advisory

Dgraph Pre-Auth Full Database Exfiltration via DQL Injection

A pre-authentication DQL injection vulnerability in Dgraph's default configuration allows attackers to exfiltrate the entire database by crafting malicious JSON mutations to the `/mutate` endpoint, exploiting unsanitized language tags in predicates.

Dgraph dql-injection vulnerability
2r 6t
high advisory

Detection of Python Base64 Encoded Execution on Linux

This brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.

execution defense-evasion linux
2r 2t
medium advisory

Detection of Privileged Account Creation in Azure

Detects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.

Azure privileged-account initial-access persistence privilege-escalation
2r 3t
medium advisory

Detection of Out-of-Domain Email Forwarding in Google Workspace

Detects automatic email forwarding to external domains in Google Workspace, which may indicate data leakage or misuse by malicious insiders or compromised accounts.

Google Workspace data-leakage gworkspace email-forwarding
2r 1t
medium advisory

Detection of Okta Administrator Role Assignment to User or Group

Detects the assignment of an Okta administrator role to a user or group, potentially indicating privilege escalation or persistence attempts by malicious actors.

Okta privilege-escalation persistence
2r 1t
medium advisory

Detection of Obfuscated IP Addresses via Command Line Tools

The use of command-line tools like ping.exe or arp.exe with obfuscated IP addresses (hex, octal, etc.) in the command line can indicate reconnaissance activity or attempts to evade security controls by masking the true destination.

Windows reconnaissance evasion command-line
3r 1t
high advisory

Detection of Important Scheduled Task Deletion or Disablement

Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.

Windows attack.execution attack.privilege-escalation attack.persistence attack.t1053.005
2r 1t
medium advisory

Detection of Encrypted Archive Creation with WinRAR or 7-Zip

Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.

Defender XDR +2 collection archive exfiltration windows
2r 2t
medium advisory

Detect Suspicious WMI Event Subscription Creation for Persistence

This threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.

Elastic Defend persistence wmi windows event-subscription
2r 1t
medium advisory

Denial of Service Vulnerability in marked via Infinite Recursion

A denial of service vulnerability exists in marked version 18.0.0 due to infinite recursion when processing a specific 3-byte sequence (tab, vertical tab, and newline), leading to unbounded memory allocation and application crash.

marked denial-of-service javascript vulnerability
2r 1t
high advisory

Deletion of Critical Scheduled Tasks

Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.

Windows attack.impact attack.t1489
2r 1t
high advisory

CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine

CVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).

Chrome +1 type confusion v8 engine chromium cve-2026-7337
2r 1t 1c
medium advisory

CVE-2026-28390 NULL Dereference in CMS KeyTransportRecipientInfo Processing

CVE-2026-28390 is a vulnerability related to a possible NULL pointer dereference when processing CMS KeyTransportRecipientInfo, potentially leading to a denial-of-service condition.

vulnerability denial-of-service
2r 1c
medium advisory

CVE-2019-1547 ECDSA Remote Timing Attack Vulnerability

CVE-2019-1547 is a security vulnerability that could allow a remote timing attack.

cve-2019-1547 timing-attack ecdsa
2r
low advisory

Component Object Model (COM) Hijacking via Registry Modification

Adversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.

Elastic Defend +9 persistence com-hijacking windows registry defense-evasion privilege-escalation
2r 4t
high advisory

Command Obfuscation via Unicode Modifier Letters

Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.

Microsoft Defender XDR +5 defense-evasion command-line unicode obfuscation
2r 1t
medium advisory

Command Execution via ForFiles Utility

Adversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.

Microsoft Defender XDR +2 defense-evasion indirect-execution windows
2r 1t
high advisory

CKAN Unauthenticated SQL Injection in datastore_search_sql

An unauthenticated SQL injection vulnerability in CKAN's `datastore_search_sql` function allows attackers to access private resources and PostgreSQL system information, affecting versions prior to 2.10.10 and versions 2.11.0 through 2.11.4.

ckan sql-injection vulnerability
2r 1t
high advisory

Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability

A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.

Nexus 9000 Series Fabric Switches in ACI mode cve-2023-20185 information-disclosure network
2r 1t 1c
medium advisory

Chmod Activity Targeting Sensitive Linux Directories

Attackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.

defense-evasion privilege-escalation persistence linux
2r 1t
medium advisory

ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)

CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.

NextChat authorization cve-2026-7644 web-application
1r 1t 1c
high advisory

Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection

Beghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.

Sicuro24 SicuroWeb +1 cve-2026-41468 angularjs template-injection mitm
2r 1t 1c
high advisory

Azure Subscription Permission Elevation via Activity Logs

An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.

Azure privilege-escalation persistence initial-access stealth
2r 1t
medium advisory

Azure Owner Removed from Application or Service Principal

An adversary may remove an owner from an Azure application or service principal to weaken access controls, persist in the environment, or escalate privileges.

Azure attack.stealth
2r 1t
medium advisory

Azure AD User Added to Administrator Role

An adversary adds a user to an Azure Active Directory administrative role to gain initial access, persist in the environment, escalate privileges, and potentially operate stealthily.

Azure Active Directory attack.initial-access attack.persistence attack.privilege-escalation attack.stealth attack.t1098.003 attack.t1078
2r 4t
medium advisory

Azure AD MFA Disabled to Bypass Authentication

An adversary may disable multi-factor authentication (MFA) in Azure Active Directory to weaken an organization's security posture and bypass authentication mechanisms, potentially gaining unauthorized access to sensitive resources and maintaining persistence.

Azure Active Directory azure mfa credential-access persistence defense-impairment
2r 1t
high advisory

AWS VPC Flow Logs Deletion for Defense Evasion

An adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.

Elastic Compute Cloud cloud aws defense-evasion vpc flow-logs
2r 1t
high advisory

AWS STS GetFederationToken with AdministratorAccess in Request

Detection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.

AWS STS aws privilege-escalation lateral-movement sts getfederationtoken
2r 2t
medium advisory

AWS STS AssumeRole Misuse for Lateral Movement and Privilege Escalation

Abuse of AWS STS AssumeRole can allow attackers to move laterally within an AWS environment and escalate privileges, potentially leading to unauthorized access to sensitive resources and data.

AWS STS attack.lateral-movement attack.privilege-escalation attack.t1548 attack.t1550 attack.t1550.001
1r 2t
medium advisory

AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation

Successful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.

Amazon Web Services privilege-escalation aws iam
2r 2t
high advisory

AWS EC2 Stop, Start, and User Data Modification Correlation

Detection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.

EC2 aws user-data privilege-escalation persistence execution
3r 2t
high advisory

AWS EC2 Instance Profile Associated with Running Instance

An attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.

EC2 +1 aws privilege-escalation lateral-movement
2r 2t
high advisory

AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN

Detects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.

EKS +1 aws cloudtrail iam kubernetes initial-access web-identity
2r 1t
high advisory

Avo Framework Broken Access Control Vulnerability

Avo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.

avo broken-access-control privilege-escalation ruby
2r 1t
critical advisory

AstrBotDevs AstrBot Vulnerability Leads to Hardcoded Credentials (CVE-2026-7579)

CVE-2026-7579 describes a vulnerability in AstrBotDevs AstrBot up to version 4.16.0 where improper handling of the `auth.py` file in the dashboard component leads to hardcoded credentials being exposed, enabling remote exploitation.

AstrBot cve hardcoded-credentials web-application
2r 1t 1c
high advisory

ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)

A time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (<= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.

ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin <= 4.0.60 sql-injection wordpress armember cve-2026-7649
2r 1t 1c
high advisory

Arcane Unauthenticated Compose Template Content Disclosure

Arcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.

Arcane information-disclosure vulnerability
2r 1t
high advisory

Appsmith SQL Injection Vulnerability in FilterDataService

A SQL injection vulnerability exists in Appsmith's FilterDataServiceCE.java in versions 1.98 and earlier where the dropTable method constructs a SQL DROP TABLE statement using string concatenation with the table name, allowing arbitrary SQL command execution, leading to potential data loss, exfiltration, or modification.

interfaces sql-injection data-loss appsmith
2r 1t
high advisory

Aider-MCP Command Injection Vulnerability (CVE-2026-7316)

A command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.

aider-mcp command-injection vulnerability
2r 1t 1c
critical advisory

Actual Privilege Escalation via change-password Endpoint on OpenID-Migrated Servers

Any authenticated user can escalate to ADMIN on Actual servers migrated from password authentication to OpenID Connect by exploiting a lack of authorization checks, orphaned password rows, and client-controlled login methods, leading to full administrative privileges.

@actual-app/sync-server privilege-escalation web-application
2r 1t
low advisory

Active Directory Discovery via ADExplorer Execution

Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.

Microsoft Defender XDR +1 active-directory discovery reconnaissance windows
2r 5t
medium advisory

Account Configured with Never-Expiring Password

Detects the creation and modification of an account with the 'Don't Expire Password' option enabled, which attackers can abuse to persist in the domain and maintain long-term access.

Active Directory persistence windows account-manipulation
2r 1t
high advisory

666ghj MiroFish REST API Authentication Bypass (CVE-2026-7042)

A missing authentication vulnerability (CVE-2026-7042) exists in 666ghj MiroFish up to version 0.1.2, allowing remote attackers to bypass authentication via manipulation of the REST API Endpoint's create_app function.

MiroFish cve-2026-7042 authentication-bypass rest-api
2r 1t 1c
high advisory

Windows Proxy Execution of .NET Utilities via Scripts

Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.

Windows proxy-execution net-utility defense-evasion execution signed-binary-proxy-execution
2r 2t
low advisory

Unusual Process Spawned by a User Detected by Machine Learning

A machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.

endpoint windows defense evasion machine learning lolbins
2r 2t
medium advisory

Unusual Parent-Child Relationship Detection

This rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows process-injection masquerading access-token-manipulation parent-pid-spoofing
3r 4t
high advisory

Unusual Child Processes of RunDLL32 Execution Without Arguments

The execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.

Elastic Defend defense-evasion proxy-execution rundll32
2r 1t
medium advisory

Suspicious Process Execution via Renamed PsExec Executable

Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.

Elastic Defend +2 psexec lateral-movement execution defense-evasion windows
2r 3t
medium advisory

Suspicious Process Creation Followed by Memory Access from Unknown Region

The rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.

Office +2 defense-evasion process-injection windows
2r 1t
medium advisory

Suspicious Outbound Scheduled Task Activity via PowerShell

This rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.

Windows execution lateral-movement
2r 3t
high advisory

Suspicious DNS Queries to Telegram API by Non-Telegram Processes

Detection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.

Splunk Enterprise +2 telegram command-and-control dns windows
2r 2t 1i
medium advisory

Remote File Copy via TeamViewer

Attackers may abuse legitimate utilities such as TeamViewer to deploy malware interactively by remotely copying executable or script files during a TeamViewer session.

Elastic Defend +2 command-and-control remote-access teamviewer
2r 2t
low advisory

ProblemChild ML Model Detects Unusual Process on Windows Host

The ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.

defense-evasion lolbin windows machine-learning
2r 1t
high advisory

PowerShell Loading .NET Assemblies via Reflection

This analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.

PowerShell reflection dotnet memory-injection attack.execution attack.t1059.001
2r 1t
high advisory

PowerShell Execution via Environment Variables

Adversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.

Splunk Enterprise +2 powershell environment-variable invoke-expression execution
2r 1t
medium advisory

Potential Persistence via Time Provider Modification

Adversaries may establish persistence by registering and enabling a malicious DLL as a time provider by modifying registry keys associated with the W32Time service.

Windows +1 persistence privilege-escalation time-provider
2r 2t
medium advisory

Potential Application Shimming via Sdbinst

Attackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.

Windows +1 persistence privilege-escalation application-shimming
2r 2t
medium advisory

MpCmdRun.exe Used for Remote File Download

Attackers are abusing the Windows Defender MpCmdRun.exe utility to download remote files, potentially delivering malware or offensive tools into compromised systems.

Windows Defender command-and-control ingress-tool-transfer windows mpcmdrun
2r 1t
medium advisory

LSASS Loading Suspicious DLL

Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.

Windows credential-access lsass dll-injection
2r 2t 9i
high advisory

Logon Script Registry Modification for Persistence and Privilege Escalation

This brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.

Splunk Enterprise +2 persistence privilege-escalation windows
2r 2t
medium advisory

Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion

Attackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.

Elastic Defend +3 persistence defense-evasion registry ifeo windows
3r 2t
high advisory

IIS HTTP Logging Disabled via AppCmd

An attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.

Elastic Defend +3 defense-evasion iis httplogging appcmd windows
2r 1t
medium advisory

Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability

The Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0, allowing unauthenticated attackers to inject arbitrary web scripts via form submissions that execute when an administrator views the entry detail page.

Gravity Forms plugin xss wordpress gravityforms
2r 1c
high advisory

Executable or Script Creation in Suspicious Paths

This analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.

Windows defense-evasion persistence privilege-escalation execution
2r 1t
high advisory

Detects Kirbi File Creation

Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.

Microsoft Defender XDR +2 credential-access kerberos pass-the-ticket mimikatz rubeus
2r 1t
medium advisory

Detecting Remote Scheduled Task Creation for Lateral Movement

This rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.

Elastic Defend +2 lateral-movement execution windows scheduled-task
2r 2t
high advisory

CoreDNS Transfer Plugin ACL Bypass Vulnerability

CoreDNS' transfer plugin prior to version 1.14.3 can select the wrong ACL stanza due to lexicographic comparison, leading to unauthorized zone transfers by clients intended to be denied by subzone-specific transfer policies.

CoreDNS cve-2026-33489 acl-bypass dns zone-transfer
2r 1t
medium advisory

Adobe RdrCEF.exe Hijack for Persistence

Attackers can maintain persistence by replacing the legitimate RdrCEF.exe executable with a malicious one, which is executed every time Adobe Acrobat Reader is launched.

Acrobat Reader DC persistence adobe file_creation hijack_execution_flow
2r 2t
low advisory

Adding Hidden File Attribute via Attrib.exe

Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.

M365 Defender +4 defense-evasion persistence windows attrib.exe
2r 2t
high advisory

Azure Identity Protection Atypical Travel Anomaly

The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.

Azure Active Directory +1 azure identity-protection atypical-travel account-compromise credential-theft
2r 1t
medium advisory

Persistence via PowerShell Profile Modification

Attackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.

Microsoft Defender XDR +2 persistence powershell windows
2r 2t
critical advisory

OpenLearnX Remote Code Execution via Python Sandbox Escape

A critical RCE vulnerability in OpenLearnX allows for sandbox escape and arbitrary command execution in versions prior to 2.0.3.

openlearnx rce sandbox escape code injection
2r 1t
high advisory

Azure AD Privileged Role Assignment

Detection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.

Azure Active Directory azure privileged-access role-assignment
2r 2t
high advisory

Azure AD Account Created and Deleted Within a Close Time Frame

Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.

Azure Active Directory privilege-escalation persistence initial-access stealth account-manipulation
2r 3t
medium advisory

Account Password Reset Remotely

The rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.

Windows persistence impact
2r 2t
low advisory

Unusual Source IP for Windows Privileged Operations Detected via ML

A machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.

privileged-access-detection machine-learning windows
2r 2t
low advisory

Unusual Privilege Type Assigned to User via Machine Learning Anomaly

A machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.

privileged-access privilege-escalation windows
2r 4t
low advisory

Unusual Host Name for Windows Privileged Operations Detected via ML

A machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.

privileged-access-detection anomaly-detection windows
2r 2t
high advisory

Suspicious CSC.exe Parent Process

The Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.

Windows attack.execution attack.defense-evasion csc.exe payload-delivery
3r 3t
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

Elastic Defend +3 defense-evasion proxy-execution windows
2r 1t
medium advisory

Azure AD Failed Authentication Increase

Detects a significant increase (10% or greater) in failed Azure AD sign-in attempts, potentially indicating brute-force attacks, credential stuffing, or other unauthorized access attempts.

Azure Active Directory azuread brute-force credential-stuffing authentication
2r 1t
high advisory

Detection of Suspicious Inbox Manipulation Rules in Azure

This brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.

Azure attack.stealth attack.t1140
2r 2t
medium advisory

AWS Root Account Usage Detected

The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.

AWS CloudTrail cloud aws privilege-escalation initial-access persistence stealth
3r 3t
medium advisory

AWS S3 Bucket Deletion Detected via CloudTrail

An AWS S3 bucket deletion event was detected via CloudTrail logs, potentially indicating data loss or unauthorized access attempts.

S3 cloud aws data_loss
3r 1t
medium advisory

SMB (Windows File Sharing) Activity to the Internet

This rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.

initial-access exfiltration network
2r 2t
low advisory

Windows Delayed Execution via Ping Followed by Malicious Utilities

Adversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.

Windows execution defense-evasion ping lolbas
2r 14t
medium advisory

MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read Vulnerability (CVE-2026-7668)

MikroTik RouterOS 6.49.8 is vulnerable to an out-of-bounds read in the SCEP endpoint component, triggered by remote manipulation of the transactionID/messageType argument, potentially leading to denial of service or information disclosure.

RouterOS cve out-of-bounds read
2r 1t 1c
low advisory

First Time Seen Removable Device Registry Modification

Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.

Elastic Defend +2 initial-access exfiltration windows registry usb
2r 2t
high advisory

WScript or CScript Dropper

The WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.

Windows script-dropper file-creation
2r 2t
medium advisory

Windows Temporarily Scheduled Task Creation and Deletion

Detection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.

Windows persistence execution
2r 2t
low advisory

Windows Scheduled Task Creation for Persistence

Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.

OneDrive +5 persistence scheduled-task windows
3r 1t
low advisory

Windows Peripheral Device Discovery via fsutil

Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.

Microsoft Defender XDR +1 discovery windows fsutil
2r 1t
low advisory

Windows Event Logs Cleared

Attackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.

defense-evasion windows
2r 1t
medium advisory

Windows Audit Policy Sub-Category Disabled

This rule identifies attempts to disable auditing for security-sensitive audit policy sub-categories on Windows systems, often employed by attackers to evade detection and forensic analysis.

Windows Security Event Logs defense-evasion windows audit-policy
2r 3t
medium advisory

Windows Admin Account Brute Force Detection

This rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.

Windows Security Event Logs credential-access brute-force windows
2r 2t
high advisory

WeKan SSRF Vulnerability in Webhook Integration

WeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.

WeKan ssrf cve-2026-41455
2r 1t 1c
medium advisory

User Account ServicePrincipalName Attribute Modified

Detection of modifications to the servicePrincipalName attribute on user accounts, potentially exposing them to Kerberoasting attacks by allowing attackers to request Kerberos tickets for the account.

Active Directory kerberoasting credential-access windows spn
2r 2t
low advisory

Unusual Process Writing Data to an External Device via Machine Learning

A machine learning job detects a rare process writing data to an external device, potentially indicating data exfiltration masked by benign-looking processes.

data-exfiltration machine-learning elastic-defend
2r 1t
high advisory

Unusual Child Process from a System Virtual Process

A suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.

Elastic Defend +2 defense-evasion process-injection windows
2r 1t
medium advisory

Unauthorized Guest User Invitations in Azure AD

Detection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.

azure azuread guest-user privilege-escalation persistence initial-access
2r 3t
critical advisory

Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)

A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.

FH1202 1.2.0.14 cve-2026-7034 buffer-overflow router tenda
1r 1t 1c
critical advisory

Tenda F456 Remote Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 via manipulation of the 'page' argument in the fromDhcpListClient function of the /goform/DhcpListClient component, potentially leading to arbitrary code execution.

F456 cve-2026-7098 buffer-overflow router
2r 1t 1c
high advisory

TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)

A server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.

CloudBase-MCP SSRF CVE-2026-7221 TencentCloudBase
2r 1c
medium advisory

Suspicious Unshare Usage for Namespace Manipulation

The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.

Elastic Defend +3 privilege-escalation container-escape linux
2r 2t
medium advisory

Suspicious Unshare Usage for Container Escape and Privilege Escalation

The rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.

Elastic Defend for Containers privilege-escalation container-escape linux
2r 2t
medium advisory

Suspicious Svchost.exe Child Process: cmd.exe

Detection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.

execution windows process_injection privilege_escalation
2r 2t
medium advisory

Suspicious Remote Registry Access via SeBackupPrivilege

Detection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.

Windows credential-access lateral-movement
2r 3t
medium advisory

Suspicious RDP Client Image Load

The rule detects suspicious loading of the Remote Desktop Services ActiveX Client (mstscax.dll) from unusual locations, potentially indicating RDP lateral movement on Windows systems.

lateral-movement threat-detection windows
2r 1t
high advisory

Suspicious PowerShell Reconnaissance via WMI Queries

Detection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.

Splunk Enterprise +2 powershell wmi reconnaissance lateral_movement windows
2r 2t
high advisory

Suspicious Microsoft HTML Application Child Process

Mshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.

Windows +2 defense-evasion mshta process-creation
2r 1t
low advisory

Suspicious Local Scheduled Task Creation

This rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.

Elastic Defend persistence windows scheduled_task attack.persistence
2r 1t
medium advisory

Suspicious Inter-Process Communication via Outlook COM

Adversaries may target user email to collect sensitive information or send email on their behalf via API by abusing Outlook's Component Object Model (COM) interface from unusual processes.

Outlook email_collection com_abuse windows
2r 2t
medium advisory

Suspicious Explorer Child Process via DCOM

Adversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.

Microsoft Defender XDR +2 initial-access defense-evasion execution explorer.exe dcom
2r 9t
low advisory

Suspicious Command Prompt Network Connection

This alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.

Elastic Defend +7 command-prompt network-connection windows execution command-and-control
2r 4t
low advisory

Suspicious Access to LDAP Attributes

The rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.

Active Directory active_directory ldap discovery windows
2r 3t
medium advisory

Suspicious .NET Code Compilation via Unusual Parent Processes

Adversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.

Microsoft Defender XDR +3 defense-evasion compile-after-delivery windows
2r 3t
low advisory

Spike in Remote File Transfers via Lateral Movement

A machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.

lateral-movement machine-learning
2r 2t
medium advisory

SMB Registry Hive Exfiltration

Detection of medium-sized registry hive files being created or modified on Server Message Block (SMB) shares, potentially indicating exfiltration of Security Account Manager (SAM) data for credential extraction.

Elastic Defend credential-access lateral-movement exfiltration windows
2r 3t
low advisory

Service Control Executed from Script Interpreters

Detection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.

Elastic Defend +2 privilege-escalation defense-evasion execution windows service-creation
2r 8t
high advisory

S3 Browser Used to Create IAM Login Profiles

The S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.

AWS IAM aws cloud iam s3browser privilege-escalation persistence
2r 2t
high advisory

RustFS Notification Target Admin API Authorization Bypass

A vulnerability in RustFS allows a non-admin user to overwrite a shared admin-defined notification target, leading to event interception and audit evasion due to missing admin-action authorization on notification target admin API endpoints.

rustfs authorization-bypass ssrf event-interception
2r 3t
high advisory

Remote Registry Lateral Movement via RPC Firewall

This brief details detection of lateral movement attempts using remote RPC calls to modify the registry, potentially leading to code execution, detected via RPC Firewall logs.

lateral-movement defense-impairment persistence rpc
2r 3t
medium advisory

Potential Protocol Tunneling via Yuze

This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.

Defender XDR +2 command-and-control tunneling yuze proxy
2r 3t
high advisory

Potential Masquerading as Svchost

Attackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.

Windows defense-evasion masquerading
2r 1t
critical advisory

Potential Invoke-Mimikatz PowerShell Script

This rule detects the use of Invoke-Mimikatz or Mimikatz commands within PowerShell scripts to dump credentials, extract password stores, export certificates, or use alternate authentication material, indicating potential in-memory credential access.

winlogbeat-* credential-access mimikatz powershell
2r 1t
high advisory

Potential Credential Access via Renamed COM+ Services DLL

Detection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.

Windows credential-access defense-evasion
2r 3t 1i
high advisory

Potential Credential Access via MSBuild Loading Credential Management DLLs

The detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.

MSBuild +2 credential-access defense-evasion windows
2r 1t
medium advisory

Potential Credential Access via DCSync

This rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.

Azure AD Connect credential-access privilege-escalation windows active-directory
2r 3t
critical advisory

Pardus OS My Computer OS Command Injection Vulnerability (CVE-2026-6849)

CVE-2026-6849 is an OS Command Injection vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer versions <=0.7.5 before 0.8.0, allowing an attacker to execute arbitrary OS commands due to improper neutralization of special elements.

Pardus OS My Computer cve-2026-6849 os command injection pardus os
1r 1t 1c
high advisory

OpenRemote Improper Access Control Leads to Privilege Escalation

OpenRemote is vulnerable to privilege escalation, allowing an attacker with write:admin privileges in one Keycloak realm to gain administrator access to the master realm by manipulating Keycloak realm roles due to missing authorization checks in the updateUserRealmRoles function.

openremote-manager privilege-escalation access-control openremote
2r 1t
high advisory

OpenClaw Symlink Race Condition Allows Sandbox Escape

A time-of-check/time-of-use (TOCTOU) race condition in OpenClaw versions 2026.4.21 and earlier allows a symlink swap to redirect filesystem writes outside the intended sandbox mount root, potentially leading to arbitrary file modification.

openclaw sandbox-escape symlink race-condition npm
1r 1t
high advisory

Okta User Session Start via Anonymizing Proxy Service

Detection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.

Okta identity proxy defense-evasion
2r 1t
medium advisory

Okta User Account Lockout Detection

Detection of an Okta user account lockout, which may indicate brute-force attempts or other malicious activity targeting user accounts.

Okta identity account-lockout
2r 1t
low advisory

Okta Privileged Operations from Unusual Host Name Detected

A machine learning job detected a user performing privileged operations in Okta from an uncommon device, potentially indicating a compromised account or insider threat attempting privilege escalation.

privileged-access-detection okta machine-learning privilege-escalation
2r 2t
low advisory

Okta Group Membership Spike Detection

A machine learning job has identified an unusual spike in Okta group membership events, indicating potential privileged access activity where attackers or malicious insiders might be adding accounts to privileged groups to escalate their access, potentially leading to unauthorized actions or data breaches.

privileged-access privilege-escalation okta
2r 4t
high advisory

Nsenter Execution with Target Flag Inside Container

The rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.

Defend for Containers container privilege-escalation linux
2r 1t
medium advisory

Nimiq Block Skip Block Quorum Bypass Vulnerability

A vulnerability exists in Nimiq Block's SkipBlockProof verification process, allowing attackers to bypass quorum checks by manipulating MultiSignature signers with out-of-range indices, potentially compromising blockchain integrity, and affecting rust/nimiq-block versions 0.2.0 and earlier.

nimiq-block blockchain quorum bypass nimiq rust
2r 1t
medium advisory

Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall

Adversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.

Windows Firewall +4 defense-evasion lateral-movement windows netsh rdp
2r 2t
medium advisory

n8n Unauthenticated Denial of Service via MCP Client Registration

n8n is vulnerable to an unauthenticated denial of service (DoS) attack due to missing resource controls in the MCP OAuth client registration endpoint, allowing an attacker to exhaust server memory by sending large registration payloads, leading to service unavailability; this is resolved in versions 1.123.32, 2.17.4, and 2.18.1 and tracked as CVE-2026-42236.

n8n denial-of-service vulnerability
2r 1t
medium advisory

MyBB Recent Threads 17.0 Persistent Cross-Site Scripting Vulnerability (CVE-2018-25309)

MyBB Recent threads 17.0 contains a persistent cross-site scripting vulnerability (CVE-2018-25309) that allows attackers to inject malicious scripts by creating threads with crafted subject lines, leading to arbitrary JavaScript execution in the browsers of users viewing the index page.

Recent threads 17.0 xss cve-2018-25309 web-application
2r 1t 1c
medium advisory

Multiple Remote Management Tool Vendors on Same Host

This detection identifies a Windows host where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.

AeroAdmin +55 command-and-control rmm windows threat-detection
3r
medium advisory

Msiexec Arbitrary DLL Execution

Adversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.

Windows defense-evasion proxy-execution msiexec
2r 1t
medium advisory

MS Office Macro Security Registry Modifications

Attackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.

Microsoft Office office macro registry defense-evasion windows
2r 2t
medium advisory

Mounting of Hidden or WebDav Remote Shares via Net Utility

Adversaries may leverage the `net.exe` utility to mount WebDav or hidden remote shares, potentially indicating lateral movement, data exfiltration preparation, or initial access via discovery of accessible shares.

Elastic Defend +2 lateral-movement data-exfiltration windows
2r 4t
high advisory

Modification of WDigest Security Provider

The rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.

Windows +2 credential-access registry-modification
2r 1t
high advisory

MLOps_MCP Path Traversal Vulnerability (CVE-2026-7213)

A path traversal vulnerability exists in ef10007 MLOps_MCP version 1.0.0, allowing a remote attacker to manipulate the 'filename/destination' argument in the 'save_file Tool' component's 'fastmcp_server.py' file.

MLOps_MCP 1.0.0 path-traversal web-application cve-2026-7213
2r 1t 1c
medium advisory

Microsoft IIS Service Account Password Dump via AppCmd

An attacker with IIS web server access via a web shell can extract service account passwords by requesting full configuration output or targeting credential-related fields using the AppCmd tool.

IIS credential-access appcmd windows
2r 2t
medium advisory

Masquerading Business Application Installers

Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.

Elastic Defend +22 masquerading defense-evasion initial-access malware windows
2r 4t
medium advisory

LSASS Memory Dump Handle Access Detection

This rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.

Windows credential-access lsass memory-dump
2r 1t
medium advisory

LSASS Memory Dump Creation Detection

This rule identifies the creation of LSASS memory dump files, often indicative of credential access attempts using tools like Task Manager, SQLDumper, Dumpert, or AndrewSpecial, by monitoring for specific filenames and excluding legitimate dump locations.

Elastic Defend +4 credential_access lsass memory_dump windows
2r 1t
high advisory

locize Client SDK Cross-Origin DOM XSS and Handler Hijack Vulnerability

The locize client SDK versions prior to 4.0.21 are vulnerable to cross-origin DOM XSS and handler hijack due to missing origin validation in the InContext Editor, allowing attackers to inject malicious code and exfiltrate data via crafted postMessage events.

locize client SDK xss dom-xss postMessage locize javascript
2r 1t
high advisory

Kubernetes Secrets Enumeration from Non-Loopback Client

Detection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.

kubernetes credential-access discovery cloud
2r 2t
high advisory

Impossible Travel Detection in Azure AD

This brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.

Azure Active Directory azuread identity-protection impossible-travel account-compromise lateral-movement
2r 1t
medium advisory

High Number of Process and/or Service Terminations Detected

A high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.

Elastic Defend impact defense-evasion windows
2r 2t
high advisory

Heimdall Host Matching Case-Sensitivity Vulnerability

Heimdall performs case-sensitive host matching, which can lead to policy bypass because HTTP hostnames are case-insensitive, potentially leading to unauthorized access, data modification, or privilege escalation if the request host is part of the rule.

heimdall defense-evasion policy-bypass access-control
2r 1t
high advisory

Heimdall Authorization Bypass via Path Normalization Mismatch

Heimdall is vulnerable to an authorization bypass due to a path normalization mismatch between Heimdall and downstream components, potentially leading to unauthorized access and privilege escalation.

heimdall authorization-bypass path-normalization cloud
2r 2t
critical advisory

Gotenberg ExifTool Argument Injection via Metadata Values

Gotenberg version 8.30.1 and earlier is vulnerable to argument injection, where an unauthenticated attacker can inject arbitrary ExifTool pseudo-tags via newline characters in metadata values, leading to arbitrary file manipulation within the container filesystem.

Gotenberg <= 8.30.1 argument-injection vulnerability container
2r 1t
high advisory

GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)

A command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.

GitPilot-MCP command-injection web-application cve
2r 1t 1c
high advisory

geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)

A path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.

filesystem-mcp-server path-traversal web-application cve-2026-7400
2r 1t 1c
medium advisory

File with Right-to-Left Override Character (RTLO) Created/Executed

This rule detects the creation or execution of files or processes with names containing the Right-to-Left Override (RTLO) character, which can be used to disguise the file extension and trick users into executing malicious files on Windows systems.

Elastic Defend +2 defense-evasion rtlo masquerading windows
2r 2t
high advisory

FastlyMCP Command Injection Vulnerability (CVE-2026-7220)

A command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.

FastlyMCP command-injection cve-2026-7220 fastly-mcp
2r 1t 1c
critical advisory

ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution

The ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.

ExactMetrics – Google Analytics Dashboard for WordPress wordpress plugin rce cve-2026-5464 exactmetrics
2r 4t 1c
critical advisory

ELBA5 5.8.0 Remote Code Execution Vulnerability

ELBA5 version 5.8.0 contains a remote code execution vulnerability (CVE-2018-25272) that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions, potentially leading to complete system compromise.

ELBA5 5.8.0 rce database credential-access cve-2018-25272 elba5
2r 3t 1c
medium advisory

Disabling Windows Defender Security Settings via PowerShell

Attackers use PowerShell commands like Set-MpPreference or Add-MpPreference, often with base64 encoding, to disable or weaken Windows Defender security settings in order to evade detection and execute malicious payloads.

Windows Defender defense-evasion powershell windows
3r 2t
medium advisory

Disabling User Account Control via Registry Modification

Attackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows
2r 3t
medium advisory

Detection of Office Macro File Creation

This brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.

Microsoft Office initial-access phishing macro
2r 1t
high advisory

Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)

Adversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.

Windows Subsystem for Linux +4 defense-evasion windows wsl kalilinux
2r 1t
medium advisory

Detecting Suspicious Scheduled Task Creation in Windows

This rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.

Windows Security Event Logs +8 persistence scheduled_task windows
2r 1t
medium advisory

Detecting Execution from Alternate Data Streams

Adversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.

M365 Defender +1 defense-evasion windows alternate data stream
2r 1t
high advisory

Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)

Detect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.

Detect-It-Easy path-traversal vulnerability archive-extraction
2r 1t 1c
high advisory

D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd

A buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.

DIR-825 buffer-overflow cve miniupnpd d-link
2r 1t 1c
high advisory

CVE-2018-0735 ECDSA Signature Generation Timing Attack

CVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.

ecdsa timing-attack cryptography
2r 1t 1c
medium advisory

CVE-2017-3735 Vulnerability Targeting Microsoft Products

CVE-2017-3735 is a vulnerability impacting Microsoft products, potentially allowing unauthorized access or code execution.

vulnerability microsoft cve-2017-3735
2r 1t 1c
high advisory

Creation or Modification of Domain Backup DPAPI Private Keys

Detection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.

Elastic Defend +2 credential-access dpapi domain-controller
3r 1t
medium advisory

Code Signing Policy Modification Through Registry

Attackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.

Elastic Defend +2 defense-evasion registry-modification code-signing
2r 2t
critical advisory

CI4MS Theme Upload Zip Slip Vulnerability

A critical vulnerability exists in ci4ms Theme::upload, where improper validation of ZIP archive entry names allows authenticated users with theme creation permissions to write files to arbitrary locations, leading to remote code execution.

ci4-cms-erp/ci4ms zip-slip rce codeigniter vulnerability
2r 2t
high advisory

choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)

The choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.

simple-openstack-mcp command-injection vulnerability openstack
3r 1t 1c
high advisory

Budibase XSS Leads to Account Takeover via JWT Theft

The `budibase:auth` cookie in Budibase is set without the `httpOnly` flag, enabling attackers with XSS to steal JWTs and gain persistent access to user accounts.

Budibase xss account takeover jwt cookie
2r 1t
medium advisory

Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability

The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.

Brizy – Page Builder plugin <= 2.8.11 wordpress xss unauthenticated
2r 1t 1c
high advisory

BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)

A server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.

BuildingAI ssrf cve-2026-7065 web-application
2r 1t 1c
high advisory

Azure PIM - Role Assignment Outside of Privileged Identity Management

Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.

Azure Active Directory azure pim role-assignment attack.initial-access attack.stealth attack.t1078 attack.persistence attack.privilege-escalation
2r 4t
medium advisory

Azure Domain Federation Settings Modified

An attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.

Azure Active Directory azure federation privilege-escalation persistence initial-access
2r 2t
high advisory

AWS GuardDuty IP Set Manipulation for Defense Impairment

An attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.

AWS GuardDuty defense-impairment aws
2r 1t
medium advisory

AWS Config Service Disabling Detection

Detection of AWS Config Service disabling, potentially indicating an attempt to impair defenses by stopping configuration recording and delivery.

AWS Config +1 attack.defense-impairment attack.t1562.008 aws
2r 1t
medium advisory

Algovate xhs-mcp Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability exists in Algovate xhs-mcp 0.8.11 within the xhs_publish_content function, allowing a remote attacker to manipulate the media_paths argument and potentially access internal resources.

xhs-mcp 0.8.11 SSRF algovate xhs-mcp
2r 1t 1c
medium advisory

Xwizard COM Object Execution for Defense Evasion

Adversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.

Microsoft Defender XDR +2 execution defense-evasion com-object xwizard windows
2r 2t
medium advisory

Windows Privilege Escalation via Secondary Logon Service

The rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.

Windows privilege-escalation access-token-manipulation
2r 2t
medium advisory

Suspicious MS Outlook Child Process

Detection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.

Microsoft Outlook +3 initial-access phishing malware windows
2r 3t
medium advisory

Remote Execution of Windows Services via RPC

Detection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.

SCCM lateral-movement execution windows
2r 2t
high advisory

PowerShell Obfuscation via Backtick-Escaped Variable Expansion

PowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.

windows +1 powershell obfuscation defense-evasion variable-expansion
2r 1t
critical advisory

Pipecat Remote Code Execution via Pickle Deserialization in LivekitFrameSerializer

A critical vulnerability, CVE-2025-62373, exists in Pipecat's LivekitFrameSerializer where the deserialize() method uses Python's pickle.loads() on WebSocket data without validation, allowing a malicious WebSocket client to execute arbitrary code on the Pipecat server if LivekitFrameSerializer is explicitly enabled.

pipecat-ai remote code execution deserialization pipecat
2r 1t 1c 1i
medium advisory

Large ICMP Traffic Detection

This analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.

Splunk Enterprise +4 network-traffic command-and-control data-exfiltration
2r 1t
medium advisory

Impact of Poor Security Operation Center (SOC) Metrics

Poorly chosen performance metrics can significantly impair a SOC's ability to detect and respond to threats, leading to ineffective security operations and potential compromise.

SharePoint soc metrics threat-hunting detection
2r 2t
low advisory

High Variance in RDP Session Duration Detected via Machine Learning

A machine learning job has detected unusually high variance of RDP session duration, potentially indicating lateral movement and session persistence by threat actors.

lateral-movement threat-detection windows
2r 2t
medium advisory

Execution via GitHub Actions Runner

Adversaries compromising GitHub Actions workflows can execute arbitrary commands on runner hosts, leading to code execution, reconnaissance, credential harvesting, or network exfiltration.

github-actions supply-chain execution devops
3r 3t
high advisory

NTDS or SAM Database File Copied

Detects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.

Microsoft Defender XDR +2 credential-access windows ntds sam credential-theft
2r 1t
high advisory

Detection of IIS HTTP Logging Disabled via AppCmd.exe

This analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.

Splunk Enterprise +3 iis logging defense-evasion windows
2r 2t