Type
Pillow Out-of-Bounds Write Vulnerability in PSD Processing (CVE-2026-42311)
2 rules 1 TTP 1 CVEPillow versions 10.3.0 through 12.1.1 are vulnerable to an out-of-bounds write in PSD image decoding/encoding due to an integer overflow when computing tile extent sums, potentially leading to arbitrary code execution.
Argo Workflows Credentials Exposed in Pod Logs
2 rules 1 TTP 1 CVEArgo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.
Argo Workflows Template Referencing Restriction Bypass
3 rules 2 TTPs 1 CVEArgo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.
Argo Workflows Webhook Interceptor Vulnerable to Unauthenticated Memory Exhaustion (CVE-2026-42294)
2 rules 1 TTPArgo Workflows is vulnerable to a denial-of-service (DoS) attack due to unbounded memory allocation in the Webhook Interceptor component.
Gotenberg ExifTool Tag Blocklist Bypass via Group-Prefixed Tag Names
2 rules 1 TTPGotenberg is vulnerable to an ExifTool tag blocklist bypass, allowing unauthenticated attackers to rename, move, and modify permissions of files within the container by using group-prefixed tag names like 'System:FileName' or the 'FilePermissions' tag in HTTP requests.
Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability
2 rules 1 TTP 1 CVEThe Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.
Arelle Unauthenticated Remote Code Execution Vulnerability
2 rules 1 TTP 1 CVEArelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.
WordPress Easy PayPal Events & Tickets Plugin Information Disclosure Vulnerability
2 rules 1 TTP 1 CVEAn information disclosure vulnerability in the Easy PayPal Events & Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.
WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAn unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.
BusyBox DHCPv6 Client Heap Buffer Overflow Vulnerability (CVE-2026-29004)
2 rules 2 TTPs 1 CVEA heap buffer overflow vulnerability in BusyBox's DHCPv6 client allows network-adjacent attackers to trigger memory corruption, denial of service, or arbitrary code execution via crafted DHCPv6 responses.
OpenMRS Module Upload Path Traversal Vulnerability
2 rules 1 TTPOpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.
Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters
2 rules 2 TTPsQuarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.
Qualcomm PLC FW Buffer Overflow via Incorrect Authorization (CVE-2026-25293)
2 rules 2 TTPs 1 CVECVE-2026-25293 is a critical buffer overflow vulnerability in Qualcomm PLC FW due to incorrect authorization, potentially allowing unauthorized access and control over programmable logic controllers.
NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)
2 rules 1 TTP 1 CVENetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.
Qualcomm Driver IOCTL Memory Corruption Vulnerability
2 rules 1 TTP 1 CVEA memory corruption vulnerability, CVE-2025-47408, exists in Qualcomm drivers when another driver calls an IOCTL with an invalid input/output buffer, potentially leading to code execution or denial of service.
Memory Corruption Vulnerability in Digital Signal Processor (CVE-2025-47407)
2 rules 1 TTP 1 CVECVE-2025-47407 describes a memory corruption vulnerability affecting the digital signal processor due to allocation failure at the kernel level, potentially leading to arbitrary code execution with elevated privileges on affected systems.
Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise
2 rules 2 TTPs 2 IOCsA widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.
Potential PowerShell Obfuscated Script via High Entropy
2 rules 3 TTPsThis detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.
Windows Port Forwarding Rule Addition via Registry Modification
2 rules 3 TTPsAn adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.
Suspicious Zoom Child Process Execution
2 rules 6 TTPsA suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.
Suspicious Windows PowerShell Arguments Detected
3 rules 4 TTPsThis rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.
Suspicious Execution via Windows Command Debugging Utility
2 rules 2 TTPsAdversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.
SIP Provider Modification for Defense Evasion
2 rules 1 TTPThis rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.
Service DACL Modification via sc.exe
2 rules 2 TTPsDetection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.
Remote Desktop File Opened from Suspicious Path
2 rules 2 TTPsAdversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.
Potential WSUS Abuse for Lateral Movement via PsExec
2 rules 2 TTPsAdversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.
Potential WPAD Spoofing via DNS Record Creation
2 rules 1 TTPDetection of a Windows DNS record creation event (5137) with an ObjectDN attribute containing 'DC=wpad', which indicates a potential WPAD spoofing attack to enable privilege escalation and lateral movement.
Potential Secure File Deletion via SDelete Utility
2 rules 2 TTPsThis rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.
Potential Remote File Execution via MSIEXEC
2 rules 3 TTPsThe rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.
Potential Pass-the-Hash (PtH) Attempt Detection
2 rules 1 TTPThis rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.
Potential NetNTLMv1 Downgrade Attack via Registry Modification
2 rules 2 TTPsThis brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.
Potential Evasion via Windows Filtering Platform Blocking Security Software
2 rules 2 TTPsAdversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.
Potential DLL Side-Loading via Trusted Microsoft Programs
2 rules 2 TTPsThis rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.
Potential Data Exfiltration via Rclone
2 rules 3 TTPsAttackers are abusing the legitimate file synchronization tool rclone, often renamed to masquerade as legitimate software, to exfiltrate data to cloud storage or remote endpoints.
Potential Computer Account NTLM Relay Activity
2 rules 2 TTPsDetection of potential NTLM relay attacks targeting computer accounts by identifying authentication events originating from hosts other than the account's owner, indicating possible credential theft and misuse.
Potential Active Directory Replication Account Backdoor
2 rules 2 TTPsAttackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.
Potential Account Takeover - Logon from New Source IP
2 rules 1 TTPThe rule identifies a user account that normally logs in with high volume from one source IP suddenly logging in from a different source IP, potentially indicating account takeover or use of stolen credentials from a new location.
Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement
2 rules 4 TTPsAdversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.
Enumerating Domain Trusts via DSQUERY.EXE
2 rules 2 TTPsAdversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.
Detection of VScode Remote Tunneling for Command and Control
2 rules 1 TTPThe rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.
Command Shell Activity Started via RunDLL32
2 rules 4 TTPsThis rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.
Code Signing Policy Modification Through Built-in Tools
2 rules 1 TTPAttackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.
AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)
2 rules 1 TTP 1 CVECVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.
Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)
2 rules 1 TTP 1 CVEA privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.
SambaBox OS Command Injection Vulnerability (CVE-2026-3120)
2 rules 1 TTP 1 CVESambaBox versions 5.1 to before 5.3 are vulnerable to OS command injection via improper control of code generation (CVE-2026-3120), potentially allowing attackers with high privileges to execute arbitrary commands on the underlying system.
Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration
2 rules 2 TTPsA remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.
Rancher Vulnerability Allows Remote Code Execution and File Manipulation
2 rules 2 TTPsAn authenticated, remote attacker can exploit a vulnerability in Rancher to execute arbitrary program code and manipulate files, potentially leading to privilege escalation and system compromise.
OPNsense Multiple Vulnerabilities Leading to Remote Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.
Langflow Multiple Vulnerabilities Allow Code Execution
2 rules 1 TTPAn authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.
Multiple Vulnerabilities in Progress Software MOVEit Automation
2 rules 2 TTPsMultiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.
Totolink N300RH Buffer Overflow Vulnerability in setWanConfig
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.
Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.
libexif Vulnerability Allows Code Execution
2 rules 2 TTPsA local attacker can exploit a vulnerability in libexif to potentially execute arbitrary code, cause a denial of service, or disclose sensitive information.
GNU InetUtils Multiple Vulnerabilities Allow Code Execution and Information Disclosure
2 rules 2 TTPsMultiple vulnerabilities in GNU InetUtils allow a remote attacker to execute arbitrary code and disclose sensitive information.
Grafana Multiple Vulnerabilities Leading to XSS and Information Disclosure
2 rules 1 TTPMultiple vulnerabilities in Grafana allow a remote, anonymous attacker to conduct a Cross-Site Scripting attack or disclose information.
XZ Utility Vulnerability Allows Remote Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.
MariaDB Vulnerability Allows Denial of Service and Potential Code Execution
2 rules 2 TTPsA remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.
Tegsoft Online Support Application Reflected XSS Vulnerability (CVE-2025-14320)
2 rules 1 TTP 1 CVECVE-2025-14320 is a reflected cross-site scripting (XSS) vulnerability in Tegsoft Online Support Application versions V3 through 31122025, allowing attackers to inject arbitrary web scripts into user browsers.
Multiple Vulnerabilities in Rapid7 Velociraptor
2 rules 3 TTPsMultiple vulnerabilities in Rapid7 Velociraptor could allow an attacker to disclose information or cause a denial of service.
osrg GoBGP Integer Underflow Vulnerability
2 rules 1 TTP 1 CVEosrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.
GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability
2 rules 1 CVEA remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.
Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)
2 rules 1 TTP 1 CVEFunadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.
Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEShandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.
Totolink WA300 Buffer Overflow Vulnerability (CVE-2026-7719)
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Totolink WA300 version 5.2cu.7112_B20190227 within the loginauth function of the /cgi-bin/cstecgi.cgi file, specifically affecting the POST Request Handler component, triggerable via manipulation of the http_host argument, and remotely exploitable with a publicly available exploit.
YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)
2 rules 1 TTP 1 CVEYunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.
Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach
2 rules 4 TTPs 5 CVEsMultiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.
AV Stumpfl Pixera Two Media Server Code Injection Vulnerability
2 rules 1 TTP 1 CVEA remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.
Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.
Acrel ECEMS SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.
Microsoft Product Vulnerability CVE-2026-37555
2 rules 1 CVECVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.
Microsoft CVE-2026-30656 Information Published
1 CVEMicrosoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.
Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.
Edimax BR-6208AC Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Edimax BR-6208AC devices (<= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.
NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)
2 rules 1 TTP 1 CVEThe NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.
code-projects Online Hospital Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.
WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion
2 rules 1 TTP 1 CVEThe WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.
Potential Chroot Container Escape via Mount
2 rulesThe rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.
Chroot Execution in Container Context on Linux
2 rules 1 TTPDetects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.
Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability
2 rules 1 TTP 1 CVEThe Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.
Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification
2 rules 3 TTPs 1 CVEThe Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)
2 rules 1 TTP 1 CVEThe Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)
2 rules 1 TTP 1 CVEA time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (<= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.
OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)
2 rules 1 TTP 1 CVEA remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.
Zyosoft School App Insecure Direct Object Reference Vulnerability
2 rules 3 TTPs 1 CVEZyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.
Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)
2 rules 3 TTPs 1 CVEA privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.
Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)
2 rules 1 TTP 1 CVESunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.
TRENDnet TEW-821DAP Firmware Update Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in TRENDnet TEW-821DAP version 1.12B01, allowing a remote attacker to execute arbitrary code by manipulating the 'str' argument in the auto_update_firmware function of the Firmware Update component.
WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)
2 rules 1 TTP 1 CVEThe Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.
Gravity Forms Plugin Stored XSS Vulnerability (CVE-2026-5113)
2 rules 2 TTPs 1 CVEThe Gravity Forms plugin for WordPress is vulnerable to stored cross-site scripting (XSS) via Consent field hidden inputs, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the entries list page.
WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation
2 rules 1 TTP 1 CVEThe WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.
WordPress Import and Export Users Plugin Privilege Escalation Vulnerability
2 rules 1 TTP 1 CVEA privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.
WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability
2 rules 1 TTP 1 CVEThe User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.
CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation
2 rules 1 TTP 1 CVEThe 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.
Expanding Detection Beyond Endpoints to Counter Evolving Threats
3 rules 6 TTPsThreat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.
GenAI Tools Accessing Sensitive Files for Credential Access and Persistence
2 rules 4 TTPsThis threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.
libssh2 Integer Overflow Vulnerability (CVE-2026-7598)
2 rules 1 TTP 1 CVEAn integer overflow vulnerability exists in libssh2 versions up to 1.11.1 within the userauth_password function of src/userauth.c, which can be triggered remotely by manipulating username_len/password_len arguments.
Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.
Flux159 mcp-game-asset-gen Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.
AWS SSM Session Manager Child Process Execution Abuse
2 rules 3 TTPsAdversaries abuse AWS Systems Manager (SSM) Session Manager to gain remote execution and lateral movement within AWS environments by spawning malicious child processes from the SSM session worker, leveraging legitimate AWS credentials and IAM permissions.
AWS IAM Privilege Operations via Lambda Execution Role
2 rules 3 TTPsDetection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.
AWS EC2 Role GetCallerIdentity from New Source AS Organization
2 rules 1 TTPThe rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.
AWS Discovery API Calls from VPN ASN by New Identity
2 rules 1 TTPThis rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.
SQL Injection Vulnerability in itsourcecode Courier Management System
2 rules 1 TTP 1 CVEitsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.
Rapid Enumeration of AWS S3 Buckets
2 rules 4 TTPsAn AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.
AWS Discovery API Calls via CLI from a Single Resource
2 rules 2 TTPsThis rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.
Potential Kerberos SPN Spoofing via Suspicious DNS Query
2 rules 1 TTPDetects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.
Prosody Memory Exhaustion Vulnerability (CVE-2026-43506)
2 rules 1 TTP 1 CVEProsody versions before 0.12.6, versions 1.0.0 through 13.0.0, and before version 13.0.5 are vulnerable to a denial of service due to memory leaks from unauthenticated connections, leading to memory exhaustion.
WP Editor Plugin CSRF Vulnerability
2 rules 1 TTP 1 CVEThe WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.
WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)
2 rules 1 TTP 1 CVEThe Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.
Potential Root Effective Shell from Non-Standard Path via Auditd
2 rules 1 TTPThis rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.
Malware Distribution via Hugging Face and ClawHub
2 rules 1 TTPThreat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.
Microsoft Product Vulnerability CVE-2026-41526
1 CVECVE-2026-41526 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon patch release for exploitation details.
Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)
2 rules 1 TTP 1 CVECVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVESourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.
Totolink NR1800X Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.
Totolink NR1800X Command Injection Vulnerability
2 rules 1 TTP 1 CVEA command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.
Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)
2 rules 1 CVEA use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.
CVE-2026-7339: Heap Buffer Overflow in WebRTC
2 rules 1 CVEA heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.
Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)
2 rules 1 TTP 1 CVECVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.
Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)
2 rules 1 TTP 1 CVECVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.
Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)
2 rules 1 TTP 1 CVECVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.
Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)
2 rules 1 TTP 1 CVECVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.
Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)
2 rules 1 CVECVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.
Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)
2 rules 2 TTPs 1 CVECVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.
SourceCodester Advanced School Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.
Fujian Apex LiveBOS Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.
Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials
2 rules 2 TTPsCompromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.
nextlevelbuilder GoClaw and GoClaw Lite Improper Authorization Vulnerability
2 rules 1 TTP 1 CVEnextlevelbuilder GoClaw and GoClaw Lite versions up to 3.8.5 are vulnerable to improper authorization in the RPC Handler component, potentially allowing remote attackers to bypass security controls.
HKUDS OpenHarness Remote Code Execution via /bridge Slash Command (CVE-2026-7551)
2 rules 1 TTP 1 CVEHKUDS OpenHarness contains a remote code execution vulnerability (CVE-2026-7551) in the /bridge slash command, allowing remote attackers to execute arbitrary operating system commands by injecting malicious commands via the /bridge spawn command, leading to unauthorized shell access and data exposure.
IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)
2 rules 2 TTPs 1 CVEIBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.
code-projects Plugin 4.1.2cu.5137 Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA buffer overflow vulnerability (CVE-2026-7503) exists in code-projects Plugin 4.1.2cu.5137, allowing a remote attacker to execute arbitrary code by manipulating the 'wepkey2' argument in the 'setWiFiMultipleConfig' function of the '/lib/cste_modules/wireless.so' library, posing a critical risk due to publicly available exploits.
SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag
2 rules 1 TTP 1 CVESSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.
IBM Langflow Desktop Unauthenticated Image Access via IDOR
2 rules 1 TTP 1 CVEIBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to an indirect object reference (IDOR) vulnerability (CVE-2026-4503), allowing unauthenticated users to view other users' images due to a user-controlled key.
Kirby CMS Missing Authorization Vulnerability
2 rules 2 TTPsA missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.
Contrast CLI CopyFile Policy Subversion via Symlinks Allows Guest Root Filesystem Writes
2 rules 2 TTPsA vulnerability in the CopyFile verification of Kata agent policies generated by the Contrast CLI allows arbitrary writes to the guest root filesystem, potentially leading to a full guest takeover.
Sentry SAML SSO Improper Authentication Allows User Identity Linking
2 rules 1 TTPA critical vulnerability (CVE-2026-42354) exists in Sentry's SAML SSO implementation that allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance, affecting self-hosted users with multiple organizations configured if a malicious user has permissions to modify SSO settings, while Sentry SaaS was patched in April and self-hosted users are advised to upgrade to version 26.4.1 or higher.
Clerk Authorization Bypass Vulnerability
2 rules 1 TTPClerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.
GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)
2 rules 3 TTPs 1 CVEA flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.
n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass
2 rules 1 TTPThe n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.
Hickory DNS Recursor Cache Poisoning via Sibling Zone Delegation
2 rulesThe experimental `hickory-recursor` crate in Hickory DNS is vulnerable to cross-zone cache poisoning due to storing DNS records keyed by record name/type instead of query, enabling an attacker to redirect queries for a victim zone to an attacker-controlled nameserver.
Jupyter Notebook Authentication Token Theft via CommandLinker XSS
2 rulesA stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.
Gotenberg Unauthenticated SSRF Vulnerability
3 rules 1 TTPGotenberg version 8.29.1 is vulnerable to Server-Side Request Forgery (SSRF) due to an unfiltered webhook URL, allowing unauthenticated attackers to force outbound HTTP POST requests to arbitrary destinations, enabling internal network probing and interaction with internal services.
Synway SMG Gateway Management Software Unauthenticated OS Command Injection
2 rules 1 TTP 1 CVESynway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.
Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket
2 rules 2 TTPs 1 CVEThis rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.
MeWare PDKS Improper Control of Interaction Frequency Vulnerability (CVE-2026-7402)
1 rule 1 CVEMeWare PDKS versions V16.20200313 before VMYR_3.5.2025117 are vulnerable to improper control of interaction frequency, potentially leading to flooding attacks.
ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer
2 rules 3 TTPs 1 IOCThe 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.
ABB System 800xA and Symphony Plus IEC 61850 Denial-of-Service Vulnerability
2 rules 1 TTP 1 CVEA vulnerability in ABB's IEC 61850 communication stack allows a remote attacker with access to the IEC 61850 network to cause a denial-of-service condition by sending a specially crafted packet, leading to device faults or communication driver crashes.
ABB PCM600 Path Traversal Vulnerability (CVE-2018-1002208)
2 rules 1 TTP 1 CVEA path traversal vulnerability in ABB PCM600 versions 1.5 to 2.13 (CVE-2018-1002208) allows a local attacker with low privileges to execute arbitrary code by sending a specially crafted message to the system node.
ABB Edgenius Management Portal Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEAn authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.
ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure
3 rules 1 TTP 3 CVEsMultiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).
ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution
2 rules 3 TTPs 3 CVEsMultiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.
ABB Ability OPTIMAX Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVECVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.
Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution
3 rules 3 TTPsMultiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.
Multiple Vulnerabilities in Absolute Secure Access
2 rules 3 TTPs 1 CVEMultiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.
Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.
Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath
2 rules 4 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.
libsndfile Vulnerability Allows Denial of Service
2 rules 1 TTPA remote, unauthenticated attacker can exploit an unpatched vulnerability in libsndfile to cause a denial of service.
Multiple Vulnerabilities in CUPS
2 rules 4 TTPs 1 CVEMultiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.
CUPS Vulnerability Allows Local Privilege Escalation
2 rules 1 TTPA local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.
Sudo Privilege Escalation Vulnerabilities
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.
GIMP Multiple Vulnerabilities Allow Remote Code Execution
2 rules 1 TTP 5 CVEsA remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.
Multiple Vulnerabilities in Google Chrome
2 rules 5 TTPs 5 CVEsMultiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.
PackageKit Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.
Multiple Vulnerabilities in Xen and Citrix Systems XenServer
3 rules 7 TTPsMultiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.
Multiple Vulnerabilities in Wazuh Allow for Code Execution and Data Manipulation
2 rules 6 TTPs 5 CVEsMultiple vulnerabilities in Wazuh allow an attacker to perform a denial of service attack, execute arbitrary code, manipulate data, disclose confidential information, or bypass security measures.
DNSdist Multiple Vulnerabilities Leading to Denial of Service
2 rules 1 TTP 1 CVEMultiple vulnerabilities in DNSdist can be exploited by an attacker to perform a denial of service attack, impacting the availability of DNS services.
OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)
2 rules 2 TTPs 1 CVECVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.
CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access
2 rules 1 CVECVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.
CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability
2 rules 1 TTP 1 CVECVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.
CVE-2026-28388 NULL Pointer Dereference in Delta CRL Processing
2 rules 1 CVECVE-2026-28388 is a NULL Pointer Dereference vulnerability in an unspecified Microsoft product when processing a Delta CRL, potentially leading to a denial-of-service condition.
Microsoft Published Information on CVE-2026-32777
1 CVEMicrosoft has published information regarding CVE-2026-32777, but no further details regarding the vulnerability or its exploitation are currently available.
Microsoft Published Information on CVE-2026-32776
1 CVEMicrosoft published information regarding CVE-2026-32776, however, further details require JavaScript to be enabled, limiting the actionable intelligence at this time.
Microsoft CVE-2026-32778 Vulnerability Published
2 rules 1 CVEMicrosoft published information regarding vulnerability CVE-2026-32778, but no details regarding the vulnerability are available at this time.
CVE-2026-34073: Incomplete DNS Name Constraint Enforcement Vulnerability
2 rules 1 CVECVE-2026-34073 is a vulnerability in unspecified Microsoft products due to incomplete DNS name constraint enforcement on peer names, potentially leading to certificate validation bypass.
CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption
2 rules 1 TTP 1 CVECVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.
Tenda 4G300 Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.
1024-lab smart-admin Improper Access Control Vulnerability (CVE-2026-7468)
2 rules 1 TTP 1 CVECVE-2026-7468 is an improper access control vulnerability in 1024-lab smart-admin up to version 3.30.0, affecting the /smart-admin-api/druid/index.html file, which can be exploited remotely.
VetCoders mcp-server-semgrep OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEVetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.
Netgate pfSense XSS Vulnerability
2 rulesA cross-site scripting (XSS) vulnerability affects Netgate pfSense CE (<= 2.8.1) and pfSense Plus (<= 26.03), potentially allowing attackers to inject malicious code.
Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service
2 rulesMultiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.
Multiple Vulnerabilities in SonicWall Products Allow for DoS and Security Policy Bypass
2 rules 2 TTPs 3 CVEsMultiple vulnerabilities in SonicWall firewalls could allow an attacker to cause a remote denial of service and security policy bypass, potentially disrupting network services and compromising security controls.
Multiple Vulnerabilities in Red Hat Linux Kernel
2 rules 3 TTPs 5 CVEsMultiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.
Multiple Vulnerabilities in MISP Threat Intelligence Platform
2 rules 1 TTPMultiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.
Multiple Vulnerabilities in Exim Mail Transfer Agent
3 rules 3 TTPsMultiple vulnerabilities in Exim versions prior to 4.99.2 allow an attacker to cause a remote denial of service, a breach of data confidentiality, and an unspecified security problem.
Komari Agent Abused as SYSTEM-Level Backdoor
2 rules 4 TTPs 2 IOCsThreat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.
UTT HiPER 1250GW Buffer Overflow Vulnerability (CVE-2026-7420)
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in UTT HiPER 1250GW devices (versions up to 3.2.7-210907-180535) allows remote attackers to execute arbitrary code by manipulating the 'Profile' argument in the `strcpy` function of the `route/goform/ConfigAdvideo` file, due to insufficient bounds checking.
UTT HiPER 1250GW Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in the UTT HiPER 1250GW device due to improper handling of the 'Profile' argument in the NTP configuration, potentially allowing for arbitrary code execution.
PolarVista xcode-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEPolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.
Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests
2 rules 5 TTPsAdmidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.
n8n XML Node Prototype Pollution Leading to RCE
3 rules 1 TTPA vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.
n8n MCP OAuth Client XSS Vulnerability
2 rules 1 TTPn8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.
n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE
2 rules 1 TTPA prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.
n8n Python Task Runner Sandbox Escape Vulnerability
2 rules 2 TTPsA sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.
Relative Path Traversal Vulnerability in mcpo-simple-server
2 rules 1 TTP 1 CVEA relative path traversal vulnerability exists in getsimpletool mcpo-simple-server <= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.
Hyperledger Fabric SDK Java Deserialization RCE
2 rules 1 TTPThe deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.
Cockpit CMS Authenticated Remote Code Execution via Code Injection
2 rules 1 TTP 1 CVECockpit CMS is vulnerable to authenticated remote code execution via PHP code injection in the /cockpit/collections/save_collection endpoint, enabling attackers with collection management privileges to execute arbitrary commands on the server.
Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)
2 rules 1 TTP 1 CVETenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.
Tenda Router DNS Hijacking via Cookie Session Weakness
2 rules 1 TTP 1 CVETenda W3002R/A302/W309R routers with firmware V5.07.64_en are vulnerable to unauthenticated DNS hijacking, where attackers exploit a cookie session weakness to modify DNS settings via crafted GET requests.
Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)
2 rules 1 TTP 1 CVEAlloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.
Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)
2 rules 1 TTP 1 CVEAllok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.
SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)
2 rules 2 TTPs 1 CVESysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.
BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion
2 rules 1 TTP 1 CVECVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.
XATABoost CMS 1.0.0 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEXATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.
Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)
2 rules 1 TTP 1 CVEPrime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.
Free Download Manager 2.0 Built 417 Local Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEFree Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation, leading to arbitrary code execution.
Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow
2 rules 1 TTP 1 CVEEasy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.
Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)
2 rules 1 TTP 1 CVEAllok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.
Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability
1 rule 1 TTP 1 CVEAllok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.
AgentFlow Arbitrary Code Execution via Pipeline Path Manipulation (CVE-2026-7466)
2 rules 1 TTP 1 CVEAgentFlow is vulnerable to arbitrary code execution (CVE-2026-7466) by manipulating the `pipeline_path` parameter in POST requests to `/api/runs` and `/api/runs/validate`, allowing attackers to execute arbitrary Python code.
Path Traversal Vulnerability in mail-mcp-bridge
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.
EyouCMS SQL Injection Vulnerability (CVE-2026-7389)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.
cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)
2 rules 1 TTP 1 CVEAn authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.
OpenClaw Webhook Replay Vulnerability (CVE-2026-41395)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.28 is vulnerable to webhook replay attacks due to improper signature verification, allowing attackers to reorder query parameters and trigger duplicate voice-call processing.
OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.
OpenClaw Security Bypass Vulnerability Allows Persistent Browser Profile Mutation
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows attackers to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.
OpenClaw Role Bypass Vulnerability in device.token.rotate Function
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function, allowing attackers to mint tokens for unapproved roles and bypass intended approval processes.
OpenClaw QQ Bot Media Download SSRF Vulnerability
2 rules 2 TTPs 1 CVEOpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.
OpenClaw Privilege Escalation via Trusted Proxy Authentication (CVE-2026-41404)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation by declaring operator scopes on non-Control-UI clients.
OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)
2 rules 1 TTP 1 CVEOpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.
OpenClaw MS Teams Webhook Resource Exhaustion Vulnerability
1 rule 1 CVEOpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to exhaust server resources by sending malicious Teams webhook payloads.
OpenClaw Incomplete Host Environment Variable Sanitization Vulnerability (CVE-2026-41387)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.22 is vulnerable to incomplete host environment variable sanitization, allowing attackers to redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content.
OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)
2 rules 3 TTPs 1 CVEOpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.
OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.
OpenClaw Arbitrary Directory Deletion Vulnerability
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.
Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE
2 rules 3 TTPs 3 CVEsMultiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.
Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.
eiceblue spire-doc-mcp-server Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.
Multiple Vulnerabilities in cURL
2 rules 3 TTPs 4 CVEsMultiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.
AI-Powered Honeypots: Deceptive Environments for Automated Threat Actors
2 rules 3 TTPs 1 CVEGenerative AI can be used to rapidly deploy adaptive honeypot systems that simulate diverse environments, like Linux shells or IoT devices, to trick and observe AI-driven attacks that prioritize speed over stealth.
Multiple Vulnerabilities in GNU libc
2 rules 3 TTPs 5 CVEsA remote, anonymous attacker can exploit multiple vulnerabilities in GNU libc to execute arbitrary program code, cause a denial-of-service condition, or disclose sensitive information.
Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS
2 rules 2 TTPsMultiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
ProFTPD SQL Injection Vulnerability
2 rules 1 TTPAn anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.
CVE-2025-68146 filelock TOCTOU Race Condition Enables Symlink Attacks
2 rules 1 CVECVE-2025-68146 describes a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the filelock library that could allow for symlink attacks during lock file creation, potentially leading to unauthorized file access or modification.
rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)
2 rules 1 CVECVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.
OpenTelemetry-Go Multi-Value Baggage Header Extraction DoS Vulnerability (CVE-2026-29181)
2 rules 1 TTP 1 CVEA vulnerability in OpenTelemetry-Go related to the extraction of multi-value baggage headers can lead to excessive resource allocation, resulting in a remote denial-of-service amplification.
CoreDNS DoQ Server Denial-of-Service Vulnerability
2 rules 3 TTPs 1 CVECoreDNS' DNS-over-QUIC (DoQ) server can be driven into large goroutine and memory growth by a remote client that opens many QUIC streams and stalls after sending only 1 byte, leading to denial of service in versions before 1.14.3.
OpenClaw Privilege Escalation Vulnerability (CVE-2026-42432)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains a privilege escalation vulnerability that allows previously paired nodes to reconnect and execute privileged commands without proper authorization, potentially leading to complete system compromise.
OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.
OpenClaw Unauthenticated WebSocket Denial-of-Service Vulnerability
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.28 is vulnerable to a denial-of-service attack by accepting unbounded concurrent unauthenticated WebSocket upgrades, allowing attackers to exhaust server resources.
OpenClaw Exec Allowlist Bypass Vulnerability (CVE-2026-41390)
2 rules 2 TTPs 1 CVEOpenClaw before version 2026.3.28 contains an exec allowlist bypass vulnerability (CVE-2026-41390) that allows attackers to persist trust for wrapper binaries like /usr/bin/script to execute different underlying programs, potentially leading to privilege escalation.
LLM-Based Compromised User Triage
2 rules 2 TTPsThis rule correlates multiple security alerts involving the same user, analyzes them with an LLM, and flags potentially compromised accounts based on MITRE tactics, geographic anomalies, and multi-host activity, helping analysts prioritize users exhibiting indicators of credential theft or unauthorized access.
D-Link DIR-825M Remote Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVED-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.
Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.
mkdocs-mcp-plugin Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.
ChatGPTNextWeb NextChat Server-Side Request Forgery Vulnerability
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability in ChatGPTNextWeb NextChat up to version 2.16.1 allows remote attackers to manipulate the proxyHandler function, potentially leading to unauthorized internal resource access.
AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)
2 rules 1 TTP 1 CVEA DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.
Detection of Github Delete Actions in Audit Logs
2 rules 1 TTPThis brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.
Totolink A8000RU OS Command Injection Vulnerability
2 rules 1 TTP 1 CVETotolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.
D-Link DI-8100 Remote Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.
Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)
3 rules 1 TTP 1 CVEA critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.
VMware Tanzu Spring Boot Multiple Vulnerabilities
2 rules 4 TTPsMultiple vulnerabilities in VMware Tanzu Spring Boot allow attackers to execute arbitrary code, bypass security measures, manipulate or disclose sensitive data, or hijack authenticated users.
Multiple Vulnerabilities in Atlassian Products
2 rules 4 TTPs 1 CVEMultiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, and Jira allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.
Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)
2 rules 1 TTP 1 CVECVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.
AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.
BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.
Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.
Path Traversal Vulnerability in engineer-your-data
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.
edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.
Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.
Google Workspace Login Attempt with Government Attack Warning
2 rules 1 TTPA Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.
OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.
Linux Persistence via Sudoers.d File Manipulation
3 rules 2 TTPsAttackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.
Tenda HG3 2.0 Command Injection Vulnerability
2 rules 1 TTP 1 CVETenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.
Apache MINA Arbitrary Code Execution Vulnerability
2 rules 1 TTP 1 CVEA critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.
Online Lot Reservation System SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.
tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.
Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.
SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability
2 rules 1 TTP 1 CVESourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.
Tenda F456 Router Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 in the `fromGstDhcpSetSer` function, allowing remote attackers to execute arbitrary code by manipulating the 'dips' argument via a crafted HTTP request to `/goform/GstDhcpSetSer`.
itsourcecode Construction Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.
CodePanda Source canteen_management_system SQL Injection Vulnerability
1 rule 1 TTP 1 CVEA SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.
SQL Injection Vulnerability in code-projects Inventory Management System 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.
D-Link DIR-822 A_101 Command Injection via DHCP Hostname
2 rules 1 TTP 1 CVEA command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.
code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)
2 rules 1 TTP 1 CVECVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.
Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEToowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.
KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)
2 rules 1 TTP 1 CVEKLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.
Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)
2 rules 1 TTP 1 CVECVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.
Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)
2 rules 2 TTPs 1 CVECVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.
Cilium `cilium-bugtool` WireGuard Private Key Exposure
2 rules 1 TTP 1 IOCThe `cilium-bugtool` debugging tool in Cilium exposes WireGuard private keys, potentially allowing unauthorized access to encrypted node-to-node communication in affected versions.
Tenda F456 Router Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.
Typecho <= 1.3.0 Server-Side Request Forgery Vulnerability (CVE-2026-7025)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in Typecho up to version 1.3.0, allowing remote attackers to manipulate the X-Pingback/link argument in the Service::sendPingHandle function to potentially make arbitrary HTTP requests.
CVE-2026-31622 NFC-A Cascade Depth Bounds Check Failure
2 rules 1 TTP 1 CVECVE-2026-31622 describes a vulnerability related to an NFC bounds check issue, specifically a failure to properly validate NFC-A cascade depth in the SDD response handler within Microsoft products, potentially leading to unexpected behavior or security compromise.
CVE-2026-23398 ICMP NULL Pointer Dereference
2 rules 1 TTP 1 CVECVE-2026-23398 is a vulnerability related to a NULL pointer dereference in the ICMP protocol, potentially leading to a denial-of-service condition in affected Microsoft products.
SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)
2 rules 1 TTP 1 CVEA remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.
Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.
PicoClaw Web Launcher Management Plane Command Injection Vulnerability
2 rules 1 TTP 1 CVEPicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.
ERB Deserialization Bypass via def_module/def_method/def_class
2 rules 2 TTPs 1 CVEA deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.
Claude Code Trust Dialog Bypass via Git Worktree Spoofing
2 rules 1 TTPA vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.
vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)
2 rules 1 TTP 1 CVEAn improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.
Microsoft Product Vulnerability CVE-2026-41080
2 rules 1 CVECVE-2026-41080 is a vulnerability affecting a Microsoft product; the specific product, impact, and exploitation details are currently undisclosed.
Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026
2 rules 1 TTPIn early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.
Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses
2 rules 1 TTPGemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.
k8sGPT Operator Vulnerable to Prompt Injection
2 rules 2 TTPsk8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.
BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2
2 rules 2 TTPs 1 CVEBridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.
Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization
2 rules 1 TTPRay Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.
Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud
2 rules 1 TTPA vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.
OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.
OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)
2 rules 2 TTPs 1 CVEOpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.
OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.
OpenClaw Cross-Site Request Forgery Vulnerability
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.
OpenClaw Arbitrary Code Execution via Environment Variable Override (CVE-2026-41336)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 allows attackers to execute arbitrary code by overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable using a workspace .env file, enabling the loading of attacker-controlled hook code.
Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)
2 rules 1 TTP 1 CVECVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.
Apache ActiveMQ Vulnerabilities Allow RCE and XSS
2 rules 1 TTP 5 CVEsAn authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.
Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution
3 rules 3 TTPs 5 CVEsMultiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.
PhantomRPC: Windows RPC Privilege Escalation Vulnerability
2 rules 1 TTPA vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.
Flowise Multiple Vulnerabilities
2 rules 3 TTPs 5 CVEsMultiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.
Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution
2 rules 4 TTPs 3 CVEsMultiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.
D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability
2 rules 1 CVED-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.
Argo Workflows Controller Denial-of-Service via Malformed Pod Annotation
2 rules 2 TTPsA malformed `workflows.argoproj.io/pod-gc-strategy` annotation in an Argo Workflow pod can trigger an unchecked array index in the `podGCFromPod()` function, leading to a controller-wide panic and denial-of-service.
Kirby CMS Server-Side Template Injection via Double Template Resolution
2 rules 1 TTPA server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.
Radare2 Path Traversal Vulnerability in Project Deletion
2 rules 1 TTP 1 CVERadare2 versions prior to 6.1.4 are vulnerable to a path traversal in project deletion, allowing local attackers to recursively delete arbitrary directories by escaping the 'dir.projects' root, leading to integrity and availability loss.
CanisterSprawl: Self-Propagating npm Malware Campaign
2 rules 6 TTPsThe CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.
OpenC3 COSMOS SQL Injection Vulnerability in QuestDB Time-Series Database
2 rules 3 TTPsA SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS, allowing an authenticated remote user to execute arbitrary SQL commands, including telemetry data disclosure and deletion.
xmldom Uncontrolled Recursion DoS Vulnerability
2 rules 1 TTPThe xmldom library is vulnerable to a denial-of-service (DoS) attack due to uncontrolled recursion in XML serialization leading to application crashes.
Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload
2 rules 3 TTPs 1 CVEXerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.
rust-openssl Unchecked Callback Length Memory Leak
2 rulesThe rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.
Rclone Unauthenticated options/set Allows Runtime Auth Bypass
2 rules 3 TTPsRclone is vulnerable to an unauthenticated options/set vulnerability that allows runtime authentication bypass, potentially leading to sensitive operations and command execution by setting `rc.NoAuth=true` on reachable RC servers started without global HTTP authentication.
Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers
2 rules 4 TTPs 2 CVEsA new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.
Daptin SQL Injection Vulnerability in Aggregate API
2 rules 1 TTPA SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.
Cisco Integrated Management Controller (IMC) Multiple XSS Vulnerabilities
2 rules 1 TTP 5 CVEsMultiple cross-site scripting (XSS) vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct an XSS attack against a user of the interface.
Multiple Vulnerabilities in n8n Workflow Automation Tool
3 rules 5 TTPs 1 CVEMultiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.
Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)
2 rules 1 TTP 1 CVEAn unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.
WeKan Missing Authorization Vulnerability in Integration REST API
2 rules 1 TTP 1 CVE 4 IOCsWeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.
Microsoft Product Vulnerability CVE-2026-22005
3 rules 1 CVECVE-2026-22005 is a newly published vulnerability affecting a Microsoft product, requiring further investigation to determine the specific product, attack vector, and potential impact.
Microsoft Discloses Information Regarding CVE-2026-22004
1 rule 1 TTP 1 CVEMicrosoft has released information regarding the vulnerability CVE-2026-22004, but details about the vulnerability and its exploitation are currently unavailable.
Microsoft CVE-2026-35236 Information Published
2 rulesMicrosoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.
CVE-2026-31478 Vulnerability in Microsoft ksmbd
2 rules 3 TTPs 1 CVECVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.
CVE-2026-34303 Affecting Microsoft Products
2 rules 1 CVECVE-2026-34303 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon disclosure of details.
CVE-2026-31507 Double-Free Vulnerability in net/smc
2 rules 2 TTPs 1 CVECVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.
IBM WebSphere Liberty Identity Spoofing Vulnerability (CVE-2026-3621)
2 rules 1 TTP 1 CVEIBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.4 are susceptible to identity spoofing when applications are deployed without proper authentication and authorization configurations, potentially leading to unauthorized access and privilege escalation.
IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution
2 rules 1 TTP 1 CVEAn unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.
SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint
2 rules 1 TTP 1 CVE 1 IOCSiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.
Entra ID Excessive Account Lockouts Detected
2 rules 3 TTPsA high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.
AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure
2 rules 2 TTPsAttackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.
CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE
2 rules 2 TTPsThe CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.
Suspicious Processes Connecting to Large Language Model Endpoints
3 rules 1 TTPThis rule detects DNS queries to known Large Language Model (LLM) domains by unsigned binaries or common Windows scripting utilities, indicating potential command and control activity leveraging LLMs for dynamic actions on compromised systems.
GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence
2 rules 4 TTPsThis brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.
LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability
1 rule 1 TTP 1 CVELanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.
Critical RCE Vulnerabilities in Spinnaker
2 rules 1 TTP 2 CVEsCritical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.
OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode
2 rules 1 TTPA critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.
InstructLab Arbitrary Code Execution via Malicious HuggingFace Model
2 rules 1 TTP 1 CVEInstructLab is vulnerable to arbitrary code execution because the `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace, allowing remote attackers to execute code by convincing a user to load a malicious model.
InstructLab Path Traversal Vulnerability (CVE-2026-6855)
2 rules 1 TTP 1 CVEA local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.
WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)
2 rules 3 TTPs 1 CVEWWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.
WWBN AVideo SSRF Vulnerability (CVE-2026-41055)
2 rules 1 TTP 1 CVE 1 IOCWWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.
Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL
2 rules 1 TTP 1 CVEThe Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.
Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)
2 rules 1 TTP 1 CVE 4 IOCsTekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.
Oracle Java SE, GraalVM Networking Component Denial-of-Service Vulnerability (CVE-2026-34282)
2 rules 1 TTP 1 CVECVE-2026-34282 is a remotely exploitable vulnerability in the Networking component of Oracle Java SE and GraalVM that allows an unauthenticated attacker to cause a complete denial of service.
NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)
2 rules 1 TTP 1 CVEA heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.
NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)
2 rules 1 TTP 1 CVENestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.
Lotus Data Wiper Targeting Venezuelan Energy and Utility Firms
3 rules 1 TTPThe Lotus wiper, a previously undocumented data-wiping malware, was deployed against Venezuelan energy and utilities organizations in 2025, overwriting physical drives, deleting files, and rendering systems unrecoverable.
HKUDS OpenHarness Insecure Default Configuration Vulnerability
2 rules 1 TTP 1 CVEHKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.
Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)
2 rules 1 TTP 1 CVEHermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.
goshs GitHub Token Leakage via ArtiPACKED Vulnerability (CVE-2026-40903)
2 rules 1 TTP 1 CVEThe goshs SimpleHTTPServer prior to version 2.0.0-beta.6 is vulnerable to ArtiPACKED, potentially leading to leakage of the GITHUB_TOKEN through workflow artifacts.
FreeScout Privilege Escalation via Email Address Reassignment (CVE-2026-40589)
2 rules 1 TTP 1 CVE 1 IOCFreeScout versions before 1.8.214 are vulnerable to privilege escalation, allowing a low-privileged agent to reassign email addresses from hidden customers to visible customers, leading to information disclosure and unauthorized access to conversations.
FreeScout Mass Assignment Vulnerability (CVE-2026-40569)
2 rules 2 TTPs 1 CVEFreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.
FreeScout Incorrect Authorization Vulnerability via Save Draft
2 rules 1 TTP 1 CVE 4 IOCsFreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.
FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)
2 rules 1 TTP 1 CVE 4 IOCsFreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.
Fortra GoAnywhere MFT SSH Key Brute-Force Vulnerability (CVE-2025-14362)
2 rules 1 TTP 1 CVEFortra's GoAnywhere MFT prior to 7.10.0 is vulnerable to brute-force attacks on SSH keys because the login limit is not enforced on the SFTP service when Web Users are configured to log in with an SSH Key.
ElectricSQL /v1/shape API SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe ElectricSQL sync engine is vulnerable to SQL injection, potentially allowing authenticated users to read, write, and destroy the underlying PostgreSQL database.
CrowdStrike LogScale Unauthenticated Path Traversal Vulnerability (CVE-2026-40050)
2 rules 1 TTP 1 CVEA critical unauthenticated path traversal vulnerability (CVE-2026-40050) in CrowdStrike LogScale allows remote attackers to read arbitrary files from the server filesystem if a specific cluster API endpoint is exposed, necessitating immediate patching for self-hosted customers.
ASP.NET Core Improper Signature Verification Vulnerability (CVE-2026-40372)
2 rules 1 TTP 1 CVECVE-2026-40372 is a critical vulnerability in ASP.NET Core stemming from improper cryptographic signature verification, potentially enabling unauthorized attackers to achieve network-based privilege escalation.
WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)
2 rules 3 TTPs 1 CVEThe Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.
Binutils XCOFF Heap-Based Buffer Overflow Vulnerability (CVE-2026-6846)
2 rules 4 TTPs 1 CVE 1 IOCA heap-buffer-overflow vulnerability exists in binutils when processing a specially crafted XCOFF object file, potentially leading to arbitrary code execution or denial of service.
WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)
2 rules 1 TTP 1 CVEThe HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.
Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)
2 rules 1 TTP 1 CVEAn insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.
Telerik UI for AJAX RadAsyncUpload Uncontrolled Resource Consumption (CVE-2026-6022)
2 rules 1 TTP 1 CVEA vulnerability exists in Progress Telerik UI for AJAX prior to 2026.1.421, RadAsyncUpload, due to missing cumulative size enforcement during chunk reassembly, which allows file uploads to exceed the configured maximum size, leading to disk space exhaustion.
util-linux Vulnerability Allows DoS and Information Disclosure
2 rules 2 TTPsA local attacker can exploit a vulnerability in util-linux to perform a denial of service attack and disclose sensitive information.
BigBlueButton Vulnerabilities Allow Data Manipulation and Redirects
2 rules 1 TTPMultiple vulnerabilities in BigBlueButton can be exploited by an attacker to manipulate data and redirect users to attacker-controlled domains.
Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection
3 rules 3 TTPsMultiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.
pyLoad Privilege Escalation Vulnerability (CVE-2026-41133)
2 rules 1 TTP 1 CVEpyLoad versions up to 0.5.0b3.dev97 cache user roles and permissions in the session, leading to privilege escalation even after an admin revokes privileges.
WWBN AVideo Unauthenticated Remote Code Execution via test.php
2 rules 2 TTPs 1 CVE 1 IOCWWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.
Oracle VM VirtualBox CVE-2026-35246 Vulnerability
2 rules 1 CVECVE-2026-35246 is a vulnerability in Oracle VM VirtualBox version 7.2.6, where a high-privileged attacker with local access can exploit it to compromise the application potentially leading to a complete takeover.
Oracle VirtualBox Unauthenticated RDP Denial-of-Service Vulnerability (CVE-2026-35245)
2 rules 1 TTP 1 CVEAn unauthenticated attacker with network access via RDP can exploit CVE-2026-35245 in Oracle VM VirtualBox version 7.2.6 to cause a denial-of-service (DOS) condition.
Esri Portal for ArcGIS Incorrect Authorization Vulnerability (CVE-2026-33519)
2 rules 1 TTP 1 CVECVE-2026-33519 is a critical vulnerability in Esri Portal for ArcGIS 11.4, 11.5, and 12.0, where incorrect authorization checks on developer credentials can lead to unauthorized privilege escalation on Windows, Linux, and Kubernetes deployments.
Crafty Controller Users API Insecure Direct Object Reference Vulnerability
2 rules 1 TTP 1 CVE 1 IOCCrafty Controller's Users API component contains an insecure direct object reference vulnerability, allowing a remote, authenticated attacker to perform unauthorized user modification actions due to improper API permissions validation (CVE-2026-5652).
NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)
2 rules 2 TTPs 1 IOCNVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.
OpenMage LTS Phar Deserialization RCE
2 rules 2 TTPsA remote code execution vulnerability exists in OpenMage LTS versions prior to 20.16.1 due to Phar deserialization, where an attacker can upload a malicious phar file disguised as an image and trigger deserialization via functions like `getimagesize()`, `file_exists()`, or `is_readable()` when processing `phar://` stream wrapper paths, leading to arbitrary code execution.
CVE-2026-32223 Windows USB Printing Stack Elevation of Privilege Vulnerability
2 rules 1 TTP 1 CVECVE-2026-32223 is an elevation of privilege vulnerability affecting the Windows USB Printing Stack (usbprint.sys), potentially allowing a local attacker to gain elevated privileges on a vulnerable system.
FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)
2 rules 1 TTP 1 CVEFreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.
Vvveb CMS 1.0.8 Remote Code Execution via Malicious Upload
2 rules 1 TTP 1 CVEVvveb CMS 1.0.8 is vulnerable to remote code execution, allowing authenticated attackers to upload a PHP webshell with a .phtml extension, bypass extension restrictions, and execute arbitrary operating system commands by requesting the uploaded file.
ConnectWise Automate Solution Center Cleartext Communication Vulnerability (CVE-2026-6066)
2 rules 1 TTP 1 CVE 1 IOCConnectWise Automate is vulnerable to CVE-2026-6066, a cleartext transmission of sensitive information vulnerability, where certain client-to-server communications could occur without transport-layer encryption, potentially allowing network-based interception of Solution Center traffic, and the issue is resolved in Automate 2026.4 by enforcing secure communication.
Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)
2 rules 1 TTP 1 CVECisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.
Notepad++ Updater (gup.exe) Creates Uncommon Files
2 rules 3 TTPsThe Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.
MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)
2 rules 1 TTP 1 CVEA deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.
Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution
2 rules 2 TTPsAdversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.
Multiple Vulnerabilities in Fortinet FortiSandbox
3 rules 3 TTPsMultiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.
Multiple Vulnerabilities in Red Hat Hardened Images RPMs
2 rules 7 TTPsRemote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.
GIMP Multiple Vulnerabilities Allow Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit multiple vulnerabilities in GIMP to execute arbitrary program code, potentially leading to system compromise.
Cisco Catalyst SD-WAN Manager Multiple Vulnerabilities
2 rules 4 TTPsMultiple vulnerabilities in Cisco Catalyst SD-WAN Manager allow a remote, anonymous, or local attacker to gain administrator privileges, bypass authentication, execute commands with Netadmin rights, read sensitive system information, and overwrite arbitrary files.
Libarchive Code Execution Vulnerability
2 rules 1 TTPA remote attacker can exploit a vulnerability in libarchive to achieve arbitrary code execution on a vulnerable system.
Multiple Vulnerabilities in Roundcube
2 rules 3 TTPsMultiple vulnerabilities in Roundcube allow an attacker to manipulate files, bypass security measures, perform cross-site scripting attacks, and disclose information.
Multiple Vulnerabilities in Microsoft Developer Tools
2 rules 4 TTPsMultiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.
Multiple Vulnerabilities in Dell PowerProtect Data Domain OS
2 rules 4 TTPsMultiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.
Multiple Vulnerabilities in FreeRDP Allow Remote Code Execution and DoS
2 rules 5 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in FreeRDP to potentially execute arbitrary code, cause a denial-of-service condition, manipulate data, disclose confidential information, or perform other unspecified attacks.
libarchive Multiple Vulnerabilities Allow Information Disclosure and DoS
2 rules 2 TTPsMultiple vulnerabilities in libarchive can be exploited by a remote attacker to disclose information or cause a denial-of-service condition.
Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities
2 rules 2 TTPsA local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.
Microsoft CVE-2026-41254 Security Update
2 rules 1 CVEMicrosoft released a security update for CVE-2026-41254, a vulnerability with unspecified details.
AiAssistant Type Privilege Bypass Vulnerability (CVE-2026-31368)
2 rules 2 TTPs 1 CVECVE-2026-31368 is a type privilege bypass vulnerability in AiAssistant, potentially leading to service availability issues and complete compromise of the system.
FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)
2 rules 2 TTPs 1 CVEFreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.
Apktool Path Traversal Vulnerability (CVE-2026-39973)
2 rules 3 TTPs 1 CVEA path traversal vulnerability in Apktool versions 3.0.0 and 3.0.1 allows a malicious APK file to write arbitrary files to the filesystem during decoding, potentially leading to remote code execution.
OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)
2 rules 1 TTP 1 CVEOpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.
Suspicious RDP File Execution
2 rules 2 TTPsThis rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.
Spinnaker Echo Service Vulnerable to Spring Expression Language Injection
2 rules 1 TTP 1 CVEUnrestricted access to the JVM via Spring Expression Language (SPeL) in Spinnaker's Echo service allows for arbitrary code execution, enabling attackers to invoke commands and access files.
Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability
2 rules 3 TTPs 1 CVEThe Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.
CVE-2026-26149 Microsoft Power Apps Spoofing Vulnerability
2 rules 1 CVEA spoofing vulnerability exists in Microsoft Power Apps, identified as CVE-2026-26149, potentially allowing an attacker to mislead users or gain unauthorized access.
Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)
2 rules 1 TTP 1 CVEAn improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.
Tenda F451 Router Buffer Overflow Vulnerability
2 rules 2 TTPsA buffer overflow vulnerability (CVE-2026-6631) in Tenda F451 router version 1.0.0.7_cn_svn7958 allows remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/webExcptypemanFilter component.
Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)
2 rules 1 TTPA SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.
Langflow Multiple Vulnerabilities
2 rules 2 TTPsMultiple vulnerabilities in Langflow allow an attacker to manipulate files, disclose sensitive information, or conduct cross-site scripting attacks.
Multiple Vulnerabilities in Gitea
1 rule 1 TTPMultiple vulnerabilities in Gitea could allow an attacker to disclose information, bypass security measures, and perform cross-site scripting attacks.
Multiple Vulnerabilities in Firebird Database Server
2 rules 3 TTPsMultiple vulnerabilities in Firebird allow an attacker to execute arbitrary code with administrator privileges, disclose sensitive information, or cause a denial-of-service condition.
Moxi Blog v2 <= 5.2 Server-Side Request Forgery Vulnerability
2 rules 1 TTPA server-side request forgery (SSRF) vulnerability exists in moxi624 Mogu Blog v2 up to version 5.2, specifically affecting the `LocalFileServiceImpl.uploadPictureByUrl` function, allowing remote attackers to potentially interact with internal resources.
ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability
2 rules 2 TTPs 1 CVETeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.
Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5964)
2 rules 1 TTP 1 CVEDigiwin's EasyFlow .NET is susceptible to a SQL Injection vulnerability, enabling unauthenticated remote attackers to inject arbitrary SQL commands for unauthorized database access, modification, and deletion.
Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5963)
2 rules 1 TTPDigiwin EasyFlow .NET is vulnerable to SQL Injection, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Modelscope Agentscope Code Injection Vulnerability (CVE-2026-6603)
2 rules 1 TTPA code injection vulnerability exists in modelscope agentscope up to version 1.0.18, specifically affecting the execute_python_code/execute_shell_command functions, allowing for remote code execution.
Silex Technology SD-330AC and AMC Manager Insecure Default Password Vulnerability (CVE-2026-32965)
2 rules 1 CVESilex Technology's SD-330AC and AMC Manager are vulnerable to insecure default initialization, allowing a null string password to be set upon initial network connection (CVE-2026-32965).
Langflow Unrestricted File Upload Vulnerability (CVE-2026-6596)
2 rules 2 TTPsAn unrestricted file upload vulnerability in langflow-ai langflow versions up to 1.1.0 allows remote attackers to execute arbitrary code via the create_upload_file function in the API Endpoint.
brikcss merge Prototype Pollution Vulnerability (CVE-2026-6594)
2 rules 2 TTPs 1 CVEA prototype pollution vulnerability (CVE-2026-6594) in brikcss merge up to version 1.3.0 allows remote attackers to modify object prototype attributes by manipulating the __proto__/constructor.prototype/prototype argument.
liangliangyy DjangoBlog Hardcoded Cryptographic Key Vulnerability (CVE-2026-6580)
2 rules 1 CVECVE-2026-6580 describes a vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 where manipulation of the 'key' argument in the Amap API Call Handler leads to the use of a hard-coded cryptographic key, enabling remote exploitation.
H3C Magic B1 Router Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability (CVE-2026-6581) in H3C Magic B1 routers allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the SetMobileAPInfoById function.
liangliangyy DjangoBlog Authentication Bypass Vulnerability (CVE-2026-6577)
2 rules 1 TTP 1 CVEA critical authentication bypass vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 (CVE-2026-6577) allows remote attackers to inject arbitrary GPS data without authentication via the logtracks endpoint, potentially leading to data manipulation and unauthorized access.
Apple Account Notification Phishing Campaign
2 rules 1 TTP 5 IOCsA phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.
osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)
2 rules 1 TTP 1 CVECVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture <= 1.2.2, leading to hardcoded credentials exposure.
H3C Magic B0 Router Buffer Overflow Vulnerability (CVE-2026-6560)
2 rules 1 TTP 1 CVEA buffer overflow vulnerability (CVE-2026-6560) in H3C Magic B0 up to 100R002 allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the Edit_BasicSSID function of the /goform/aspForm file.
WeGIA SQL Injection Vulnerability (CVE-2026-40285)
2 rules 1 TTP 1 CVEWeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.
Sentry SAML SSO Improper Authentication Vulnerability
2 rules 1 TTP 1 CVEA critical vulnerability in Sentry's SAML SSO implementation allows account takeover by exploiting improper authentication when multiple organizations are configured, affecting versions 21.12.0 to 26.2.0 and requiring a malicious SAML Identity Provider and knowledge of the victim's email address.
PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix
2 rules 1 TTP 1 CVEPraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.
OpenClaw Webchat Media Embedding Local-Root Containment Bypass
2 rules 2 TTPsA vulnerability in OpenClaw versions 2026.4.7 to before 2026.4.15 allows a crafted tool-result media reference to cause the host to attempt local file reads or Windows UNC/network path access, potentially disclosing files or network credentials.
FastGPT NoSQL Injection Vulnerability (CVE-2026-40351)
2 rules 1 TTP 1 CVE 3 IOCsFastGPT versions before 4.14.9.5 are vulnerable to NoSQL injection, allowing unauthenticated attackers to bypass authentication and gain administrative access.
Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration
2 rules 1 TTP 1 CVEDolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.
DNN (DotNetNuke) SVG Upload Vulnerability (CVE-2026-40321)
2 rules 3 TTPs 1 CVEDNN (formerly DotNetNuke) before 10.2.2 is vulnerable to stored cross-site scripting (XSS) via malicious SVG file uploads, potentially leading to account takeover and arbitrary code execution.
compressing npm Package Symlink Bypass Vulnerability
3 rules 5 TTPs 1 CVE 1 IOCA vulnerability in the `compressing` npm package (<=v2.1.0) allows for arbitrary file overwrite via symlink path traversal, bypassing a previous patch for CVE-2026-24884.
Anviz CrossChex Standard TDS7 PreLogin Encryption Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAnviz CrossChex Standard is vulnerable to unauthorized database access due to the manipulation of TDS7 PreLogin, which disables encryption, leading to plaintext transmission of database credentials.
Firebird Server Denial-of-Service Vulnerability (CVE-2026-28224)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can trigger a denial-of-service condition on vulnerable Firebird servers by sending a specially crafted op_crypt_key_callback packet, leading to a null pointer dereference and server crash.
NovumOS MemoryMapRange Privilege Escalation Vulnerability (CVE-2026-40572)
2 rules 1 TTP 1 CVEA vulnerability exists in NovumOS versions prior to 0.24 where the MemoryMapRange syscall allows user-mode processes to map arbitrary virtual address ranges, including kernel structures, leading to privilege escalation.
NovumOS Local Privilege Escalation via Unvalidated Syscall
3 rules 1 TTP 1 CVEA local privilege escalation vulnerability exists in NovumOS versions before 0.24, where Syscall 12 (JumpToUser) lacks input validation, allowing user-mode processes to execute arbitrary code in kernel mode.
SecureDrop Client Code Execution via Gzip Extraction Vulnerability
2 rules 1 TTP 2 CVEsA compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.
Dagster SQL Injection Vulnerability in Dynamic Partition Keys
2 rules 6 TTPsA SQL injection vulnerability exists in Dagster's DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers, where a user with 'Add Dynamic Partitions' permission can inject arbitrary SQL due to improper escaping of dynamic partition key values, leading to unauthorized data access or modification.
YesWiki Authenticated SQL Injection Vulnerability
2 rules 1 TTP 2 IOCsYesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.
Movary SSRF Vulnerability (CVE-2026-40348)
2 rules 2 TTPs 1 CVEMovary versions before 0.71.1 are vulnerable to server-side request forgery (SSRF) via the `/settings/jellyfin/server-url-verify` endpoint, allowing authenticated users to probe internal network resources.
Movary Privilege Escalation Vulnerability (CVE-2026-40349)
2 rules 1 TTP 1 CVE 1 IOCMovary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.
FastGPT NoSQL Injection Vulnerability in Password Change Endpoint
2 rules 2 TTPs 1 CVEFastGPT versions prior to 4.14.9.5 are vulnerable to NoSQL injection in the password change endpoint, allowing authenticated attackers to bypass password verification and perform account takeover.
OpenClaw Environment Variable Injection Vulnerability
2 rules 1 TTPThe openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.
WeGIA Stored Cross-Site Scripting Vulnerability (CVE-2026-40286)
2 rules 1 TTP 1 CVEA stored Cross-Site Scripting (XSS) vulnerability exists in WeGIA versions prior to 3.6.10, allowing attackers to inject malicious scripts into the 'Member Name' field during member registration, leading to persistent execution upon user access.
Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification
2 rules 1 TTP 1 CVEAnviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.
Anviz CrossChex Standard TCP Packet Injection Vulnerability
2 rules 2 TTPs 1 CVE 4 IOCsAnviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.
Firebird Path Traversal Vulnerability Leads to Code Execution (CVE-2026-40342)
2 rules 2 TTPs 1 CVEAn authenticated user with CREATE FUNCTION privileges can exploit a path traversal vulnerability in Firebird versions prior to 5.0.4, 4.0.7, and 3.0.14, to load an arbitrary shared library leading to code execution as the server's OS account.
Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)
2 rules 1 TTP 1 CVEAnviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.
Anviz CX2 Lite and CX7 Unauthenticated Remote Code Execution via Unverified Update Packages (CVE-2026-40066)
2 rules 1 TTP 1 CVEAnviz CX2 Lite and CX7 devices are vulnerable to unverified update packages that allow for unauthenticated remote code execution by unpacking and executing a malicious script.
xrdp Privilege Escalation Vulnerability (CVE-2026-32107)
2 rules 2 TTPs 1 CVE 1 IOCxrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.
OpenViking Authentication Bypass Vulnerability (CVE-2026-40525)
2 rules 1 TTP 1 CVEOpenViking versions prior to commit c7bb167 are vulnerable to an authentication bypass that allows remote attackers to invoke privileged bot-control functionality without authentication when the api_key configuration is unset or empty, potentially leading to unauthorized access to downstream systems and data.
Firebird Database Server Slice Packet Deserialization Buffer Overflow
2 rules 2 TTPs 1 CVEFirebird versions before 5.0.4, 4.0.7, and 3.0.14 are vulnerable to a buffer overflow in the xdr_datum() function during slice packet deserialization, enabling unauthenticated attackers to cause a crash or potentially achieve arbitrary code execution by sending a malicious packet.
Firebird FB3 Client Library Information Leak (CVE-2025-65104)
2 rules 1 TTP 1 CVE 1 IOCFirebird FB3 client library incorrectly handles data lengths when communicating with FB4+ servers, leading to an information leak exploitable by a local attacker.
ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability
2 rules 1 TTP 1 CVEByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.
WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability
2 rules 1 TTP 1 CVEThe WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.
FlowiseAI File Upload Validation Bypass Leads to RCE
2 rules 2 TTPs 1 CVEA file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).
Dnsmasq Out-of-Bounds Write Vulnerability (CVE-2026-6507)
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-6507) in dnsmasq by sending a specially crafted BOOTREPLY packet to a server configured with the `--dhcp-split-relay` option, leading to a denial of service.
zrok Unauthenticated Denial-of-Service Vulnerability
2 rules 1 TTPAn unauthenticated attacker can cause a denial-of-service (DoS) in zrok by sending a crafted HTTP request with a large cookie chunk count to an OAuth-protected proxy share, triggering unbounded memory allocation and leading to process termination.
Paperclip Unauthenticated API Access Vulnerability
2 rules 3 TTPsPaperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.
Paperclip Cross-Tenant Agent API Token Minting Vulnerability
2 rules 3 TTPsA vulnerability in Paperclip allows any authenticated user to mint agent API tokens for other tenants, leading to unauthorized access and control due to missing company access checks.
OCaml opam Path Traversal Vulnerability (CVE-2026-41082)
2 rules 1 TTP 1 CVEOCaml opam before 2.5.1 is vulnerable to path traversal via a crafted .install file, potentially allowing attackers to overwrite arbitrary files.
Meridian Library Multiple Defense-in-Depth Gaps
3 rules 5 TTPsMultiple defense-in-depth gaps exist in Meridian versions prior to 2.1.1, including high severity issues related to bypassing safety caps on collection mapping that can lead to resource exhaustion, along with medium and low severity issues affecting constructor selection, telemetry, retry mechanisms, and exception handling.
ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)
2 rules 4 TTPs 1 CVEAn authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.
Kyverno ConfigMap Cross-Namespace Read RBAC Bypass (CVE-2026-22039 Incomplete Fix)
2 rules 1 TTP 1 CVECVE-2026-22039 incompletely fixed a cross-namespace privilege escalation vulnerability in Kyverno's apiCall context, as the ConfigMap context loader still lacks namespace validation, allowing a namespace admin to read ConfigMaps from any namespace using Kyverno's privileged service account, leading to a complete RBAC bypass in multi-tenant Kubernetes clusters.
Flowise Authenticated Remote Code Execution via MCP Adapter
3 rules 1 TTPFlowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.
Clerk JavaScript SDK Middleware Route Protection Bypass
3 rules 1 TTPA vulnerability in `@clerk/nextjs`, `@clerk/nuxt`, and `@clerk/astro` allows crafted requests to bypass middleware gating via `createRouteMatcher`, potentially exposing protected routes if downstream authentication checks are absent.
Better Auth OAuth Provider Authorization Bypass Vulnerability
2 rules 2 TTPsAn authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.
Wavlink WL-WN530H4 OS Command Injection Vulnerability
2 rules 2 TTPs 1 CVEA remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.
Dell PowerProtect Data Domain Improper Certificate Validation Vulnerability
2 rules 1 TTP 1 CVEDell PowerProtect Data Domain versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.60, contain an improper certificate validation vulnerability in certificate-based login, potentially leading to privilege escalation.
Dell Storage Manager Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in Dell Storage Manager to escalate their privileges on the system.
Critical Certificate Validation Vulnerability in CISCO Webex Allows User Impersonation
2 rules 3 TTPs 1 CVEA critical improper certificate validation vulnerability in CISCO Webex versions 39.6 - 45.4 (CVE-2026-20184) allows a remote, unprivileged attacker to impersonate users, gain unauthorized access, and join meetings without authorization, potentially impacting confidentiality, integrity, and availability.
Dell PowerProtect Data Domain Command Injection Vulnerability (CVE-2026-23778)
2 rules 3 TTPs 1 CVE 1 IOCA command injection vulnerability in Dell PowerProtect Data Domain (CVE-2026-23778) could allow a remote, high-privileged attacker to gain root-level access.
Dell PowerProtect Data Domain BoostFS Credential Exposure Vulnerability (CVE-2025-36568)
2 rules 1 TTP 1 CVEDell PowerProtect Data Domain BoostFS versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50 are vulnerable to an insufficiently protected credentials vulnerability, allowing a low-privileged attacker with local access to expose credentials and potentially gain elevated privileges.
Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution
2 rules 3 TTPs 3 CVEsMultiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.
JetBrains YouTrack RCE via Sandbox Bypass (CVE-2026-33392)
2 rules 1 TTP 1 CVEA high privileged user can achieve remote code execution via sandbox bypass in JetBrains YouTrack before version 2025.3.131383, identified as CVE-2026-33392, potentially leading to complete system compromise.
Dell PowerProtect Data Domain Weak Credentials Vulnerability (CVE-2026-23853)
3 rules 2 TTPs 1 CVE 2 IOCsDell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability (CVE-2026-23853) that can lead to unauthorized access by a local attacker.
Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)
2 rules 1 TTP 1 CVEThe Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.
Mobatek MobaXterm Home Edition Uncontrolled Search Path Vulnerability (CVE-2026-6421)
2 rules 1 TTP 1 CVECVE-2026-6421 is an uncontrolled search path vulnerability in Mobatek MobaXterm Home Edition up to version 26.1, affecting msimg32.dll, that can be exploited locally with high complexity.
HashiCorp Vault Denial-of-Service Vulnerability (CVE-2026-5807)
2 rules 1 TTP 1 CVEHashiCorp Vault is vulnerable to a denial-of-service (DoS) condition, identified as CVE-2026-5807, where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, preventing legitimate operators from completing these workflows.
Vault Token Leak via Authorization Header Forwarding
2 rules 1 TTP 1 CVE 1 IOCVault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
Vault kvv2 Policy Bypass Vulnerability Leading to Denial-of-Service (CVE-2026-3605)
2 rules 1 TTP 1 CVE 1 IOCAn authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service, addressed in Vault versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
Paperclip Cross-Tenant Agent API Key IDOR Vulnerability
3 rules 5 TTPsA Paperclip API vulnerability allows a board user from one company to create, list, and revoke agent API keys in another company, leading to full cross-tenant compromise due to insufficient authorization checks on `/agents/:id/keys` routes.
Paperclip codex_local Unauthorized Gmail Access
2 rules 5 TTPsA Paperclip-managed `codex_local` runtime can access and utilize Gmail connectors connected in the ChatGPT/OpenAI apps UI without explicit Paperclip configuration, allowing unauthorized mailbox access and email sending capabilities due to a trust-boundary failure and dangerous default runtime settings.
Flowise SSRF Protection Bypass via Unprotected Built-in HTTP Modules
2 rules 1 TTPFlowise is vulnerable to SSRF protection bypass via unprotected built-in HTTP modules in the custom function sandbox, allowing authenticated users to access internal network resources by exploiting the lack of SSRF protection on Node.js `http`, `https`, and `net` modules.
FlowiseAI AirtableAgent Remote Code Execution via Prompt Injection
2 rules 1 TTPA remote code execution vulnerability exists in FlowiseAI's AirtableAgent.ts due to insufficient input verification when using Pandas, allowing attackers to inject malicious code into the prompt and execute arbitrary code via Pyodide.
@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)
2 rules 1 TTP 1 CVEA middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.
Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)
2 rules 2 TTPs 1 CVEWeblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.
Pyroscope Secret Key Exposure via Tencent COS Configuration (CVE-2025-41118)
2 rules 2 TTPs 1 CVECVE-2025-41118 allows an attacker with direct access to the Pyroscope API, when configured with Tencent COS, to extract the secret_key configuration value, potentially leading to unauthorized access to the cloud storage backend.
Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)
2 rules 1 TTP 1 CVE 1 IOCA missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.
Mirax RAT Targeting Android Users in Europe
2 rules 4 TTPsMirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.
Malicious Chrome Extensions Stealing Data and Opening Backdoors
2 rules 6 TTPsA coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.
Google Chrome V8 Type Confusion Vulnerability (CVE-2026-6363)
2 rules 2 TTPs 1 CVEA type confusion vulnerability (CVE-2026-6363) in Google Chrome's V8 JavaScript engine before version 147.0.7727.101 allows a remote attacker to potentially perform out-of-bounds memory access via a crafted HTML page.
Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)
2 rules 1 TTP 1 CVEA type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.
Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)
2 rules 1 TTP 1 CVE 1 IOCA remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.
Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)
2 rules 1 TTP 1 CVEGoogle Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome Dawn Use-After-Free Vulnerability (CVE-2026-6310)
2 rules 2 TTPs 1 CVE 1 IOCA use-after-free vulnerability (CVE-2026-6310) in Google Chrome's Dawn component allows a remote attacker, having compromised the renderer process, to potentially execute a sandbox escape via a specially crafted HTML page.
Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)
1 rule 1 TTP 1 CVEA use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.
Dragon Boss Solutions Adware Disabling Antivirus Protections
2 rules 2 TTPs 2 IOCsDigitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.
Multiple Vulnerabilities in Kyverno Allow Privilege Escalation and Data Manipulation
3 rules 6 TTPsAn authenticated remote attacker can exploit multiple vulnerabilities in Kyverno to disclose information, bypass security measures, manipulate data, and gain elevated privileges.
Multiple Vulnerabilities in Cisco Unity Connection
2 rules 1 TTPMultiple vulnerabilities in Cisco Unity Connection can be exploited by an attacker to conduct cross-site scripting attacks, redirect users to malicious websites, manipulate data, and disclose confidential information.
Multiple Vulnerabilities in libssh Allow File Manipulation and DoS
2 rules 1 TTPMultiple vulnerabilities in libssh allow an attacker to manipulate files or cause a denial-of-service condition, potentially leading to data corruption or service disruption.
Grafana Vulnerability Allows File Manipulation and Information Disclosure
2 rules 4 TTPsA remote, authenticated attacker can exploit a vulnerability in Grafana to manipulate files and disclose sensitive information, potentially leading to persistence, unauthorized access, and significant impact.
PowMix Botnet Targeting Czech Workforce
3 rules 5 TTPs 1 IOCThe PowMix botnet campaign targets Czech organizations, particularly HR, legal, and recruitment agencies, using compliance-themed lures delivered via phishing emails, with the attack employing a Windows shortcut file that executes a PowerShell loader to bypass AMSI and deploy the botnet payload in memory.
rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)
2 rules 1 TTP 1 CVErsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.
AcyMailing Plugin Privilege Escalation Vulnerability (CVE-2026-3614)
2 rules 1 TTP 1 CVEThe AcyMailing plugin for WordPress is vulnerable to privilege escalation (CVE-2026-3614), allowing authenticated attackers with subscriber-level access to gain administrative privileges.
Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.
Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)
2 rules 2 TTPs 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.
Apache ActiveMQ Multiple Vulnerabilities Allow Remote Code Execution
2 rules 1 TTPAn authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to manipulate files or execute arbitrary code.
Openfind MailGates/MailAudit CRLF Injection Vulnerability
2 rules 1 TTP 1 CVEOpenfind MailGates/MailAudit is vulnerable to CRLF injection (CVE-2026-6351), enabling unauthenticated remote attackers to read system files by injecting malicious CRLF sequences.
Simopro WinMatrix Agent Missing Authentication Vulnerability (CVE-2026-6348)
2 rules 2 TTPs 1 CVEThe WinMatrix agent by Simopro Technology suffers from a missing authentication vulnerability (CVE-2026-6348), enabling local authenticated attackers to execute arbitrary code with SYSTEM privileges on the local machine and all hosts within the agent's environment.
Openfind MailGates/MailAudit Stack-based Buffer Overflow (CVE-2026-6350)
2 rules 1 TTP 1 CVEOpenfind MailGates/MailAudit is vulnerable to a stack-based buffer overflow (CVE-2026-6350) allowing unauthenticated remote attackers to execute arbitrary code by controlling the program's execution flow.
Radare2 Command Injection Vulnerability (CVE-2026-41015)
2 rules 1 TTP 1 CVERadare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.
Creolabs Gravity Heap Buffer Overflow Vulnerability (CVE-2026-40504)
2 rules 3 TTPs 1 CVECreolabs Gravity before 0.9.6 is vulnerable to a heap buffer overflow in the gravity_vm_exec function, allowing attackers to achieve arbitrary code execution by crafting scripts with many string literals at global scope that exploit insufficient bounds checking in gravity_fiber_reassign().
wger Broken Access Control in Global Gym Configuration Update Endpoint
2 rules 1 TTPThe wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.
Luanti LuaJIT Sandbox Escape (CVE-2026-40959)
2 rules 2 TTPs 1 CVELuanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod, potentially leading to arbitrary code execution.
Luanti 5 Improper Access Control Vulnerability (CVE-2026-40960)
2 rules 1 TTP 1 CVE 1 IOCLuanti 5 before 5.15.2 allows unintended access to an insecure environment if a crafted mod intercepts requests when secure mods are enabled, potentially leading to unauthorized access and control.
Fastify Proxy Header Stripping Vulnerability
2 rules 2 TTPsThe `@fastify/reply-from` and `@fastify/http-proxy` libraries process the client's `Connection` header after adding headers, allowing attackers to strip proxy-added headers via the `Connection` header, leading to potential bypass of security controls.
ArgoCD Image Updater Namespace Bypass Vulnerability (CVE-2026-6388)
2 rules 1 TTP 1 CVECVE-2026-6388 describes a flaw in ArgoCD Image Updater that allows an attacker with permissions to create or modify an ImageUpdater resource in a multi-tenant environment to bypass namespace boundaries and trigger unauthorized image updates.
Barracuda RMM Privilege Escalation via Filesystem ACLs
2 rules 1 TTP 1 CVEBarracuda RMM versions prior to 2025.2.2 are vulnerable to local privilege escalation, allowing attackers to gain SYSTEM privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory.
GIMP GIF Image Buffer Overflow Vulnerability
2 rules 3 TTPs 1 CVEA buffer overflow vulnerability in the GIF image loading component of GIMP allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file, potentially leading to denial of service or arbitrary code execution.
Google Chrome Proxy Use-After-Free Vulnerability (CVE-2026-6297)
2 rules 1 TTP 1 CVECVE-2026-6297 is a critical use-after-free vulnerability in the Proxy component of Google Chrome before version 147.0.7727.101, enabling a privileged network attacker to potentially achieve sandbox escape via a crafted HTML page.
Fastify Body Schema Validation Bypass via Leading Space in Content-Type Header
2 rules 1 TTP 2 CVEsFastify v5.x is vulnerable to a body schema validation bypass, allowing attackers to circumvent request body validation by prepending a single space to the Content-Type header, potentially compromising data integrity and security constraints.
Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)
2 rules 3 TTPs 1 CVEWeblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.
Weblate Path Traversal Vulnerability in ZIP Download Feature (CVE-2026-34242)
2 rules 2 TTPs 1 CVEWeblate versions before 5.17 are vulnerable to path traversal due to improper verification of downloaded files in the ZIP download feature, potentially allowing attackers to access files outside the intended repository.
Velociraptor Authentication Bypass via query() Plugin
2 rules 2 TTPs 1 CVEVelociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.
Git for Windows NTLM Hash Leak Vulnerability (CVE-2026-32631)
2 rules 1 TTP 1 CVEGit for Windows versions prior to 2.53.0.windows.3 are vulnerable to NTLM hash theft by attackers who can trick users into cloning malicious repositories or checking out malicious branches, leading to potential credential compromise.
WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)
2 rules 1 TTP 1 CVE 1 IOCAn SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.
Splunk MCP Server App Cleartext Credential Exposure (CVE-2026-20205)
2 rules 1 TTP 1 CVEA user with access to the `_internal` index or the `mcp_tool_admin` capability in Splunk MCP Server app versions below 1.0.3 can view user session and authorization tokens in clear text, leading to potential credential compromise.
Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name
3 rules 1 TTPZarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.
Windows WinSock Use-After-Free Privilege Escalation (CVE-2026-26177)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26177 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a local attacker to elevate privileges.
Windows WinSock Race Condition Privilege Escalation (CVE-2026-26173)
2 rules 1 TTP 1 CVECVE-2026-26173 is a race condition vulnerability in the Windows Ancillary Function Driver for WinSock that allows a local attacker to elevate privileges.
Windows Win32K GRFX Privilege Escalation via Race Condition (CVE-2026-33104)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-33104 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.
Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.
Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.
Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)
2 rules 2 TTPs 1 CVECVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.
Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)
2 rules 1 TTP 1 CVECVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.
Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)
2 rules 2 TTPs 1 CVECVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)
2 rules 1 TTP 1 CVECVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.
Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)
2 rules 1 TTP 1 CVECVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.
Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.
Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.
Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.
Windows BitLocker Security Feature Bypass Vulnerability (CVE-2026-27913)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27913 describes an improper input validation vulnerability in Windows BitLocker that allows a local attacker to bypass security features.
Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)
2 rules 1 TTP 1 CVEA Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.
SQL Server Untrusted Pointer Dereference Vulnerability (CVE-2026-33120)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-33120 is an untrusted pointer dereference vulnerability in Microsoft SQL Server that allows an authenticated attacker to achieve remote code execution over a network.
OAuth2 Proxy Authentication Bypass via User-Agent Header
2 rules 1 TTPA critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.
Microsoft Word Use-After-Free Vulnerability CVE-2026-23657
2 rules 1 TTP 1 CVECVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.
Microsoft PowerShell Improper Input Validation Vulnerability (CVE-2026-26143)
2 rules 1 TTP 1 CVE 2 IOCsAn improper input validation vulnerability (CVE-2026-26143) in Microsoft PowerShell allows an unauthorized local attacker to bypass security features.
Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)
3 rules 1 TTP 1 CVECVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.
Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.
Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.
Microsoft Excel Out-of-Bounds Read Vulnerability (CVE-2026-32188)
2 rules 1 TTP 1 CVEAn out-of-bounds read vulnerability in Microsoft Office Excel (CVE-2026-32188) allows a local attacker to potentially disclose sensitive information through a maliciously crafted Excel file.
Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.
manikandan580 School-management-system SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA time-based blind SQL injection vulnerability in manikandan580 School-management-system 1.0 allows unauthenticated attackers to potentially execute arbitrary SQL queries and gain unauthorized access to sensitive information.
Libsixel Use-After-Free Vulnerability (CVE-2026-33018)
2 rules 1 TTP 1 CVEA use-after-free vulnerability exists in libsixel versions 1.8.7 and prior when processing animated GIFs due to improper frame buffer management, potentially leading to code execution.
Krayin CRM v2.2.x SQL Injection Vulnerability
2 rules 1 TTP 1 CVEKrayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.
Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
2 rules 1 TTP 1 CVE 2 IOCsJetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.
Go Markdown Library Out-of-Bounds Read Vulnerability
2 rules 1 TTPA vulnerability in the go-markdown library exists where processing a malformed input containing a '<' character that is not followed by a '>' character with a SmartypantsRenderer can lead to an out-of-bounds read or a panic, causing a denial of service.
Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)
2 rules 1 TTP 1 CVE 1 IOCFortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.
Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)
2 rules 3 TTPs 1 CVEAn SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.
CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAn improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.
CVE-2026-33824: Windows IKE Extension Double Free Vulnerability
2 rules 3 TTPs 1 CVE 1 IOCA double free vulnerability in the Windows IKE Extension, tracked as CVE-2026-33824, allows an unauthenticated remote attacker to execute arbitrary code over the network.
CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.
CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVEA use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.
CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver
2 rules 1 TTP 1 CVECVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.
CVE-2026-33096 HTTP.sys Out-of-Bounds Read Denial-of-Service
2 rules 2 TTPs 1 CVEAn unauthenticated, remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-33096) in Windows HTTP.sys to cause a denial-of-service condition.
CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.
CVE-2026-32164 Windows User Interface Core Race Condition Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32164 is a race condition vulnerability in Windows User Interface Core that allows a locally authorized attacker to elevate privileges.
CVE-2026-32157 - Remote Desktop Client Use-After-Free Vulnerability
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32157 is a use-after-free vulnerability in the Remote Desktop Client that allows an unauthorized attacker to execute code over a network.
CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.
CVE-2026-32153 Windows Speech Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32153 is a use-after-free vulnerability in Microsoft Windows Speech that allows a locally authorized attacker to elevate privileges.
CVE-2026-32152 Use-After-Free in Desktop Window Manager
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32152 is a use-after-free vulnerability in the Desktop Window Manager (dwm.exe) that allows an authorized local attacker to elevate privileges.
CVE-2026-32078: Windows Projected File System Use-After-Free Elevation of Privilege
2 rules 1 TTP 1 CVEA use-after-free vulnerability, CVE-2026-32078, exists in the Windows Projected File System, allowing a locally authenticated attacker to escalate privileges.
CVE-2026-32071: Windows LSASS Null Pointer Dereference DoS
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32071 is a null pointer dereference vulnerability in the Windows Local Security Authority Subsystem Service (LSASS), allowing an unauthorized network attacker to cause a denial-of-service condition.
CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation
3 rules 1 TTP 1 CVECVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.
CVE-2026-27916 Use-After-Free in Windows UPnP Device Host
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.
CVE-2026-27910: Windows Installer Local Privilege Escalation
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.
CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.
CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.
CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.
CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.
CVE-2026-26179 Windows Kernel Double Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.
CVE-2026-26163: Windows Kernel Double Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26163 is a double free vulnerability in the Windows Kernel, allowing an authorized attacker to elevate privileges locally with a CVSS v3.1 score of 7.8.
CVE-2026-26153: Windows EFS Out-of-Bounds Read Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26153 is an out-of-bounds read vulnerability in the Windows Encrypting File System (EFS) that allows an authorized local attacker to elevate privileges.
CVE-2026-26152: Windows Cryptographic Services Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26152 is an insecure storage of sensitive information vulnerability in Windows Cryptographic Services that allows a local, authorized attacker to elevate privileges.
Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime
2 rules 2 TTPs 1 CVECVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.
Composer Command Injection via Malicious Perforce Repository
2 rules 1 TTPComposer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.
Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.
Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.
Autodesk Fusion Stored XSS Vulnerability (CVE-2026-4344)
2 rules 3 TTPs 1 CVE 3 IOCsCVE-2026-4344 is a stored cross-site scripting (XSS) vulnerability in the Autodesk Fusion desktop application where a malicious HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can lead to arbitrary code execution.
Adobe Photoshop Out-of-Bounds Read Vulnerability (CVE-2026-27289)
2 rules 3 TTPs 1 CVE 2 IOCsAn out-of-bounds read vulnerability (CVE-2026-27289) in Adobe Photoshop Desktop versions 27.4 and earlier allows for potential code execution via a crafted file, requiring user interaction to trigger the exploit.
Adobe InDesign Heap-Based Buffer Overflow Vulnerability (CVE-2026-34629)
2 rules 2 TTPs 1 CVEAdobe InDesign versions 20.5.2, 21.2 and earlier are vulnerable to a heap-based buffer overflow (CVE-2026-34629) that could lead to arbitrary code execution if a user opens a malicious file.
Adobe ColdFusion Path Traversal Vulnerability (CVE-2026-34619)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-34619) in Adobe ColdFusion versions 2023.18, 2025.6, and earlier allows an attacker to bypass security features and access unauthorized files or directories without user interaction.
Adobe ColdFusion Improper Input Validation Vulnerability (CVE-2026-27306)
2 rules 1 TTP 1 CVEAn improper input validation vulnerability in Adobe ColdFusion versions 2023.18, 2025.6, and earlier (CVE-2026-27306) could lead to arbitrary code execution if a privileged user opens a specially crafted malicious file.
Adobe ColdFusion Improper Input Validation RCE
2 rules 1 TTP 1 CVE 1 IOCAdobe ColdFusion versions 2023.18, 2025.6, and earlier are vulnerable to improper input validation, potentially leading to arbitrary code execution without user interaction.
Adobe Bridge Heap-based Buffer Overflow Vulnerability (CVE-2026-27312)
2 rules 2 TTPs 1 CVEA heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4 and earlier can lead to arbitrary code execution if a user opens a malicious file.
Adobe Bridge Heap-Based Buffer Overflow Vulnerability (CVE-2026-27311)
2 rules 1 TTP 1 CVEA heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4, and earlier (CVE-2026-27311) allows for arbitrary code execution when a user opens a specially crafted file.
Adobe Acrobat Reader Prototype Pollution Vulnerability (CVE-2026-34622)
2 rules 1 TTP 1 CVEA prototype pollution vulnerability in Adobe Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier (CVE-2026-34622) allows for arbitrary code execution when a user opens a specially crafted malicious file.
.NET Uncontrolled Resource Consumption Vulnerability (CVE-2026-26171)
1 rule 1 CVECVE-2026-26171 is a vulnerability in .NET that allows an unauthorized attacker to perform a denial-of-service attack over a network due to uncontrolled resource consumption.
Multiple Vulnerabilities in Red Hat Ansible Automation Platform
2 rules 6 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in Red Hat Ansible Automation Platform to perform denial of service, execute arbitrary code, bypass security measures, manipulate data, disclose information, or conduct XSS attacks.
n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting
2 rules 6 TTPs 2 IOCsThreat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.
Keycloak Cross-Site Scripting Vulnerability
2 rules 1 TTPAn authenticated remote attacker can exploit a vulnerability in Keycloak to perform a Cross-Site Scripting attack, potentially leading to unauthorized access and data compromise.
Kyverno SSRF Vulnerability in CEL HTTP Library
2 rules 3 TTPs 1 CVE 4 IOCsA Server-Side Request Forgery (SSRF) vulnerability in Kyverno's CEL HTTP library allows users with namespace-scoped policy creation permissions to make arbitrary HTTP requests, enabling unauthorized access to internal services, cloud metadata endpoints, and data exfiltration.
Kyverno Service Account Token Leak via API Call
2 rules 1 TTP 5 IOCsKyverno's apiCall serviceCall helper implicitly injects the Kyverno controller service account token into requests when policies lack an explicit Authorization header, allowing exfiltration to attacker-controlled endpoints and unauthorized actions.
free5gc UDR Improper Path Validation Allows Unauthenticated Access to Traffic Influence Subscriptions
2 rules 2 TTPs 1 IOCAn improper path validation vulnerability exists in the free5gc UDR service, allowing unauthenticated attackers with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions.
CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.
Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.
CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.
CVE-2026-26183 Windows RPC API Local Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.
Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.
Adobe Connect XSS Vulnerability Leading to Privilege Escalation
2 rules 1 TTP 1 CVEAdobe Connect versions 2025.3, 12.10, and earlier are susceptible to a Cross-Site Scripting (XSS) vulnerability (CVE-2026-34617) that can lead to privilege escalation if a user interacts with a malicious URL or compromised web page.
CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.
Microsoft Graphics Component Heap-based Buffer Overflow Vulnerability (CVE-2026-32221)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32221 is a heap-based buffer overflow vulnerability in the Microsoft Graphics Component, allowing a local attacker to execute arbitrary code.
CVE-2026-32224 Use-After-Free in Windows Server Update Service
2 rules 1 TTP 1 CVECVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.
Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)
2 rules 1 TTP 1 CVECVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.
Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.
.NET Spoofing Vulnerability (CVE-2026-32178)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.
CVE-2026-32165 Use-After-Free in Windows User Interface Core
2 rules 1 TTP 1 CVECVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.
Windows COM Privilege Escalation via CVE-2026-32162
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.
Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)
2 rules 1 TTP 1 CVECVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.
CVE-2026-32087 Function Discovery Service Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.
CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.
Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.
Windows Shell Race Condition Vulnerability (CVE-2026-27918)
2 rules 1 TTP 1 CVECVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.
Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.
Adobe Connect Reflected XSS Vulnerability (CVE-2026-27245)
2 rules 1 TTP 1 CVE 3 IOCsAdobe Connect versions 2025.3, 12.10, and earlier are vulnerable to a reflected Cross-Site Scripting (XSS) attack, enabling attackers to execute malicious JavaScript in a victim's browser by enticing them to visit a crafted URL.
Windows WARP Integer Truncation Privilege Escalation (CVE-2026-26178)
2 rules 1 TTP 1 CVECVE-2026-26178 is an integer size truncation vulnerability in the Windows Advanced Rasterization Platform (WARP) that allows an unauthorized attacker to elevate privileges locally.
CVE-2026-26176 Windows CSC Driver Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.
Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).
Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)
2 rules 1 TTP 1 CVE 2 IOCsA path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.
Webkul Krayin CRM BOLA Vulnerability (CVE-2026-38529)
2 rules 1 TTP 1 CVECVE-2026-38529 is a Broken Object-Level Authorization (BOLA) vulnerability in Webkul Krayin CRM v2.2.x that allows authenticated attackers to reset user passwords and take over accounts.
Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)
2 rules 2 TTPs 1 CVECVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.
SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)
2 rules 1 TTP 1 CVE 2 IOCsA critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.
UniFi Play Path Traversal Vulnerability (CVE-2026-22562)
2 rules 2 TTPs 1 CVEA path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.
State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)
2 rules 6 TTPsIn 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.
Suspicious Registry Modifications by Scripting Engines
1 rule 3 TTPsScripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.
Eclipse Jetty HTTP/1.1 Request Smuggling via Chunk Extensions (CVE-2026-2332)
2 rules 3 TTPs 1 CVE 2 IOCsEclipse Jetty's HTTP/1.1 parser is vulnerable to request smuggling due to improper handling of chunk extensions, allowing attackers to inject malicious requests.
Totolink A3002MU Router Stack-Based Buffer Overflow Vulnerability
2 rules 7 TTPs 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-6194) exists in the Totolink A3002MU B20211125.1046 router firmware, specifically affecting the `/boafrm/formWlanSetup` component's HTTP request handler, which allows remote attackers to execute arbitrary code by manipulating the `wan-url` argument.
PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.
Pachno 1.0.6 XML External Entity Injection Vulnerability
2 rules 2 TTPs 1 CVE 3 IOCsPachno 1.0.6 is vulnerable to XML external entity injection, allowing unauthenticated attackers to read arbitrary files by injecting malicious XML entities into wiki content due to unsafe XML parsing in the TextParser helper.
libTIFF Vulnerability Allows Code Execution and DoS
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in libTIFF to potentially execute arbitrary code or cause a denial-of-service condition.
RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability (CVE-2026-27668)
2 rules 1 TTP 1 CVECVE-2026-27668 allows authenticated User Administrators in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to escalate their privileges and access any device group, due to an incorrect privilege assignment in versions prior to V5.8.
Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)
2 rules 1 TTP 1 CVECVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.
SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)
2 rules 1 TTP 1 CVE 1 IOCAn authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.
Smart Post Show WordPress Plugin PHP Object Injection Vulnerability
2 rules 1 TTP 1 CVEThe Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.
PraisonAI Unauthenticated Remote Session Hijacking Vulnerability (CVE-2026-40289)
2 rules 5 TTPs 1 CVEPraisonAI versions before 4.5.139 and praisonaiagents versions before 1.5.140 are vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on the /ws WebSocket endpoint, enabling unauthorized remote control and data leakage.
PraisonAI Arbitrary Code Execution Vulnerability
2 rules 1 TTP 1 CVEPraisonAI versions 4.5.138 and below are vulnerable to arbitrary code execution due to the unsanitized import of a malicious tools.py file, leading to potential system compromise.
PraisonAI GitHub Actions Credential Leakage Vulnerability (CVE-2026-40313)
2 rules 2 TTPs 1 CVEPraisonAI versions 4.5.139 and below are vulnerable to credential leakage due to the ArtiPACKED attack, where GitHub Actions workflows using actions/checkout without persist-credentials: false write the GITHUB_TOKEN into the .git/config file, leading to potential exposure in uploaded artifacts and subsequent supply chain compromise.
LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)
2 rules 1 TTP 1 CVEThe LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.
jq JSON Processor Hash Table Collision Denial-of-Service Vulnerability (CVE-2026-40164)
2 rules 1 TTP 1 CVEA denial-of-service vulnerability exists in jq versions prior to commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784 due to the use of a hardcoded seed in MurmurHash3, enabling attackers to craft JSON objects that trigger hash collisions and cause excessive CPU consumption.
SAP Business Planning and Consolidation and Business Warehouse SQL Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2026-27681 describes an insufficient authorization check vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse that allows authenticated users to execute crafted SQL statements, leading to unauthorized data access, modification, and deletion.
NestJS Microservices Denial-of-Service via Recursive handleData
2 rules 1 TTPA denial-of-service vulnerability exists in NestJS's @nestjs/microservices package, affecting versions 11.1.18 and earlier, where an attacker can send multiple small, valid JSON messages within a single TCP frame, causing a stack overflow.
MinIO Unauthenticated Object Write Vulnerability
2 rules 3 TTPsTwo authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.
Coinbase AgentKit Prompt Injection Vulnerability
2 rules 2 IOCsA prompt injection vulnerability in Coinbase AgentKit allows for potential wallet drain, infinite approvals, and agent-level remote code execution.
ImageMagick XML Bomb Denial-of-Service Vulnerability (CVE-2026-33908)
2 rules 1 TTP 1 CVEImageMagick versions prior to 7.1.2-19 and 6.9.13-44 are susceptible to a denial-of-service (DoS) attack due to unbounded recursion during XML parsing, potentially leading to stack exhaustion.
UniFi Play Improper Access Control Vulnerability (CVE-2026-22566)
2 rules 1 TTP 1 CVEAn improper access control vulnerability in UniFi Play PowerAmp and Audio Port allows a malicious actor with access to the UniFi Play network to obtain WiFi credentials.
UniFi Play Improper Access Control Allows SSH Enablement
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-22564 is an improper access control vulnerability in UniFi Play PowerAmp and Audio Port devices that allows an attacker with network access to enable SSH and make unauthorized system changes.
UniFi Play Command Injection Vulnerability (CVE-2026-22563)
2 rules 1 TTP 1 CVE 1 IOCA malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.
ImageMagick Heap Buffer Overflow Vulnerability (CVE-2026-33901)
2 rules 1 TTP 1 CVEImageMagick versions before 7.1.2-19 and 6.9.13-44 are vulnerable to a heap buffer overflow in the MVG decoder, potentially leading to an out-of-bounds write when processing a crafted image, which can result in denial of service or arbitrary code execution.
SQL Injection Vulnerability in Simple Content Management System 1.0
2 rules 1 TTP 1 CVE 5 IOCsA remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.
VMware Tanzu Spring Cloud Gateway Security Bypass Vulnerability
1 rule 1 TTPAn anonymous, remote attacker can exploit a vulnerability in VMware Tanzu Spring Cloud Gateway to bypass security measures, potentially gaining unauthorized access or control.
TOTOLINK A7000R Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-6168) exists in TOTOLINK A7000R devices up to version 9.1.0u.6115, allowing remote attackers to execute arbitrary code via a crafted ssid5g argument to the setWiFiEasyGuestCfg function in /cgi-bin/cstecgi.cgi.
SQL Injection Vulnerability in Faculty Management System
2 rules 1 TTP 1 CVEA remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.
ZTE ZXEDM iEMS Password Reset Vulnerability (CVE-2026-40436)
2 rules 2 TTPs 1 CVECVE-2026-40436 is a vulnerability in the ZTE ZXEDM iEMS product that allows attackers to reset user passwords due to improper access control on the user list acquisition function within the cloud EMS portal, potentially leading to unauthorized operations and system compromise.
SQL Injection Vulnerability in Vehicle Showroom Management System 1.0
2 rules 1 TTP 1 CVEA remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.
SQL Injection Vulnerability in Lost and Found Thing Management 1.0
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.
Samsung Escargot Out-of-Bounds Write Vulnerability (CVE-2026-25207)
2 rules 2 TTPs 1 CVECVE-2026-25207 is an out-of-bounds write vulnerability in Samsung Open Source Escargot that allows for buffer overflows, potentially leading to arbitrary code execution.
Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)
2 rules 1 TTP 1 CVECVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (<= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.
Samsung Escargot Heap-Based Buffer Overflow Vulnerability (CVE-2026-25205)
2 rules 1 TTP 1 CVEA heap-based buffer overflow vulnerability in Samsung Open Source Escargot (CVE-2026-25205) allows for out-of-bounds write operations, potentially leading to arbitrary code execution.
Totolink A800R Remote Buffer Overflow Vulnerability
2 rules 3 TTPs 1 CVEA remote buffer overflow vulnerability exists in the Totolink A800R router version 4.1.2cu.5137_B20200730, allowing unauthenticated attackers to potentially execute arbitrary code by overflowing the apcliSsid argument in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library.
Huawei Communication Module Use-After-Free Vulnerability (CVE-2026-34856)
2 rules 1 TTP 1 CVEA use-after-free vulnerability, tracked as CVE-2026-34856, exists in Huawei's communication module due to improper synchronization in concurrent execution, potentially leading to a denial-of-service condition.
zhayujie chatgpt-on-wechat CowAgent Authentication Bypass (CVE-2026-6129)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-6129 is a critical vulnerability in zhayujie chatgpt-on-wechat CowAgent up to version 2.0.4, allowing remote attackers to bypass authentication via manipulation of the Agent Mode Service.
Mesa WebGPU Out-of-Bounds Write Vulnerability (CVE-2026-40393)
2 rules 1 CVEAn out-of-bounds write vulnerability exists in Mesa versions before 25.3.6 and 26 before 26.0.1 due to an untrusted allocation size in WebGPU, potentially leading to code execution.
MyT-PM 1.5.1 SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 4 IOCsMyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.
Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEDolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.
ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 5 IOCsImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.
eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)
2 rules 1 TTP 1 CVE 5 IOCseBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.
Across DR-810 Unauthenticated File Disclosure Vulnerability
2 rules 1 TTP 1 CVE 4 IOCsAcross DR-810 routers are vulnerable to unauthenticated file disclosure, allowing remote attackers to download the rom-0 backup file containing sensitive information, such as router passwords and configuration data, via a simple GET request to the rom-0 endpoint.
Easy Video to iPod Converter 1.6.20 Local Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEEasy Video to iPod Converter 1.6.20 is vulnerable to a local buffer overflow in the user registration field, allowing a local attacker to overwrite the structured exception handler (SEH) by providing a crafted payload exceeding 996 bytes in the username field, potentially leading to arbitrary code execution with user privileges.
CMSsite 1.0 SQL Injection Vulnerability (CVE-2019-25697)
2 rules 2 TTPs 1 CVECMSsite 1.0 is vulnerable to unauthenticated SQL injection (CVE-2019-25697) via the cat_id parameter in category.php, allowing attackers to extract sensitive database information.
RGui 3.5.0 Local Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVERGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation, leading to arbitrary code execution.
HTML5 Video Player 1.2.5 Local Buffer Overflow Vulnerability
2 rules 4 TTPs 1 CVEHTML5 Video Player version 1.2.5 is vulnerable to a local buffer overflow, allowing attackers to execute arbitrary code by providing an oversized key code string through the Help Register dialog.
Tenda F451 Router Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.
zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)
2 rules 1 TTP 1 CVECVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.
Tenda F451 Router Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVETenda F451 router version 1.0.0.7 is vulnerable to a stack-based buffer overflow in the frmL7ProtForm function, enabling remote attackers to execute arbitrary code by manipulating the 'page' argument.
Tenda F451 Stack-Based Buffer Overflow Vulnerability (CVE-2026-6121)
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-6121) exists in the WrlclientSet function of the /goform/WrlclientSet file in the httpd component of Tenda F451 version 1.0.0.7, allowing remote attackers to execute arbitrary code by manipulating the GO argument.
perfree go-fastdfs-web Improper Authorization Vulnerability (CVE-2026-6105)
2 rules 1 TTP 1 CVECVE-2026-6105 is a critical vulnerability in perfree go-fastdfs-web versions up to 1.3.7, allowing for remote improper authorization due to a flaw in the doInstall Interface, potentially leading to unauthorized system access and control.
Chamilo LMS Session Fixation Vulnerability (CVE-2026-31940)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to session fixation due to user-controlled request parameters being used to set the PHP session ID, potentially allowing attackers to hijack user sessions.
Wasmtime Winch Compiler Aarch64 Sandbox Escape Vulnerability
2 rules 2 TTPs 1 CVEA sandbox escape vulnerability exists in Wasmtime versions 25.0.0 to 36.0.7, 37.0.0 to 42.0.2, and version 43.0.0 when using the Winch compiler backend on aarch64 architecture, potentially allowing a Wasm guest to access host memory outside its sandbox, leading to denial of service, data leaks, or remote code execution.
Unauthenticated Arbitrary File Write in Saltcorn
2 rules 1 TTP 1 CVEUnauthenticated attackers can exploit a vulnerability in Saltcorn versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 to write arbitrary files and list directory contents on the server.
TREK Travel Planner Missing Authorization Vulnerability (CVE-2026-40185)
2 rules 1 TTP 1 CVE 1 IOCTREK collaborative travel planner before version 2.7.2 is vulnerable to missing authorization checks on the Immich trip photo management routes, potentially allowing unauthorized access to trip photos.
SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams
2 rules 3 TTPs 1 CVESiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.
Red Hat OpenShift AI odh-dashboard Kubernetes Token Disclosure (CVE-2026-5483)
2 rules 1 TTP 1 CVECVE-2026-5483 is a high-severity vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) that allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint, potentially leading to unauthorized access to Kubernetes resources.
Postiz SSRF Vulnerability (CVE-2026-40168)
2 rules 1 CVEPostiz, an AI social media scheduling tool, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 2.21.5, allowing attackers to access internal resources.
Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host
2 rules 8 TTPsThis rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.
Math.js Improperly Controlled Modification of Object Attributes Leads to RCE
2 rules 1 TTPA vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.
LiteLLM Remote Code Execution via Bytecode Rewriting (CVE-2026-40217)
2 rules 1 TTP 1 CVELiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI, potentially leading to complete system compromise.
Helm Plugin Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.
Elastic Defend Alert from Package Manager Install Ancestry
3 rules 1 TTPThis rule detects Elastic Defend alerts where the alerted process has a package-manager install context in its ancestry (npm, PyPI, Rust), indicating potential supply chain compromise via malicious postinstall scripts.
DotNetNuke.Core Stored XSS via SVG Upload
2 rules 2 TTPsDotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.
CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)
2 rules 1 TTP 1 CVECouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.
Chamilo LMS Weak Password Reset Vulnerability (CVE-2026-33707)
2 rules 1 TTP 1 CVE 1 IOCChamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to a weak password reset mechanism, allowing attackers to compute password reset tokens using only a user's email address due to the use of SHA1 hashing without randomization, expiration, or rate limiting, leading to unauthorized account takeover.
Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.
Chamilo LMS SSRF Vulnerability in Social Wall Feature
2 rules 1 TTP 1 CVEA Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.
Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)
2 rules 1 TTP 1 CVEChamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.
Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)
2 rules 1 TTP 1 CVEChamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.
Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)
2 rules 1 TTP 1 CVE 1 IOCA path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.
Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.
CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)
2 rules 1 TTP 1 CVECVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.
BugSink Authenticated File Write Vulnerability (CVE-2026-40162)
2 rules 1 TTP 1 CVE 1 IOCBugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.
AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance
2 rules 4 TTPsAn AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.
@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability
2 rules 1 TTP 1 CVEA vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.
wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)
2 rules 1 TTP 1 CVEThe wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.
BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)
2 rules 1 TTP 1 CVEThe BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.
Chartbrew Cross-Tenant Authorization Bypass Vulnerability
2 rules 1 TTP 1 CVEChartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.
Goshs File-Based ACL Authorization Bypass Vulnerability
3 rules 4 TTPs 4 IOCsGoshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.
PraisonAI Remote Code Execution via Malicious Workflow YAML
2 rules 1 TTP 2 IOCsPraisonAI is vulnerable to remote code execution; loading untrusted YAML files with `type: job` can lead to arbitrary host command execution, potentially enabling full system compromise.
PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution
2 rules 3 TTPsA vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.
LXD Backup Import Bypass Allows Privilege Escalation in Restricted Projects
2 rules 1 TTPA vulnerability in LXD allows an attacker with instance-creation rights in a restricted project to bypass project restrictions and escalate privileges by crafting a malicious backup archive.
Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)
2 rules 2 TTPs 1 CVEAn Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.
Entra ID ADRS Token Request by Microsoft Authentication Broker
2 rules 2 TTPs 1 IOCDetects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.
OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)
2 rules 1 TTP 1 CVE 5 IOCsOpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.
GitHub Exfiltration via High Number of Repository Clones
2 rules 3 TTPsA single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.
OpenClaw Path Traversal Vulnerability (CVE-2026-35668)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.
OpenClaw WebView JavascriptInterface Vulnerability (CVE-2026-35643)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.22 is vulnerable to arbitrary code execution due to an unvalidated WebView JavascriptInterface, allowing attackers to inject malicious instructions by invoking the canvas bridge from untrusted pages.
OpenClaw Arbitrary Code Execution via Malicious .npmrc File
2 rules 1 TTP 1 CVE 1 IOCOpenClaw before 2026.3.24 is vulnerable to arbitrary code execution via local plugin and hook installation, where an attacker can craft a .npmrc file with a git executable override to execute malicious code during npm install.
AWS STS GetCallerIdentity API Called for the First Time
2 rules 2 TTPsAn adversary with access to compromised AWS credentials may attempt to verify their validity and determine the account they are using by calling the STS GetCallerIdentity API, potentially indicating credential compromise and unauthorized discovery activity.
Multiple External EDR Alerts by Host
3 rules 3 TTPsThis rule detects multiple external EDR alerts on the same host, indicating a potential compromise, by analyzing alert data from various EDR solutions like CrowdStrike, SentinelOne, and M365 Defender to identify hosts triggering multiple alerts, enabling prioritization of investigation and response.
Multiple Cloud Secrets Accessed by Single Source IP
2 rules 1 TTPA single source IP accessing secret-management APIs across multiple cloud providers (AWS, GCP, Azure) and Kubernetes clusters within a short timeframe indicates potential credential theft, session hijacking, or token replay.
AWS SSM Command Document Created by Rare User
2 rules 1 TTPAn AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.
AWS IAM Login Profile Added for Root
2 rules 2 TTPsAn adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.
AWS EC2 LOLBin Execution via SSM SendCommand
2 rules 2 TTPsDetection of Living Off the Land Binaries (LOLBins) or GTFOBins execution on EC2 instances via AWS Systems Manager (SSM) SendCommand API, potentially indicating malicious activity.
Zootemplate Cerato Theme Reflected XSS Vulnerability (CVE-2025-58920)
2 rules 1 TTP 1 CVE 1 IOCA reflected cross-site scripting (XSS) vulnerability exists in the Zootemplate Cerato WordPress theme (versions n/a through 2.2.18) due to improper neutralization of user-supplied input, potentially allowing attackers to execute arbitrary JavaScript in a user's browser.
Juju CloudSpec API Authorization Bypass (CVE-2026-5412)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-5412 describes an authorization issue in Juju versions prior to 2.9.57 and 3.6.21, where a low-privileged authenticated user can call the CloudSpec API method to extract cloud credentials used to bootstrap the controller, leading to sensitive credential exposure.
Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)
2 rules 1 TTP 1 CVEThe Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.
Synology SSL VPN Client Plaintext Password Storage Vulnerability (CVE-2021-47961)
2 rules 1 TTP 1 CVESynology SSL VPN Client before 1.4.5-0684 stores passwords in plaintext, allowing remote attackers to potentially access or manipulate user PIN codes, leading to unauthorized VPN configuration and traffic interception.
Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)
2 rules 3 TTPs 1 CVEA remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.
SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)
2 rules 2 TTPs 1 CVEA remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.
IBM Semeru Runtime Code Execution Vulnerability
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in IBM Semeru Runtime and IBM DB2 to execute arbitrary program code.
Google Chrome Device Bound Session Credentials (DBSC) Mitigates Cookie Theft
2 rules 1 TTPGoogle's rollout of Device Bound Session Credentials (DBSC) in Chrome 146 for Windows, with a future release planned for macOS, cryptographically binds authentication sessions to the user's device, rendering stolen session cookies unusable and mitigating credential access.
Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)
2 rules 2 TTPs 1 CVEThe Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.
Samsung MagicINFO 9 Server Local Privilege Escalation via Incorrect Default Permissions (CVE-2026-25203)
2 rules 1 TTP 1 CVE 1 IOCSamsung MagicINFO 9 Server versions prior to 21.1091.1 are susceptible to a local privilege escalation vulnerability due to incorrect default permissions, potentially allowing a low-privilege user to gain elevated privileges on the system.
Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution
3 rules 9 TTPs 1 CVESmart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.
PraisonAI Template Injection Vulnerability (CVE-2026-40154)
2 rules 1 TTP 1 CVE 2 IOCsPraisonAI before version 4.5.128 is vulnerable to supply chain attacks due to treating remotely fetched template files as trusted executable code without proper verification, enabling exploitation via malicious templates.
PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion
2 rules 1 TTP 1 CVEPraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.
PraisonAI SSRF Vulnerability via Unvalidated Webhook URL
2 rules 3 TTPs 1 CVEPraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.
OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.
Juniper Junos OS and Junos OS Evolved BGP Session Reset Denial of Service (CVE-2026-33797)
3 rules 2 TTPs 1 CVECVE-2026-33797 is an improper input validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved that allows an unauthenticated adjacent attacker to reset established BGP sessions via a specific BGP packet, leading to a denial of service condition.
Juniper Junos OS MX Series Missing Authorization Vulnerability
2 rules 1 TTP 1 CVECVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.
D-Link DIR-605L Router Buffer Overflow Vulnerability (CVE-2026-5980)
2 rules 4 TTPs 1 CVEA buffer overflow vulnerability exists in the D-Link DIR-605L router version 2.13B01, allowing a remote attacker to execute arbitrary code by manipulating the `curTime` argument in the `formSetMACFilter` function.
D-Link DIR-605L Router Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.
Nimiq Blockchain Timestamp Manipulation Vulnerability
2 rules 4 TTPs 1 CVEA vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.
bsv-sdk and bsv-wallet Credential Forgery Vulnerability
2 rules 1 TTPThe bsv-sdk and bsv-wallet packages are vulnerable to credential forgery because the `acquire_certificate` function persists certificate records to storage without verifying the certifier's signature, allowing attackers to forge identity certificates.
MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.
MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)
2 rules 1 TTP 1 CVEA remote command injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.
PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)
2 rules 1 TTP 1 CVE 1 IOCPraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.
CVE-2026-4436: Modbus Odorant Injection Manipulation
2 rules 2 TTPs 1 CVEA low-privileged remote attacker can exploit CVE-2026-4436 by sending Modbus packets to manipulate register values controlling odorant injection in gas lines, potentially leading to hazardous conditions.
HDF5 Heap Use-After-Free Vulnerability in h5dump (CVE-2026-34734)
2 rules 1 TTP 1 CVEA heap-use-after-free vulnerability (CVE-2026-34734) in HDF5 version 1.14.1-2 and earlier within the h5dump helper utility can be triggered by a malicious h5 file, leading to arbitrary code execution.
Contemporary Controls BASC 20T Packet Forging Vulnerability
2 rules 1 TTP 1 CVECVE-2025-13926 describes a vulnerability in Contemporary Controls BASC 20T that allows an attacker to sniff network traffic and forge packets to make arbitrary requests, potentially leading to unauthorized actions.
MetaGPT Code Injection Vulnerability (CVE-2026-5970)
2 rules 1 TTP 1 CVEA code injection vulnerability, CVE-2026-5970, exists in FoundationAgents MetaGPT up to version 0.8.1, allowing remote attackers to execute arbitrary code via manipulation of the `check_solution` function in the HumanEvalBenchmark/MBPPBenchmark component.
FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)
2 rules 1 TTP 1 CVEA code injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.
BSV Ruby SDK Improper ARC Response Handling
2 rules 1 TTP 1 CVEBSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.
AGiXT Path Traversal Vulnerability (CVE-2026-39981)
2 rules 3 TTPs 1 CVE 4 IOCsAGiXT versions prior to 1.9.2 are vulnerable to path traversal (CVE-2026-39981) due to insufficient validation in the safe_join() function, allowing authenticated attackers to read, write, or delete arbitrary files.
GNUTLS Denial of Service via Malformed ClientHello (CVE-2026-1584)
2 rules 2 TTPs 1 CVEA remote, unauthenticated attacker can exploit CVE-2026-1584 in gnutls by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake, leading to a NULL pointer dereference and a denial-of-service condition.
SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation
1 rule 1 TTP 1 CVE 2 IOCsThreat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.
MinIO S3 Select CSV Parsing Denial of Service
2 rules 1 TTPMinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.
Axios NO_PROXY Hostname Normalization Bypass Leads to SSRF
2 rules 1 TTP 1 CVEAxios is vulnerable to a NO_PROXY hostname normalization bypass leading to SSRF, where requests to loopback addresses like `localhost.` or `[::1]` bypass `NO_PROXY` rules, allowing attackers to force requests through a proxy and potentially exfiltrate sensitive data.
Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)
2 rules 1 TTP 1 CVELaravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.
Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion
2 rules 1 TTP 1 CVETmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.
Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)
2 rules 1 TTP 1 CVEPlane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.
osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)
2 rules 1 TTP 1 CVEA stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.
OPNsense LDAP Injection Vulnerability (CVE-2026-34578)
2 rules 1 TTP 1 CVEOPNsense versions prior to 26.1.6 are vulnerable to LDAP injection, allowing unauthenticated attackers to enumerate valid LDAP usernames and bypass group membership restrictions via the WebGUI login page.
OpenClaw RCE via Build Tool Environment Variable Injection
2 rules 2 TTPsOpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.
OpenClaw Trust Model Vulnerability: System Prompt Channel Injection
2 rulesOpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.
HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)
2 rules 1 TTP 1 CVE 1 IOCHashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.
Saleor GraphQL Batch Query Resource Exhaustion Vulnerability (CVE-2026-33756)
2 rules 1 TTP 1 CVEUnauthenticated attackers can exploit a resource exhaustion vulnerability (CVE-2026-33756) in Saleor e-commerce platform versions before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118 by sending a single HTTP request with a large number of GraphQL operations, bypassing query complexity limits and exhausting server resources.
OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability
2 rules 1 TTP 1 CVE 1 IOCA heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.
Nix Package Manager Arbitrary File Overwrite Vulnerability
2 rules 1 TTP 2 CVEsA flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.
WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)
2 rules 1 TTP 1 CVE 2 IOCsAn authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.
Vim Vulnerability Allows Local Code Execution
2 rules 1 TTPA local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.
Multiple Vulnerabilities in Zammad
2 rules 3 TTPsMultiple vulnerabilities in Zammad allow a remote attacker to execute arbitrary code, bypass security measures, disclose sensitive information, and perform cross-site scripting attacks.
Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)
2 rules 1 TTP 1 CVECVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.
D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)
2 rules 1 TTP 1 CVE 2 IOCsA command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.
Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.
code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.
Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)
2 rules 1 TTP 1 CVECVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.
UAC (Unix-like Artifacts Collector) Command Injection Vulnerability
2 rules 1 TTP 1 CVEUAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.
parseusbs Unsanitized LNK File Command Injection Vulnerability
2 rules 1 TTP 1 CVEparseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.
parseusbs OS Command Injection Vulnerability (CVE-2026-40030)
2 rules 1 TTP 1 CVE 1 IOCparseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.
MemProcFS DLL and Shared Library Hijacking Vulnerability
2 rules 3 TTPs 1 CVEMemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.
Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)
2 rules 3 TTPs 1 CVEA path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.
PraisonAI Vulnerable to OS Command Injection
2 rules 1 TTP 1 IOCPraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.
PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)
2 rules 1 TTP 1 CVE 1 IOCPraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.
First Time Python Process Creates macOS Launch Agent or Daemon
2 rules 2 TTPsThis rule detects the initial creation or modification of a macOS LaunchAgent or LaunchDaemon plist file by a Python process, a common persistence technique employed by attackers using malicious scripts, compromised dependencies, or model file deserialization.
Kamailio Out-of-Bounds Access Denial of Service Vulnerability
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds access vulnerability (CVE-2026-39863) in Kamailio versions prior to 6.1.1, 6.0.6, and 5.8.8 by sending a specially crafted data packet over TCP, causing a denial-of-service condition.
InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)
2 rules 1 TTP 1 CVE 1 IOCA non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.
React Server Components Denial of Service Vulnerability (CVE-2026-23869)
2 rules 1 TTP 1 CVEA denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.
LORIS Directory Traversal Vulnerability
2 rules 2 TTPs 1 CVELORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.
Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)
2 rules 2 TTPs 1 CVEA stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.
Saleor GraphQL Resource Exhaustion Vulnerability (CVE-2026-35401)
2 rules 1 TTP 1 CVEA remote, unauthenticated attacker can cause resource exhaustion in Saleor e-commerce platforms via maliciously crafted GraphQL API requests, leading to denial of service.
LORIS File Traversal Vulnerability (CVE-2026-34392)
2 rules 1 TTP 1 CVEA file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.
mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications
2 rules 2 IOCsThe mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.
Logstash Arbitrary File Write via Path Traversal (CVE-2026-33466)
2 rules 2 TTPs 1 CVECVE-2026-33466 describes a vulnerability in Logstash where improper validation of file paths within compressed archives allows arbitrary file writes, potentially leading to remote code execution.
Red Hat Quay Image Upload Interference Vulnerability (CVE-2026-32589)
2 rules 2 TTPs 1 CVECVE-2026-32589 describes a vulnerability in Red Hat Quay's container image upload process where an authenticated user can interfere with other users' uploads, potentially leading to unauthorized access and modification.
Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)
2 rules 2 TTPs 1 CVECVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.
Kibana Fleet Plugin Privilege Escalation via CVE-2026-4498
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-4498 allows an authenticated Kibana user with Fleet sub-feature privileges to read index data beyond their direct Elasticsearch RBAC scope due to improper privilege handling in debug route handlers.
Unauthenticated Access to kcp Cache Server
2 rules 2 TTPsThe kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.
XWiki Remote Code Execution via Unprotected Velocity Scripting API
2 rules 2 TTPsXWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.
Apache ActiveMQ Classic RCE via Jolokia API Exploitation
2 rules 3 TTPs 3 CVEsA remote code execution vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic allows authenticated attackers to invoke management operations through the Jolokia API to retrieve a remote configuration file and execute OS commands, potentially exploitable without authentication via CVE-2024-32114.
CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)
2 rules 2 TTPs 1 CVEUnauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.
Dell ECS and ObjectScale Sensitive Information Logging Vulnerability (CVE-2026-28261)
2 rules 1 TTP 1 CVEDell Elastic Cloud Storage and ObjectScale are vulnerable to local privilege escalation due to sensitive information being logged, potentially allowing a low-privileged attacker with local access to expose secrets and gain unauthorized access.
CoolerControl Command Injection Vulnerability (CVE-2026-5208)
2 rules 1 TTP 1 CVECoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.
WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)
2 rules 1 TTP 1 CVEThe WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.
OpenClaw Agent Suspicious Child Process Execution
2 rules 10 TTPs 3 IOCsMalicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.
NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)
2 rules 4 TTPs 1 CVE 1 IOCA memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.
Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)
2 rules 5 TTPs 1 CVEDrizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.
ChurchCRM Stored XSS Vulnerability in Person Property Management
2 rules 1 TTP 2 CVEsA stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.
D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability
2 rules 5 TTPsThe 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.
WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps
2 rules 2 TTPs 1 CVEThe Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
ASDA-Soft Stack-based Buffer Overflow Vulnerability (CVE-2026-5726)
2 rules 6 TTPs 1 CVE 3 IOCsA stack-based buffer overflow vulnerability exists in ASDA-Soft, potentially leading to arbitrary code execution, as identified by CVE-2026-5726 and reported by Deltaww with a CVSS v3.1 score of 7.8.
Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)
3 rules 1 TTP 1 CVEThe Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.
Everest Forms WordPress Plugin PHP Object Injection Vulnerability
2 rules 2 TTPs 1 CVEThe Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.
IBM Tivoli Netcool Impact Sensitive Information Leak via Log Files (CVE-2026-4788)
2 rules 1 TTP 1 CVE 1 IOCIBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files, potentially exposing it to unauthorized local users, tracked as CVE-2026-4788.
IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)
2 rules 1 TTP 1 CVEIBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.
IBM Verify and Security Verify Access Container Server-Side Request Forgery Vulnerability (CVE-2026-1343)
2 rules 2 TTPs 1 CVECVE-2026-1343 allows an attacker to contact internal authentication endpoints protected by the Reverse Proxy in IBM Verify Identity Access Container and IBM Security Verify Access Container.
IBM Verify Access and Security Verify Access Container Privilege Escalation (CVE-2026-1346)
2 rules 1 TTP 1 CVEA locally authenticated user can escalate privileges to root on vulnerable IBM Verify Identity Access Container and IBM Security Verify Access Container installations due to the execution of processes with unnecessary privileges, as tracked by CVE-2026-1346.
Amazon Firecracker Virtio PCI Out-of-Bounds Write Vulnerability (CVE-2026-5747)
3 rules 2 TTPs 1 CVEAn out-of-bounds write vulnerability in Amazon Firecracker's virtio PCI transport (CVE-2026-5747) allows a local guest user with root privileges to potentially crash the VMM process or execute arbitrary code on the host.
WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix
2 rules 1 TTP 2 CVEs 1 IOCWWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.
File Browser Share Links Accessible After Permission Revocation
3 rules 1 TTP 1 CVEFile Browser share links remain accessible after Share/Download permissions are revoked, allowing continued access to shared files even after an administrator revokes the user's permissions.
LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash
2 rules 1 TTPLiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.
Emmett Web Framework Path Traversal Vulnerability (CVE-2026-39847)
2 rules 1 TTP 1 CVEEmmett web framework versions 2.5.0 to before 2.8.1 are vulnerable to path traversal attacks (CVE-2026-39847), allowing attackers to read arbitrary files outside the intended assets directory using manipulated URLs.
Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop
2 rules 4 TTPs 1 CVEPodman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.
PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)
2 rules 1 TTP 1 CVEA code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.
OpenObserve SSRF via Improper IPv6 Validation
2 rules 1 TTP 1 CVE 1 IOCOpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.
NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)
2 rules 5 TTPs 1 CVEA memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.
NI LabVIEW Memory Corruption Vulnerability (CVE-2026-32862)
2 rules 5 TTPs 1 CVEA memory corruption vulnerability (CVE-2026-32862) in NI LabVIEW versions 2026 Q1 (26.1.0) and prior, stemming from an out-of-bounds write in ResFileFactory::InitResourceMgr(), can lead to information disclosure or arbitrary code execution if a user opens a malicious VI file.
NI LabVIEW LVLIB File Parsing Memory Corruption Vulnerability (CVE-2026-32860)
2 rules 2 TTPs 1 CVE 1 IOCA memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVLIB file, potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvlib file.
NI LabVIEW LVCLASS File Parsing Out-of-Bounds Write Vulnerability (CVE-2026-32861)
2 rules 4 TTPs 1 CVEA memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVCLASS file (CVE-2026-32861), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvclass file.
Mise Trust Bypass Vulnerability via Malicious .mise.toml
2 rules 2 TTPsA vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.
PowerJob SQL Injection Vulnerability (CVE-2026-5736)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.
Genealogy PHP Application Broken Access Control Vulnerability (CVE-2026-39355)
2 rules 6 TTPs 1 CVEA critical broken access control vulnerability (CVE-2026-39355) in Genealogy PHP application versions prior to 5.9.1 allows authenticated users to transfer ownership of arbitrary teams, leading to complete takeover of team workspaces and unrestricted data access.
ChurchCRM Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39337)
2 rules 2 TTPs 2 CVEsA critical pre-authentication remote code execution vulnerability in ChurchCRM versions prior to 7.1.0 allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise.
ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)
2 rules 1 TTP 1 CVEAn authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.
ChurchCRM Path Traversal Vulnerability Leading to Remote Code Execution
2 rules 1 TTP 1 CVEA path traversal vulnerability in ChurchCRM versions prior to 6.5.3 allows authenticated administrators to upload arbitrary files, leading to remote code execution by overwriting Apache .htaccess files.
NVIDIA Triton Inference Server Denial-of-Service Vulnerability (CVE-2026-24146)
2 rules 1 TTP 1 CVENVIDIA Triton Inference Server is vulnerable to denial of service due to insufficient input validation that, when combined with a large number of outputs, can cause a server crash.
NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)
2 rules 2 TTPs 1 CVE 1 IOCNVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.
SoftEtherVPN Pre-Authentication Denial-of-Service Vulnerability (CVE-2026-39312)
2 rules 2 TTPs 1 CVESoftEtherVPN version 5.2.5188 and earlier is vulnerable to a pre-authentication denial-of-service attack where an unauthenticated remote attacker can crash the vpnserver process by sending a malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.
PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)
2 rules 1 TTP 1 CVE 1 IOCPolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.
Emissary OS Command Injection Vulnerability (CVE-2026-35581)
2 rules 1 TTP 1 CVEEmissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.
Windmill Missing Authorization Vulnerability (CVE-2026-22683)
2 rules 2 TTPs 1 CVEWindmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability (CVE-2026-22683) that allows users with the Operator role to bypass intended restrictions and perform unauthorized entity creation and modification actions via the backend API, potentially leading to privilege escalation and remote code execution.
Windmill CE/EE SQL Injection Vulnerability
2 rules 3 TTPs 1 CVEWindmill CE/EE versions 1.276.0 through 1.603.2 are vulnerable to SQL injection in the folder ownership management, allowing authenticated attackers to inject SQL through the owner parameter, leading to sensitive data access, token forgery, and arbitrary code execution.
libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)
2 rules 2 TTPs 1 CVECVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.
ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)
2 rules 1 TTP 1 CVE 2 IOCsChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.
text-generation-webui SSRF Vulnerability (CVE-2026-35486)
2 rules 1 TTP 1 CVE 2 IOCsThe text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.
runZero Platform Superuser Privilege Escalation (CVE-2026-5373)
2 rules 1 TTP 1 CVE 3 IOCsCVE-2026-5373 is an improper privilege management vulnerability in the runZero platform that allows all-organization administrators to promote accounts to superuser status, which was fixed in version 4.0.260202.0.
Red Hat Open Cluster Management (OCM) Cross-Cluster Privilege Escalation via Forged Certificates (CVE-2026-4740)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-4740 describes a vulnerability in Red Hat Open Cluster Management (OCM) where improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge certificates, enabling cross-cluster privilege escalation.
LibRaw Heap-Based Buffer Overflow Vulnerability (CVE-2026-24660)
2 rules 1 TTP 1 CVEA heap-based buffer overflow vulnerability (CVE-2026-24660) exists in the x3f_load_huffman functionality of LibRaw commit d20315b, where a specially crafted malicious file can lead to a heap buffer overflow.
LibRaw Integer Overflow Vulnerability in deflate_dng_load_raw
2 rules 1 TTP 1 CVECVE-2026-20884 is an integer overflow vulnerability in LibRaw's deflate_dng_load_raw function that leads to a heap buffer overflow when processing crafted DNG files.
Weaver E-cology Unauthenticated RCE via Dubbo API Debug Endpoint
3 rules 1 TTP 1 CVEWeaver E-cology 10.0 before 20260312 is vulnerable to unauthenticated remote code execution, allowing attackers to execute arbitrary commands by crafting a POST request to the /papi/esearch/data/devops/dubboApi/debug/method endpoint.
GPUBreach: GPU Rowhammer Attack for Privilege Escalation
2 rules 1 TTPGPUBreach is a novel Rowhammer attack targeting GPUs, allowing privilege escalation to root shell by inducing bit flips in GDDR6 memory and exploiting memory-safety bugs in Nvidia drivers, posing a significant risk to shared cloud environments.
Apache Traffic Server Vulnerabilities Leading to Denial of Service
2 rules 2 TTPsA remote attacker can exploit multiple vulnerabilities in Apache Traffic Server to conduct a denial of service or request smuggling attack.
OpenSSH GSSAPI Vulnerability Leads to Potential Denial-of-Service
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in OpenSSH GSSAPI and Ubuntu Linux to trigger undefined behavior or a potential denial-of-service attack.
SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns
3 rules 1 TTP 5 IOCsAttackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.
Malicious NPM Packages Target Strapi Users
3 rules 6 TTPsA threat actor published 36 malicious NPM packages disguised as Strapi plugins in a supply chain attack, designed to execute code, escape containers, harvest credentials, and establish persistent implants on Linux systems targeting Strapi users, with specific focus on the Guardarian cryptocurrency payment gateway.
CSRF Vulnerability in WordPress Under Construction Plugin (CVE-2026-34896)
2 rules 2 TTPs 1 CVEA cross-site request forgery (CSRF) vulnerability exists in the Analytify Under Construction, Coming Soon & Maintenance Mode WordPress plugin (versions n/a through 2.1.1), potentially allowing attackers to execute unauthorized actions on behalf of legitimate users.
Amelia WordPress Plugin IDOR Vulnerability CVE-2026-5465
2 rules 1 TTP 1 CVEThe Amelia WordPress plugin is vulnerable to an insecure direct object reference, allowing authenticated attackers with Provider-level access or higher to escalate privileges and gain persistence by taking over any WordPress account, including Administrator by manipulating the `externalId` field.
Remote Code Execution Vulnerability in JP1/IT Desktop Management Products (CVE-2025-65115)
2 rules 1 TTP 1 CVECVE-2025-65115 is a remote code execution vulnerability affecting multiple versions of JP1/IT Desktop Management and related products on Windows, potentially allowing attackers to execute arbitrary code on vulnerable systems.
Ninja Forms File Upload Plugin Vulnerability Leads to RCE
2 rules 2 TTPs 1 CVEThe Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
AWS Research and Engineering Studio OS Command Injection Vulnerability (CVE-2026-5707)
2 rules 1 TTP 1 CVEA remote authenticated attacker can execute arbitrary commands as root on the virtual desktop host by crafting a malicious session name in AWS Research and Engineering Studio (RES) versions 2025.03 through 2025.12.01 due to unsanitized input, leading to complete system compromise.
AWS Research and Engineering Studio (RES) RCE via FileBrowser API Vulnerability
2 rules 1 TTP 1 CVECVE-2026-5709 is a critical vulnerability in AWS Research and Engineering Studio (RES) versions 2024.10 through 2025.12.01, allowing remote authenticated attackers to execute arbitrary commands on the cluster-manager EC2 instance through the FileBrowser API.
Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5686)
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5686) exists in the Tenda CX12L router version 16.03.53.12, allowing remote attackers to potentially execute arbitrary code by manipulating the 'page' argument in the `/goform/RouteStatic` endpoint.
Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.
WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)
2 rules 1 TTP 1 CVEWeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.
Brave CMS Missing Authorization Leads to Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCBrave CMS versions prior to 2.0.6 are vulnerable to privilege escalation due to a missing authorization check in the update role endpoint, allowing any authenticated user to gain Super Admin privileges.
Brave CMS Insecure Direct Object Reference Vulnerability (CVE-2026-35183)
1 rule 1 TTP 1 CVEBrave CMS versions prior to 2.0.6 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability allowing authenticated users with edit permissions to delete images attached to articles owned by other users due to missing ownership verification in the deleteImage method.
openFPGALoader Heap-Buffer-Overflow Read Vulnerability
2 rules 1 TTP 1 CVEA heap-buffer-overflow read vulnerability exists in openFPGALoader 1.1.1 and earlier, allowing out-of-bounds heap memory access via a crafted .pof file, potentially leading to denial of service or information disclosure.
Anthropic Claude Code CLI/SDK OS Command Injection Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-35022 describes an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK that allows attackers with control over authentication settings to execute arbitrary commands, potentially leading to credential theft and environment variable exfiltration.
Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)
2 rules 1 TTP 1 CVEThe Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.
Samsung Exynos Wi-Fi Driver Use-After-Free Vulnerability (CVE-2025-54602)
2 rules 1 TTP 1 CVEA use-after-free vulnerability exists in the Wi-Fi driver of Samsung Mobile and Wearable Processors Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000 due to improper synchronization on a global variable, allowing attackers to trigger a race condition and potentially execute arbitrary code.
Samsung Exynos Processor Denial-of-Service Vulnerability (CVE-2025-57834)
2 rules 1 TTP 1 CVE 1 IOCA denial-of-service vulnerability, CVE-2025-57834, exists in Samsung Exynos processors and modems due to improper input validation, potentially leading to device malfunction or service disruption.
Totolink A8000R Authentication Bypass Vulnerability (CVE-2026-5676)
2 rules 1 TTP 1 CVEA remote, unauthenticated attacker can bypass authentication on Totolink A8000R routers running firmware version 5.9c.681_B20180413 by manipulating the `langType` argument in the `setLanguageCfg` function of the `/cgi-bin/cstecgi.cgi` file.
Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)
2 rules 1 TTP 1 CVEA remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.
text-generation-webui Path Traversal Vulnerability (CVE-2026-35050)
2 rules 3 TTPs 1 CVE 1 IOCtext-generation-webui versions prior to 4.1.1 are vulnerable to path traversal, allowing a high-privileged user to overwrite Python files and achieve arbitrary code execution by triggering the 'download-model.py' file through the application's 'Model' menu.
Brave CMS Unrestricted File Upload Leads to Remote Code Execution
2 rules 3 TTPs 1 CVEBrave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.
Plunk Email Platform CRLF Header Injection Vulnerability
2 rules 1 TTP 1 CVEA CRLF header injection vulnerability in Plunk versions prior to 0.8.0 allows authenticated API users to inject arbitrary email headers, enabling silent email forwarding, reply redirection, or sender spoofing.
code-projects Online FIR System SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 6 IOCsA SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.
Vim Modeline Sandbox Bypass Vulnerability (CVE-2026-34982)
3 rules 1 TTP 1 CVE 5 IOCsA critical vulnerability in Vim versions prior to 9.2.0276 allows arbitrary OS command execution via a crafted file that bypasses the modeline sandbox due to missing security checks, potentially leading to code execution.
ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)
2 rules 1 TTP 1 CVECVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.
Qualcomm Memory Corruption Vulnerability CVE-2026-21382
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-21382 is a memory corruption vulnerability related to handling power management requests with improperly sized input/output buffers, potentially leading to code execution.
Qualcomm Memory Corruption Vulnerability in Auxiliary Sensor Processing (CVE-2026-21374)
2 rules 1 TTP 1 CVECVE-2026-21374 describes a memory corruption vulnerability due to insufficient buffer size validation when processing auxiliary sensor input/output control commands, potentially allowing a local attacker to execute arbitrary code with elevated privileges.
Qualcomm IOCTL Memory Corruption Vulnerability (CVE-2026-21375)
2 rules 1 TTP 1 CVECVE-2026-21375 is a memory corruption vulnerability in Qualcomm chipsets due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.
Qualcomm Camera Driver Memory Corruption Vulnerability
2 rules 1 TTP 1 CVEA memory corruption vulnerability exists in Qualcomm camera sensor drivers due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.
Memory Corruption Vulnerability in DMABUF IOCTL Calls (CVE-2026-21380)
2 rules 1 TTP 1 CVEA use-after-free vulnerability, identified as CVE-2026-21380, exists due to memory corruption when using deprecated DMABUF IOCTL calls for video memory management, potentially leading to arbitrary code execution.
CVE-2026-21378 Memory Corruption in Camera Sensor Driver
2 rules 1 TTP 1 CVEA memory corruption vulnerability (CVE-2026-21378) exists in a camera sensor driver due to improper validation of output buffer size during IOCTL processing, potentially leading to arbitrary code execution.
Qualcomm Transient Denial-of-Service via FILS Discovery Frames (CVE-2026-21367)
2 rules 2 TTPs 1 CVE 2 IOCsCVE-2026-21367 describes a transient denial-of-service vulnerability in Qualcomm products that occurs when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans, potentially leading to service disruption.
Qualcomm Memory Corruption Vulnerability (CVE-2026-21371)
2 rules 1 TTP 1 CVECVE-2026-21371 is a memory corruption vulnerability due to insufficient size validation when retrieving an output buffer, potentially leading to information disclosure or arbitrary code execution on affected Qualcomm devices.
Memory Corruption Vulnerability in Satellite Data Decoding (CVE-2025-47392)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-47392 describes a memory corruption vulnerability that occurs when decoding corrupted satellite data files with invalid signature offsets, reported by Qualcomm, Inc.
CVE-2025-47391 Qualcomm Memory Corruption Vulnerability
3 rules 3 TTPs 1 CVE 2 IOCsCVE-2025-47391 is a memory corruption vulnerability due to a stack-based buffer overflow (CWE-121) while processing a frame request, as detailed in the Qualcomm security bulletin for April 2026, potentially leading to arbitrary code execution.
CVE-2025-47390: JPEG Driver IOCTL Memory Corruption Vulnerability
2 rules 1 TTP 1 CVEA memory corruption vulnerability (CVE-2025-47390) exists while preprocessing IOCTL requests in the JPEG driver, potentially leading to local privilege escalation or denial of service.
CVE-2025-47389 Memory Corruption Vulnerability in Attestation Report Generation
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-47389 describes a memory corruption vulnerability stemming from a buffer copy operation failure due to an integer overflow during the attestation report generation process, potentially leading to arbitrary code execution.
Twitch Studio Privilege Escalation Vulnerability (CVE-2024-14032)
2 rules 1 TTP 1 CVETwitch Studio version 0.114.8 and prior contains a privilege escalation vulnerability (CVE-2024-14032) that allows local attackers to execute arbitrary code as root by exploiting an unprotected XPC service, enabling them to overwrite system files and achieve full system compromise.
Potential File Download via a Headless Browser
2 rules 1 TTPDetects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.
OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)
2 rules 1 TTP 1 CVEA remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.
Media Library Assistant WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.
Distribution Toolkit Authentication Redirection Vulnerability (CVE-2026-33540)
2 rules 1 TTP 1 CVEA vulnerability in the distribution toolkit prior to 3.1.0 allows a malicious upstream registry or man-in-the-middle attacker to redirect authentication requests, potentially exposing upstream credentials.
GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)
2 rules 1 TTP 1 CVEGLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.
GLPI Template Injection RCE (CVE-2026-26026)
2 rules 3 TTPs 1 CVE 1 IOCGLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.
GLPI SQL Injection Vulnerability (CVE-2026-29047)
2 rules 1 TTP 1 CVEGLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.
GLPI Cross-Site Scripting Vulnerability (CVE-2026-25932)
2 rules 1 TTP 1 CVECVE-2026-25932 is a cross-site scripting vulnerability in GLPI versions 0.60 to before 10.0.24, where an authenticated technician user can store a malicious XSS payload within supplier fields, potentially leading to arbitrary code execution in the context of other users' browsers.
AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts
2 rules 2 TTPsThis rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.
Mattermost Legal Hold Plugin Authentication Bypass Vulnerability
2 rules 2 TTPs 1 CVEMattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.
Kubernetes Secret Access via Unusual User Agent
2 rules 1 TTPDetects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.
Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.
SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)
2 rules 1 TTP 1 CVE 5 IOCsA remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.
SQL Injection Vulnerability in Easy Blog Site 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in code-projects Easy Blog Site 1.0 within the login.php file, exploitable remotely by manipulating the username/password parameters, potentially leading to unauthorized database access.
SQL Injection Vulnerability in projectworlds Car Rental System 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.
GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)
2 rules 1 TTP 1 CVE 6 IOCsA server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.
GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)
2 rules 1 TTP 1 CVECVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.
GPT Researcher Code Injection Vulnerability (CVE-2026-5631)
2 rules 1 TTP 1 CVEA remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.
JeecgBoot AI Chat Module Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEJeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.
Belkin F9K1015 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5612)
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5612) exists in Belkin F9K1015 1.00.10, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWlEncrypt' function of the '/goform/formWlEncrypt' file.
Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5608) exists in the formWlanSetup function of Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the /goform/formWlanSetup file.
Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.
Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)
2 rules 1 TTP 1 CVEKados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.
Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)
2 rules 1 TTP 1 CVEKados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.
phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)
2 rules 1 CVEphpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.
Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)
2 rules 1 TTP 1 CVEKados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.
RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)
2 rules 1 TTP 1 CVE 1 IOCRealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.
OpenDocMan 1.3.4 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEOpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.
Advance Gift Shop Pro Script 2.0.3 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEAdvance Gift Shop Pro Script 2.0.3 is vulnerable to SQL injection via the 's' search parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.
eDirectory SQL Injection Vulnerability (CVE-2019-25675)
2 rules 2 TTPs 1 CVEUnauthenticated attackers can exploit SQL injection vulnerabilities in eDirectory (CVE-2019-25675) to bypass administrator authentication and disclose sensitive files.
C4G Basic Laboratory Information System 3.4 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEC4G Basic Laboratory Information System 3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL commands via the 'site' parameter in GET requests to the users_select.php endpoint, potentially leading to sensitive data extraction.
VA MAX 8.3.4 Remote Code Execution via changeip.php (CVE-2019-25671)
2 rules 1 TTP 1 CVE 2 IOCsVA MAX 8.3.4 is vulnerable to remote code execution (CVE-2019-25671), allowing authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter via a POST request to changeip.php.
River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVERiver Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.
PilusCart 1.4.1 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEPilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.
News Website Script 2.0.5 SQL Injection Vulnerability
2 rules 1 TTP 1 CVENews Website Script 2.0.5 contains an SQL injection vulnerability (CVE-2019-25668) allowing unauthenticated attackers to extract sensitive information by injecting SQL code through the news ID parameter in GET requests.
SuiteCRM 7.10.7 Time-Based SQL Injection Vulnerability
2 rules 1 TTP 1 CVESuiteCRM 7.10.7 is vulnerable to time-based SQL injection in the record parameter of the Users module DetailView action, allowing authenticated attackers to manipulate database queries and potentially extract sensitive information.
ResourceSpace 8.6 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEResourceSpace 8.6 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL queries via the 'ref' parameter in GET requests to the watched_searches.php endpoint, leading to sensitive data extraction.
R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)
2 rules 2 TTPs 1 CVE 5 IOCsR i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.
SQL Injection Vulnerability in jkev Record Management System 1.0 (CVE-2026-5575)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5575) exists in the Login component of SourceCodester/jkev Record Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username parameter in index.php.
Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)
2 rules 1 TTP 1 CVE 4 IOCsCVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.
Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)
2 rules 1 TTP 1 CVECVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.
Technostrobe HI-LED-WR120-G2 Improper Access Control Vulnerability (CVE-2026-5569)
2 rules 1 TTP 1 CVECVE-2026-5569 describes a remote improper access control vulnerability in the /Technostrobe/ endpoint of Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30, potentially leading to unauthorized access and control of affected devices.
Tenda M3 Router Buffer Overflow Vulnerability
2 rules 6 TTPs 1 CVEA buffer overflow vulnerability exists in Tenda M3 1.0.0.10 via manipulation of the policyType argument in the setAdvPolicyData function, allowing remote attackers to execute arbitrary code.
code-projects Simple Laundry System 1.0 SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.
Provectus Kafka UI Code Injection Vulnerability (CVE-2026-5562)
2 rules 2 TTPs 1 CVEA code injection vulnerability exists in provectus kafka-ui up to version 0.7.2, specifically affecting the validateAccess function within the /api/smartfilters/testexecutions endpoint, allowing remote attackers to inject code.
SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)
2 rules 1 TTP 1 CVE 1 IOCA SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.
Tenda AC10 Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5550) in Tenda AC10 firmware version 16.03.10.10_multi_TDE01 within the /bin/httpd SysToolChangePwd function allows remote attackers to execute arbitrary code.
Tenda 4G03 Pro Improper Access Control Vulnerability (CVE-2026-5526)
2 rules 1 TTP 1 CVECVE-2026-5526 describes an improper access control vulnerability in the Tenda 4G03 Pro router's /bin/httpd file, allowing remote attackers to potentially gain unauthorized access.
Snes9K 0.0.9z Buffer Overflow Vulnerability (CVE-2018-25251)
2 rules 1 TTP 1 CVESnes9K 0.0.9z is vulnerable to a buffer overflow in the Netplay Socket Port Number field, enabling local attackers to execute arbitrary code via a crafted payload.
Microsoft VPN Browser+ 1.1.0.0 Denial of Service Vulnerability (CVE-2018-25241)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can cause a denial of service by crashing Microsoft VPN Browser+ 1.1.0.0 via oversized input to the search functionality, leading to application termination.
Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)
2 rules 1 TTP 1 CVE 4 IOCsSheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.
Signal K Server Privilege Escalation via Unprotected /enableSecurity Endpoint
2 rules 1 TTP 1 CVEThe Signal K server is vulnerable to privilege escalation due to the /skServer/enableSecurity endpoint remaining active after initial setup, allowing unauthenticated users to inject a new admin account and gain full server control; this affects versions prior to 2.24.0-beta.4.
prompts.chat Path Traversal Vulnerability (CVE-2026-22661)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.
OpenEXR Heap Information Disclosure in PXR24 Decompression (CVE-2026-34543)
2 rules 2 TTPs 1 CVE 2 IOCsOpenEXR is vulnerable to a heap information disclosure in PXR24 decompression, where the undo_pxr24_impl function ignores the actual decompressed size, potentially leading to the exposure of uninitialized heap memory when processing crafted EXR files.
Mesop Framework WebSocket Denial-of-Service Vulnerability (CVE-2026-34824)
2 rules 2 TTPsAn unauthenticated attacker can exploit an uncontrolled resource consumption vulnerability in Mesop versions 1.2.3 to 1.2.4 by sending a rapid succession of WebSocket messages, leading to thread exhaustion and a denial-of-service condition.
Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification
2 rules 2 TTPs 1 CVEAn authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.
goshs Unauthenticated Arbitrary File Deletion via Path Traversal
2 rules 1 TTPThe goshs application is vulnerable to unauthenticated path traversal (CVE-2026-35471) due to a missing return statement in the `deleteFile()` function, allowing attackers to delete arbitrary files and directories using a crafted GET request.
Budibase REST Connector SSRF via Empty Blacklist
2 rules 7 TTPsA critical Server-Side Request Forgery (SSRF) vulnerability in Budibase's REST datasource connector allows attackers with Builder privileges to exfiltrate sensitive data from internal network services due to a missing default IP blacklist.
Budibase Command Injection Vulnerability in Bash Automation Step
2 rules 1 TTPA command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.
Axios NPM Supply Chain Attack Delivering Platform-Specific RATs
2 rules 5 TTPs 7 IOCsA supply chain attack on the Axios NPM package injected malicious code into versions v1.14.1 and v0.30.4, leading to the deployment of platform-specific remote access trojans (RATs) after the installation of a rogue dependency that communicated with attacker-controlled infrastructure to retrieve malicious payloads for Windows, MacOS, and Linux.
Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)
2 rules 1 TTP 1 CVEA critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.
WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.
ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability
2 rules 1 TTP 1 CVEThe ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.
pyLoad Arbitrary Code Execution via Malicious Session Deserialization
2 rules 4 TTPs 1 CVE 2 IOCspyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.
libp2p-rendezvous Unlimited Namespace Registration DoS
2 rules 1 TTPA vulnerable libp2p-rendezvous server can be crashed via a denial-of-service attack where an unauthenticated peer registers unlimited namespaces, leading to memory exhaustion.
Coder Code-Marketplace Zip Slip Vulnerability
2 rules 2 TTPsA Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.
Directus Aggregate Query Vulnerability Allows Disclosure of Concealed Data
2 rules 1 TTPA vulnerability in Directus versions prior to 11.17.0 allows authenticated users to extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users, via aggregate queries.
Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)
2 rules 2 TTPs 1 CVEA context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.
PraisonAI OS Command Injection Vulnerability (CVE-2026-34937)
2 rules 1 TTP 1 CVEPraisonAI versions prior to 1.5.90 are vulnerable to OS Command Injection (CVE-2026-34937) due to insufficient escaping in the run_python() function, allowing arbitrary OS command execution via shell interpolation.
PraisonAI Gateway Unauthenticated Access Vulnerability
2 rules 1 TTP 1 CVEPraisonAI Gateway server versions prior to 4.5.97 allow unauthenticated access to WebSocket connections and agent topology, enabling unauthorized message sending and agent enumeration.
Emlog Path Traversal Vulnerability Leads to Remote Code Execution
2 rules 3 TTPs 1 CVEEmlog versions 2.6.2 and prior are vulnerable to path traversal via crafted ZIP uploads, allowing authenticated admins to write arbitrary files and achieve remote code execution.
Hirschmann HiLCOS OpenBAT/BAT450 IPv6 IPsec Firewall Bypass (CVE-2021-4477)
2 rules 1 TTP 1 CVECVE-2021-4477 describes a firewall bypass vulnerability in Hirschmann HiLCOS OpenBAT and BAT450 products that can be exploited by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while using an IPv6 Internet connection, allowing attackers to bypass configured firewall rules.
BentoML SSTI via Unsandboxed Jinja2 in Dockerfile Generation
2 rules 1 TTPBentoML versions 1.4.37 and earlier are vulnerable to server-side template injection (SSTI), where the Dockerfile generation function uses an unsandboxed jinja2.Environment allowing arbitrary Python code execution on the host machine when a malicious bento archive is imported and containerized, bypassing container isolation and potentially granting full access to the host filesystem and environment variables.
Piwigo SQL Injection Vulnerability (CVE-2026-27885)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27885 is a SQL Injection vulnerability in Piwigo before version 16.3.0, affecting the Activity List API endpoint, allowing an authenticated administrator to extract sensitive data.
Piwigo SQL Injection Vulnerability (CVE-2026-27834)
2 rules 1 TTP 1 CVE 1 IOCA SQL Injection vulnerability (CVE-2026-27834) exists in Piwigo versions prior to 16.3.0, allowing authenticated administrators to execute arbitrary SQL commands via the pwg.users.getList Web Service API method.
OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)
2 rules 1 TTPOAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.
Piwigo Unauthenticated History Search Access
2 rules 1 TTP 1 CVE 1 IOCPiwigo versions prior to 16.3.0 expose the full browsing history of gallery visitors to unauthenticated users via the pwg.history.search API method due to a missing authorization check.
fast-jwt Library Vulnerability Allows crit Header Validation Bypass
2 rules 1 TTP 1 CVEThe fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.
SandboxJS Integrity Escape Vulnerability
2 rules 2 TTPsA sandbox integrity escape vulnerability exists in SandboxJS versions prior to 0.8.36, allowing untrusted code to bypass global write protections and mutate host shared global objects, potentially leading to cross-context persistence and broader compromise.
curl_cffi SSRF Vulnerability via Redirects
2 rules 1 TTP 1 CVE 3 IOCscurl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.
Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability
2 rules 1 TTP 1 CVEA man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.
Amazon Athena ODBC Driver Denial of Service Vulnerability (CVE-2026-35562)
2 rules 1 TTP 1 CVEA remote, unauthenticated attacker can cause a denial of service by sending crafted input to vulnerable versions of the Amazon Athena ODBC driver, triggering excessive resource consumption during parsing operations.
Amazon Athena ODBC Driver Authentication Bypass Vulnerability (CVE-2026-35561)
2 rules 2 TTPs 1 CVECVE-2026-35561 describes an insufficient authentication security control vulnerability in the browser-based authentication components of the Amazon Athena ODBC driver before version 2.1.0.0, potentially allowing a threat actor to intercept or hijack authentication sessions.
Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)
2 rules 1 TTP 1 CVECVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.
Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)
2 rules 2 TTPs 1 CVEA command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.
prompts.chat Fal.ai SSRF Vulnerability (CVE-2026-22664)
2 rules 1 TTP 1 CVE 3 IOCsprompts.chat prior to commit 30a8f04 is vulnerable to server-side request forgery (SSRF) in Fal.ai media status polling, allowing authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs, leading to potential credential theft and internal network probing.
Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)
2 rules 2 TTPs 1 CVEA denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.
Hardcoded Storage Credentials in Mobile App and Device Firmware (CVE-2025-10681)
2 rules 1 TTP 1 CVECVE-2025-10681 describes a vulnerability where hardcoded storage credentials in a mobile app and device firmware, with inadequate permission limits and lack of expiration, could lead to unauthorized access to production storage containers.
Budibase Unauthenticated Remote Code Execution via Webhook
2 rules 1 TTP 1 CVEBudibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.
Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)
2 rules 1 TTP 1 CVEA stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.
Budibase Path Traversal Vulnerability in Plugin Upload
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in Budibase versions prior to 3.33.4, allowing attackers with Global Builder privileges to delete arbitrary directories and write arbitrary files via crafted plugin uploads.
Critical Authentication Bypass Vulnerability in Cisco Integrated Management Controller (CVE-2026-20093)
3 rules 3 TTPs 1 CVEAn unauthenticated remote attacker can exploit CVE-2026-20093 to bypass authentication in Cisco Integrated Management Controller (IMC), gain full administrative access, and manipulate hardware settings, potentially disrupting critical infrastructure.
Suricata Quadratic Complexity Issue in SMTP URL Searching (CVE-2026-31934)
2 rules 1 TTP 1 CVE 1 IOCSuricata versions 8.0.0 to before 8.0.4 exhibit a quadratic complexity vulnerability (CVE-2026-31934) when searching for URLs in MIME-encoded SMTP messages, leading to significant performance degradation and potential denial-of-service conditions; this is fixed in version 8.0.4.
fast-jwt Library JWT Algorithm Confusion Vulnerability
2 rules 1 TTP 1 CVEThe fast-jwt library is vulnerable to JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key due to an incomplete fix for CVE-2023-48223, allowing attackers to bypass intended security measures by exploiting leading whitespace in the RSA public key, enabling attackers to sign arbitrary payloads that will be accepted by the verifier, potentially leading to privilege escalation.
Democratization of Business Email Compromise (BEC) Attacks
2 rules 2 TTPs 1 CVE 6 IOCsAttackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.
Compromised Axios Library Leads to RAT Deployment via @usebruno/cli
2 rules 5 TTPs 1 IOCCompromised versions of the `axios` npm package introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT), impacting users of `@usebruno/cli` who ran `npm install` between 00:21 UTC and ~03:30 UTC on March 31, 2026, potentially leading to credential exfiltration.
ManageEngine Exchange Reporter Plus Stored XSS Vulnerability
2 rules 2 TTPs 1 CVEZohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in the Distribution Lists report, allowing attackers to inject malicious scripts.
Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)
2 rules 1 TTP 1 CVEThe Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.
AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions
2 rules 1 TTP 1 CVEAIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.
Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)
2 rules 1 TTP 1 CVEA command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.
Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)
2 rules 1 TTPAjenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.
Wisp Multipart Parsing Vulnerability Leads to Denial of Service
3 rules 1 TTP 1 CVEA vulnerability in the multipart parsing logic of gleam-wisp allows an unauthenticated attacker to bypass request size limits and cause a denial of service by exhausting server memory or disk.
Swift Crypto X-Wing HPKE Decapsulation Vulnerability
2 rules 1 TTPThe X-Wing decapsulation path in swift-crypto accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length of 1120 bytes, leading to a potential out-of-bounds read.
Ech0 Unauthenticated Server-Side Request Forgery Vulnerability
2 rules 1 TTP 2 IOCsEch0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.
Better Auth Two-Factor Authentication Bypass Vulnerability
2 rules 1 TTPBetter Auth versions prior to 1.4.9 have a critical two-factor authentication bypass vulnerability; when session.cookieCache is enabled, the initial sign-in session may be improperly cached, allowing attackers with valid credentials to bypass 2FA.
Sudo Privilege Escalation Vulnerability (CVE-2026-35535)
2 rules 1 TTP 1 CVECVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.
OpenClaw TOCTOU Race Condition Leads to Sandbox Escape
2 rules 1 TTPA critical time-of-check time-of-use (TOCTOU) vulnerability in OpenClaw's remote file system bridge allows a sandbox escape by exploiting the delay between path validation and file reading, affecting versions up to 2026.3.28.
OpenClaw Incomplete Scope Clearing Allows Privilege Escalation
2 rules 1 TTPAn incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.
OpenClaw Arbitrary File Read and Credential Exfiltration Vulnerability
2 rules 1 TTPThe openclaw package is vulnerable to arbitrary file read and credential exfiltration due to media local roots self-whitelisting in `appendLocalMediaParentRoots`, allowing a model to initiate arbitrary host file reads, potentially leading to credential exfiltration.
Electron Use-After-Free Vulnerability in Offscreen Rendering with Child Windows
2 rules 1 IOCA use-after-free vulnerability (CVE-2026-34774) exists in Electron applications using offscreen rendering and allowing child windows, potentially leading to crashes or memory corruption if the parent WebContents is destroyed before the child window.
Electron Use-After-Free Vulnerability in PowerMonitor Module
2 rules 1 TTP 1 IOCA use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.
CVE-2026-33105 - Microsoft Azure Kubernetes Service Privilege Escalation
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-33105 is a critical vulnerability in Microsoft Azure Kubernetes Service that allows an unauthorized attacker to elevate privileges over a network due to improper authorization.
Azure Databricks SSRF Vulnerability (CVE-2026-33107) Allows Privilege Escalation
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability, identified as CVE-2026-33107, exists in Azure Databricks, allowing an unauthorized attacker to elevate privileges over a network.
Azure SRE Agent Improper Authentication Vulnerability (CVE-2026-32173)
2 rules 1 TTP 1 CVEAn improper authentication vulnerability (CVE-2026-32173) in the Azure SRE Agent allows an unauthorized attacker to disclose sensitive information over the network, potentially leading to data breaches or further compromise.
Azure MCP Server Missing Authentication Vulnerability (CVE-2026-32211)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32211 is a critical vulnerability in Azure MCP Server due to missing authentication for a critical function, allowing an unauthorized attacker to disclose information over the network.
Hirschmann EagleSDV Denial-of-Service Vulnerability (CVE-2022-4986)
2 rules 1 TTP 1 CVEHirschmann EagleSDV devices are vulnerable to denial-of-service (DoS) attacks where a device crash can be triggered by establishing TLS 1.0 or TLS 1.1 connections, leading to service disruption.
Hirschmann HiLCOS Web Interface Heap Overflow Vulnerability (CVE-2024-14033)
2 rules 1 TTP 1 CVEA heap overflow vulnerability in the HiLCOS web interface of Hirschmann Industrial IT products (CVE-2024-14033) allows unauthenticated remote attackers to cause a denial-of-service condition by sending specially crafted requests, leading to device crashes and service disruption, particularly when the Public Spot functionality is enabled.
OpenClaw Sandbox Bypass via Heartbeat Context Inheritance
2 rulesA critical vulnerability in the openclaw npm package (<=2026.3.28) allows a heartbeat context inheritance to bypass the sandbox via senderIsOwner escalation, patched in version 2026.3.31.
OpenClaw NPM Package Vulnerable to Python Package Index Redirection
2 rulesThe openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.
OneUptime SAML SSO Authentication Bypass Vulnerability (CVE-2026-34840)
2 rules 1 TTP 1 CVEOneUptime versions prior to 10.0.42 are vulnerable to an authentication bypass due to improper SAML signature validation, allowing attackers to impersonate users by prepending unsigned assertions.
Hirschmann HiEOS HTTP(S) Management Module Authentication Bypass (CVE-2024-14034)
2 rules 1 TTP 1 CVEHirschmann HiEOS devices contain an authentication bypass vulnerability (CVE-2024-14034) in the HTTP(S) management module, allowing unauthenticated remote attackers to gain administrative access by sending specially crafted HTTP(S) requests.
Kiro IDE Code Execution Vulnerability via Crafted Color Theme (CVE-2026-5429)
2 rules 2 TTPs 1 CVECVE-2026-5429 is a code execution vulnerability in Kiro IDE before version 0.8.140 that allows a remote, unauthenticated attacker to execute arbitrary code by exploiting a crafted color theme name when a local user opens a workspace.
OneUptime Unauthenticated Endpoint Access Vulnerability (CVE-2026-34758)
2 rules 1 TTP 1 CVE 1 IOCOneUptime versions prior to 10.0.42 are vulnerable to unauthenticated access to Notification test and Phone Number management endpoints, leading to potential abuse of SMS, Call, Email, and WhatsApp functionalities, and unauthorized phone number purchases, fixed in version 10.0.42.
goshs Authentication Bypass Vulnerability (CVE-2026-34581)
1 rule 1 TTPgoshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).
CVE-2024-44250: macOS Sequoia Privilege Escalation Vulnerability
2 rules 1 TTP 1 CVECVE-2024-44250 is a permission issue in macOS Sequoia 15.1 that allows an application to execute arbitrary code outside of its sandbox or with elevated privileges, potentially leading to full system compromise.
HiSecOS Web Server Privilege Escalation Vulnerability (CVE-2023-7342)
2 rules 1 TTP 1 CVECVE-2023-7342 allows authenticated users with operator or auditor roles in HiSecOS web server to escalate privileges to administrator by sending specially crafted packets, potentially granting full administrative access.
OpenProject SQL Injection Vulnerability (CVE-2026-34717)
2 rules 1 TTP 1 CVE 1 IOCOpenProject versions before 17.2.3 are susceptible to SQL injection due to improper input sanitization in the '=n' operator, potentially allowing remote attackers to execute arbitrary SQL commands.
OpenSSH scp Insecure File Permission Vulnerability (CVE-2026-35385)
2 rules 1 TTP 1 CVEOpenSSH versions before 10.3 allow for the potential installation of setuid or setgid files when using scp to download files as root with the -O option (legacy SCP protocol) and without the -p option (preserve mode), contrary to user expectations.
Rack::Static Information Disclosure Vulnerability (CVE-2026-34785)
2 rules 1 TTP 1 CVERack versions prior to 2.2.23, 3.1.21, and 3.2.6 are vulnerable to information disclosure due to improper static file serving via a prefix matching issue in Rack::Static.
Balena Etcher for Windows TOCTOU Vulnerability
2 rules 1 TTP 1 CVEA Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.
Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.
Endian Firewall Command Injection Vulnerability (CVE-2026-34791)
2 rules 1 TTP 1 CVEEndian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.
Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)
2 rules 1 TTP 1 CVE 1 IOCEndian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.
Suricata HTTP2 Continuation Frame Flooding Denial of Service (CVE-2026-31935)
2 rules 1 TTP 1 CVEA denial of service vulnerability, CVE-2026-31935, exists in Suricata versions prior to 7.0.15 and 8.0.4, where flooding the system with crafted HTTP2 continuation frames leads to memory exhaustion and process termination.
Suricata DCERPC Buffering Inefficiency Vulnerability (CVE-2026-31937)
2 rules 1 TTP 1 CVE 1 IOCSuricata versions prior to 7.0.15 are vulnerable to CVE-2026-31937, where inefficient DCERPC buffering can lead to a denial-of-service condition through performance degradation.
DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)
2 rules 2 TTPs 1 CVEDefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.
Suricata NULL Dereference Vulnerability
2 rules 2 TTPs 1 CVE 2 IOCsSuricata versions 8.0.0 to before 8.0.4 are vulnerable to a NULL dereference crash when using the 'tls.alpn' rule keyword, potentially leading to a denial of service.
Suricata KRB5 Buffering Inefficiency Vulnerability (CVE-2026-31932)
2 rules 1 TTP 1 CVE 1 IOCAn unauthenticated attacker can exploit CVE-2026-31932, a vulnerability in Suricata versions prior to 7.0.15 and 8.0.4, to cause performance degradation due to inefficient KRB5 buffering.
Suricata DoS Vulnerability (CVE-2026-31933)
2 rules 1 TTP 1 CVE 1 IOCSpecially crafted network traffic can cause Suricata to slow down, leading to a denial-of-service condition in versions prior to 7.0.15 and 8.0.4, as identified by CVE-2026-31933.
ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)
2 rules 1 TTPAuthenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.
ShareFile Storage Zones Controller Unauthenticated Configuration Access and Potential RCE (CVE-2026-2699)
2 rules 2 TTPs 3 IOCsAn unauthenticated attacker can access restricted configuration pages in Customer Managed ShareFile Storage Zones Controller (SZC), leading to system configuration changes and potential remote code execution.
OpenSTAManager Time-Based Blind SQL Injection Vulnerability
2 rules 1 TTPOpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.
Unusual City for Azure Activity Logs Event
2 rules 3 TTPsA machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.
Spike in Successful Logon Events from a Source IP
2 rules 3 TTPsA machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.
Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)
2 rules 3 TTPs 1 CVECVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.
Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.
Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.
Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.
Unusual Spike in Bytes Written to External Device Detected by Machine Learning
2 rules 1 TTPA machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.
SSH Authorized Key File Modification Inside a Container
2 rules 4 TTPsThe rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.
SillyTavern Path Traversal Vulnerability in Chat Endpoints
3 rules 4 TTPsA path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.
DeepLoad Malware Distributed via ClickFix
2 rules 3 TTPsThe DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.
Unauthenticated SQL Injection Vulnerability in mb24api Endpoint (CVE-2026-33616)
2 rules 1 TTP 1 CVECVE-2026-33616 describes an unauthenticated blind SQL Injection vulnerability affecting an mb24api endpoint, which a remote attacker can exploit by injecting special elements into a SQL SELECT command, potentially leading to a total loss of confidentiality due to improper neutralization of special elements.
Unauthenticated SQL Injection Vulnerability in setinfo Endpoint
2 rules 1 TTP 1 CVE 3 IOCsAn unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.
Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)
2 rules 1 TTP 1 CVEAn unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.
CVE-2026-33613: Remote Code Execution in generateSrpArray Function
2 rules 1 TTP 1 CVECVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.
Cesanta Mongoose TLS 1.3 Heap-Based Buffer Overflow Vulnerability (CVE-2026-5244)
2 rules 1 TTP 1 CVEA remote heap-based buffer overflow vulnerability exists in Cesanta Mongoose versions up to 7.20 due to improper handling of the pubkey argument in the mg_tls_recv_cert function, potentially leading to code execution.
WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)
2 rules 1 TTP 1 CVEThe Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.
MW WP Form WordPress Plugin Arbitrary File Move Vulnerability (CVE-2026-4347)
2 rules 2 TTPs 1 CVEThe MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation, allowing unauthenticated attackers to move arbitrary files on the server, potentially leading to remote code execution.
AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.
vanna-ai vanna Authentication Bypass Vulnerability (CVE-2026-5320)
2 rules 2 TTPs 1 CVECVE-2026-5320 describes an unauthenticated remote access vulnerability in vanna-ai vanna up to version 2.0.2 via manipulation of the /api/vanna/v2/ Chat API endpoint, potentially allowing unauthorized access and actions.
HCL BigFix Platform Insecure Permissions Vulnerability (CVE-2026-21765)
2 rules 2 TTPs 1 CVEHCL BigFix Platform is vulnerable to insecure permissions on private cryptographic keys, where keys on a Windows host may have overly permissive file system permissions, potentially leading to unauthorized access and privilege escalation.
Juju Controller Vulnerable to Unauthorized Database Access Due to Improper TLS Configuration
2 rules 3 TTPsJuju controller versions 3.2.0 up to 3.6.20 and 4.0.5 are vulnerable to unauthorized database access due to improper TLS client/server authentication and certificate verification, allowing an attacker with network access to modify all information, escalate privileges, and open firewall ports.
PraisonAI SubprocessSandbox Shell Escape via sh/bash
2 rules 3 TTPsPraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '<command>'`.
PraisonAI SSRF Vulnerability via Unvalidated api_base Parameter
2 rules 1 TTP 1 IOCPraisonAI versions 4.5.89 and earlier are vulnerable to SSRF via the `api_base` parameter in the `passthrough()` function, allowing attackers to make requests to internal services or external hosts, potentially leading to IAM credential theft on cloud infrastructure or access to internal services within the VPC.
KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe
2 rules 1 TTPThe KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.
V-SFT Stack-Based Buffer Overflow Vulnerability (CVE-2026-32928)
2 rules 1 TTP 1 CVEV-SFT versions 6.2.10.0 and prior are susceptible to a stack-based buffer overflow vulnerability that could allow arbitrary code execution when a malicious V7 file is opened.
V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32929)
2 rules 1 TTP 1 CVEV-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability (CVE-2026-32929) in VS6ComFile!get_macro_mem_COM, where opening a crafted V7 file may lead to information disclosure.
V-SFT v6.2.10.0 Stack-Based Buffer Overflow (CVE-2026-32925)
2 rules 3 TTPs 1 CVEV-SFT versions 6.2.10.0 and prior are vulnerable to a stack-based buffer overflow (CVE-2026-32925) in the VS6ComFile!CV7BaseMap::WriteV7DataToRom function, potentially leading to arbitrary code execution when processing a crafted V7 file.
V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32926)
2 rules 6 TTPs 1 CVE 3 IOCsV-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in the VS6ComFile!load_link_inf function, allowing for potential information disclosure when opening a crafted V7 file.
CI4MS Stored XSS Vulnerability in User Management
2 rules 2 TTPs 1 CVEA stored cross-site scripting (XSS) vulnerability in CI4MS versions prior to 0.31.0.0 allows attackers to inject persistent JavaScript code into the backend user management functionality, leading to session hijacking, privilege escalation, and full administrative account compromise.
IBM Verify and Security Verify Access Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVECVE-2026-4101 describes an authentication bypass vulnerability in IBM Verify Identity Access Container and IBM Security Verify Access Container versions 11.0 through 11.0.2 and 10.0 through 10.0.9.1, respectively, that could allow unauthorized access under specific load conditions.
File Browser EPUB Preview Stored XSS Vulnerability (CVE-2026-34529)
2 rulesFile Browser versions prior to 2.62.2 are vulnerable to stored cross-site scripting (XSS) via the EPUB preview function, allowing attackers to execute arbitrary JavaScript in a user's browser by embedding malicious code in a crafted EPUB file.
IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability
2 rules 1 TTP 1 CVEUnauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.
Goshs Authentication Bypass via Share Token
2 rules 3 TTPs 2 IOCsGoshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.
Payload CMS Stored XSS Vulnerability (CVE-2026-34748)
2 rules 1 TTP 1 CVEA stored Cross-Site Scripting (XSS) vulnerability exists in Payload CMS versions prior to 3.78.0, allowing authenticated users with write access to inject malicious scripts that execute in the browsers of other users.
Payload CMS SSRF Vulnerability (CVE-2026-34746)
2 rules 1 TTP 1 CVEPayload CMS versions before 3.79.1 are vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users with upload access to trigger outbound HTTP requests to arbitrary URLs.
Payload CMS Password Reset Vulnerability (CVE-2026-34751)
2 rules 1 TTP 1 CVE 1 IOCAn unauthenticated attacker can perform actions on behalf of a user initiating a password reset in Payload CMS versions prior to 3.79.1 due to a flaw in the password recovery flow, potentially leading to account takeover or privilege escalation.
Mbed TLS FFDH Public Key Export Buffer Overflow
2 rules 2 TTPs 1 CVEA buffer overflow vulnerability (CVE-2026-34875) exists in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0 during public key export for FFDH keys, potentially leading to code execution or denial of service.
Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)
2 rules 1 TTP 1 CVEAuth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.
Open WebUI Broken Access Control Vulnerability (CVE-2026-34222)
2 rules 3 TTPs 1 CVEA broken access control vulnerability in Open WebUI versions prior to 0.8.11 (CVE-2026-34222) allows authenticated users to potentially access or modify tool values they should not be authorized to, leading to privilege escalation and unauthorized configuration changes.
Tina CMS Path Traversal Vulnerability (CVE-2026-34603)
2 rules 1 TTPTina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.
DedeCMS 5.7.118 Code Injection Vulnerability via Crafted Module Upload (CVE-2026-30643)
2 rules 1 TTP 1 CVEDedeCMS 5.7.118 is vulnerable to remote code execution via crafted setup tag values during a module upload, as exploited by an unauthenticated attacker (CVE-2026-30643).
pandas-ai SQL Injection Vulnerability (CVE-2026-30273)
2 rules 1 TTP 1 CVEpandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.
Cisco Smart Software Manager On-Prem RCE via Exposed API (CVE-2026-20160)
2 rules 1 TTP 1 CVECVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges by sending a crafted request to an exposed API.
Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)
2 rules 1 TTP 1 CVELakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.
Critical Vulnerability in FastGPT Allows API Key Exfiltration and Internal Network Access
2 rules 3 TTPs 1 CVE 1 IOCCVE-2026-34162 in FastGPT allows unauthenticated attackers to exfiltrate API keys and gain complete access to internal services managed by Docker Compose by sending arbitrary HTTP requests, leading to potential compromise of the internal network.
Unsecured Zoom Meeting Creation
2 rules 2 TTPsThe creation of Zoom meetings without passcodes allows unauthorized access and disruption, known as Zoombombing, potentially leading to the exposure of sensitive information or reputational damage.
Libinput Code Injection Vulnerability via Malicious Lua Bytecode (CVE-2026-35093)
3 rules 6 TTPs 1 CVEA local attacker can exploit CVE-2026-35093 in libinput by placing a specially crafted Lua bytecode file in configuration directories, allowing arbitrary code execution with the privileges of the application using libinput.
Corosync Integer Overflow Vulnerability (CVE-2026-35092) Leads to DoS
2 rules 2 TTPs 1 CVECVE-2026-35092 is an integer overflow vulnerability in Corosync's join message sanity validation, allowing a remote, unauthenticated attacker to send crafted UDP packets, resulting in a denial of service condition.
Kubectl Network Configuration Modification
3 rules 2 TTPsThis rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.
WebServer Access Logs Deleted
2 rules 1 TTPDetection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.
Dell AppSync 4.6.0 UNIX Symbolic Link Following Vulnerability (CVE-2026-22767)
2 rules 1 TTP 1 CVEDell AppSync version 4.6.0 is vulnerable to a UNIX Symbolic Link (Symlink) Following vulnerability (CVE-2026-22767) that allows a low-privileged local attacker to tamper with information.
Dell AppSync 4.6.0 Incorrect Permission Assignment Vulnerability
2 rules 1 TTP 1 CVEDell AppSync version 4.6.0 contains an incorrect permission assignment vulnerability that allows a low-privileged attacker with local access to elevate privileges on the system.
CrewAI Vulnerabilities Allow Remote Code Execution
3 rules 3 TTPs 4 CVEsMultiple vulnerabilities in CrewAI, an open-source multi-agent orchestration framework, can be exploited by attackers through prompt injection to execute arbitrary code and perform other malicious activities, potentially leading to system compromise.
Right-to-Left Override Character Used for Defense Evasion
2 rules 1 TTPAdversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.
BPFDoor Lock File Access
2 rules 2 TTPsBPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.
SonicWall Email Security Appliance Multiple Vulnerabilities
2 rules 2 TTPsA remote, authenticated attacker with administrator rights can exploit multiple vulnerabilities in SonicWall Email Security Appliance to perform cross-site scripting, manipulate data, or cause a denial-of-service.
gdk-pixbuf Vulnerability Allows Denial of Service and Potential Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in gdk-pixbuf to cause a denial of service and potentially execute arbitrary code.
cPanel/WHM Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in cPanel/WHM to escalate their privileges.
7-Zip Multiple Vulnerabilities Allow Remote Code Execution
2 rules 1 TTPMultiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.
Multiple Vulnerabilities in PowerDNS
1 ruleMultiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.
Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in libpng to execute arbitrary program code or cause a denial of service.
HTTP/2 Implementations Vulnerability Enables Denial of Service
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in various HTTP/2 implementations to perform a denial-of-service attack.
7-Zip Vulnerability Allows File Manipulation
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in 7-Zip to manipulate files, leading to potential data integrity issues.
IBM App Connect Enterprise Multiple Vulnerabilities
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in IBM App Connect Enterprise to cause a denial-of-service condition or bypass security measures, enabling cross-site scripting attacks.
Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution
2 rules 2 TTPsA local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.
Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS
2 rules 2 TTPsA remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.
Shandong Hoteam InforCenter PLM Unrestricted Upload Vulnerability (CVE-2026-5261)
2 rules 3 TTPs 1 CVECVE-2026-5261 is an unrestricted file upload vulnerability in Shandong Hoteam InforCenter PLM up to version 8.3.8, allowing remote attackers to execute arbitrary code by uploading malicious files via the uploadFileToIIS function.
Weaponization of Google Vertex AI Agents
2 rules 8 TTPsResearchers demonstrated that AI agents built on Google's Vertex AI can be compromised to exfiltrate data, create backdoors, and compromise infrastructure by abusing excessive permissions of the Per-Project, Per-Product Service Agent (P4SA).
Sanster IOPaint Path Traversal Vulnerability (CVE-2026-5258)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-5258) exists in Sanster IOPaint 1.5.3, allowing remote attackers to read arbitrary files by manipulating the filename argument in the _get_file function within the File Manager component.
Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)
2 rules 1 TTP 1 CVECVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.
CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer
2 rules 1 TTP 1 CVEAn application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.
XenForo RCE via Authenticated Admin User (CVE-2026-35056)
2 rules 1 TTP 1 CVE 1 IOCXenForo before 2.3.9 and 2.2.18 allows remote code execution by authenticated, malicious admin users with admin panel access.
XenForo Template Code Injection Vulnerability (CVE-2025-71281)
2 rules 2 TTPs 1 CVE 1 IOCXenForo before 2.3.7 is vulnerable to code injection due to a loose prefix match for methods accessible within templates, potentially allowing unauthorized method invocations.
XenForo Path Disclosure via Open-Basedir Restrictions (CVE-2025-71282)
2 rules 1 TTP 1 CVEXenForo before 2.3.7 discloses filesystem paths through exception messages triggered by open_basedir restrictions, allowing attackers to gain sensitive information about the server's directory structure.
XenForo OAuth2 Unauthorized Scope Request Vulnerability
2 rules 1 TTP 1 CVE 2 IOCsXenForo before 2.3.5 allows OAuth2 client applications to request unauthorized scopes, potentially allowing client applications to gain access beyond their intended authorization level due to improper authorization checks.
SiYuan Note Reflected XSS Vulnerability in SVG Processing
2 rules 1 TTPSiYuan Note versions prior to the fix for commit f09953afc57a are vulnerable to reflected cross-site scripting (XSS) via a namespace prefix bypass in the SanitizeSVG function when handling dynamic icons, allowing unauthenticated attackers to execute arbitrary JavaScript in a victim's browser.
itsourcecode Payroll Management System 1.0 SQL Injection Vulnerability
2 rules 1 TTP 1 CVE 5 IOCsitsourcecode Payroll Management System 1.0 is vulnerable to SQL injection via the ID parameter in /view_employee.php, allowing remote attackers to execute arbitrary SQL commands.
OpenClaw Gateway Unauthorized Session Reset Vulnerability
2 rules 1 TTPA vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.
File Browser Stored XSS via Crafted EPUB File
2 rules 5 TTPs 1 CVE 2 IOCsFile Browser version 2.62.1 and earlier is vulnerable to stored cross-site scripting (XSS) via crafted EPUB files, allowing attackers to execute arbitrary JavaScript in a victim's browser by exploiting the application's misconfigured iframe sandbox and stealing sensitive information like JWT tokens.
SQL Injection Vulnerability in itsourcecode Payroll Management System 1.0 (CVE-2026-5237)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5237) exists in itsourcecode Payroll Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID parameter in the /manage_user.php file.
SiYuan Knowledge Management System RCE via Malicious Website
2 rules 1 TTP 1 CVESiYuan versions prior to 3.6.2 are vulnerable to remote code execution (RCE) via a malicious website exploiting a permissive CORS policy to inject a JavaScript snippet, leading to arbitrary code execution within the application's Node.js context.
Vim and Emacs Remote Code Execution Vulnerabilities Triggered by File Opening
2 rules 1 TTPVulnerabilities in Vim (<=9.2.0271) and GNU Emacs allow remote code execution by opening a specially crafted file, leveraging flaws in modeline handling and Git integration, respectively.
Axios npm Package Compromised in Supply Chain Attack
2 rules 1 TTPThe widely used Axios npm package was compromised via a supply chain attack on March 31, 2026, resulting in the publication of malicious versions through a compromised maintainer account.
lodash _.template Function Injection Vulnerability (CVE-2026-4800)
2 rules 2 TTPs 2 CVEsCVE-2026-4800 allows attackers to inject arbitrary code at template compilation time via untrusted input passed as key names in the options.imports object of the _.template function in lodash versions prior to 4.18.0, potentially leading to remote code execution.
SourceCodester Leave Application System 1.0 File Inclusion Vulnerability (CVE-2026-5210)
2 rules 1 TTP 1 CVE 6 IOCsSourceCodester Leave Application System 1.0 is vulnerable to remote file inclusion (CVE-2026-5210) due to improper handling of the 'page' argument, potentially allowing attackers to execute arbitrary code.
AWS-C-EventStream Out-of-Bounds Write Vulnerability (CVE-2026-5190)
2 rules 3 TTPs 1 CVECVE-2026-5190 is an out-of-bounds write vulnerability in the aws-c-event-stream library before version 0.6.0 that allows a malicious third-party server to cause memory corruption and potential arbitrary code execution on client applications.
SciTokens C++ Authorization Bypass Vulnerability (CVE-2026-32725)
2 rules 1 TTP 1 CVESciTokens C++ library before 1.4.1 is vulnerable to an authorization bypass (CVE-2026-32725) due to improper path normalization, allowing attackers to escalate privileges by using parent-directory traversal in scope claims.
UXGROUP Cast to TV Screen Mirroring Arbitrary File Overwrite Vulnerability (CVE-2026-30282)
2 rules 4 TTPs 1 CVE 1 IOCUXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is vulnerable to arbitrary file overwrite (CVE-2026-30282) via the file import process, allowing attackers to overwrite critical internal files and potentially achieve arbitrary code execution or information exposure.
Kerberos Authentication Relay via DNS CNAME Abuse (CVE-2026-20929)
2 rules 1 TTP 1 CVEAn attacker exploits CVE-2026-20929 by manipulating DNS responses to redirect Kerberos authentication to attacker-controlled AD CS, enabling certificate enrollment for persistent access.
NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)
2 rules 1 TTP 1 CVE 1 IOCNVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.
NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)
2 rules 5 TTPs 1 CVE 1 IOCCVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.
NVIDIA Jetson JetPack Insecure Default Initialization Vulnerability (CVE-2026-24148)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-24148 is a vulnerability in NVIDIA Jetson for JetPack's system initialization logic, where an unprivileged attacker can cause the initialization of a resource with an insecure default, potentially leading to information disclosure, data tampering, and denial of service.
Tenda CH22 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5204)
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability (CVE-2026-5204) exists in the Tenda CH22 1.0.0.1 router, allowing remote attackers to execute arbitrary code by manipulating the webSiteId argument in the formWebTypeLibrary function.
MPPX TypeScript Interface Vulnerability (CVE-2026-34209)
1 rule 1 TTP 1 CVE 2 IOCsA vulnerability exists in mppx TypeScript interface before version 0.4.11, allowing attackers to close or grief channels for free by submitting close vouchers equal to the settled amount due to incorrect validation.
OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.
SQL Injection Vulnerability in Student Membership System 1.0
2 rules 1 TTP 1 CVECVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.
Query Monitor WordPress Plugin Vulnerable to Reflected XSS (CVE-2026-4267)
2 rules 1 TTP 1 CVEThe Query Monitor WordPress plugin is vulnerable to reflected cross-site scripting (XSS) due to insufficient input sanitization and output escaping of the '$_SERVER['REQUEST_URI']' parameter, allowing unauthenticated attackers to inject arbitrary web scripts.
OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)
2 rules 1 TTP 1 CVE 1 IOCOpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.
OpenClaw Microsoft Teams Plugin Sender Allowlist Bypass (CVE-2026-34506)
2 rules 2 TTPs 1 CVEOpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin, allowing unauthorized senders to bypass intended authorization checks due to improper handling of empty groupAllowFrom parameters, potentially leading to information disclosure.
OpenClaw Information Disclosure via Telegram Bot Token Exposure
2 rules 1 CVEOpenClaw before version 2026.3.13 exposes Telegram bot tokens in error messages due to the fetchRemoteMedia function embedding these tokens in MediaFetchError strings when media downloads fail.
OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.
code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.
DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)
2 rules 1 TTP 1 CVEA stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.
ENOVIA Collaborative Industry Innovator Stored XSS Vulnerability (CVE-2025-10551)
2 rules 1 TTP 1 CVE 1 IOCA stored cross-site scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator allows an attacker to execute arbitrary script code in a user's browser session by injecting malicious code into document management functions.
DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.
ImageMagick Multiple Vulnerabilities Leading to DoS, Code Execution, or Data Manipulation
2 rules 1 TTPMultiple vulnerabilities in ImageMagick could allow an attacker to perform a denial of service attack, execute arbitrary code, or manipulate data.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 1 TTPThe trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 1 TTPThe aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 2 TTPsThe trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.
SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)
2 rules 1 TTP 1 CVE 5 IOCsA SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.
SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.
vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)
2 rules 2 TTPs 1 CVEA vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.
SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)
2 rules 1 TTP 1 CVE 4 IOCsSciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.
act Project Cache Poisoning Vulnerability Leads to Potential RCE
2 rules 1 TTP 1 CVEA vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.
SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)
2 rules 1 TTP 1 CVEA path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.
Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)
2 rules 2 TTPs 1 CVE 2 IOCsA security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.
SciTokens KeyCache SQL Injection Vulnerability (CVE-2026-32714)
2 rules 3 TTPs 1 CVEA SQL injection vulnerability exists in SciTokens versions before 1.9.6, allowing attackers to execute arbitrary SQL commands via the KeyCache class by manipulating user-supplied data used in SQL query construction.
Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.
baserCMS OS Command Injection Vulnerability (CVE-2026-21861)
2 rules 1 TTP 1 CVEbaserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.
baserCMS DOM-Based Cross-Site Scripting Vulnerability (CVE-2026-32734)
2 rules 1 TTP 1 CVEbaserCMS versions prior to 5.2.3 are vulnerable to DOM-based Cross-Site Scripting (XSS) due to improper neutralization of input during web page generation, potentially allowing a remote attacker to execute arbitrary JavaScript in a user's browser.
baserCMS OS Command Injection Vulnerability (CVE-2026-30877)
2 rules 1 TTP 1 CVEbaserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.
baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)
2 rules 6 TTPs 1 CVE 4 IOCsbaserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.
Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1 via manipulation of the `mit_linktype` argument in the `/goform/QuickIndex` endpoint, potentially enabling remote code execution.
Tenda CH22 Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1/1.If allowing remote attackers to execute arbitrary code by manipulating the `funcname` argument in the `/goform/setcfm` endpoint.
Contact Form by Supsystic WordPress Plugin SSTI Vulnerability (CVE-2026-4257)
2 rules 1 TTP 1 CVEThe Contact Form by Supsystic WordPress plugin is vulnerable to Server-Side Template Injection (SSTI) via the `cfsPreFill` parameter, leading to unauthenticated Remote Code Execution (RCE).
FreeRDP Heap-Buffer-Overflow Vulnerability (CVE-2026-33982)
2 rules 3 TTPs 1 CVE 1 IOCA heap-buffer-overflow read vulnerability exists in FreeRDP versions prior to 3.24.2, specifically in the winpr_aligned_offset_recalloc() function, potentially leading to denial of service or information disclosure.
Botan SM2 Decryption Heap Over-read Vulnerability (CVE-2026-32877)
2 rules 1 TTP 1 CVE 2 IOCsBotan C++ cryptography library versions 2.3.0 before 3.11.0 are vulnerable to a heap over-read during SM2 decryption due to insufficient validation of the authentication code length, potentially leading to crashes or undefined behavior.
SQL Injection Vulnerability in code-projects Accounting System 1.0 (CVE-2026-5150)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-5150) exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' argument in /viewin_costumer.php, potentially allowing attackers to execute arbitrary SQL commands.
YunaiV yudao-cloud SQL Injection Vulnerability
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.
Symantec DLP Windows Endpoint Elevation of Privilege Vulnerability (CVE-2026-3991)
2 rules 1 TTPCVE-2026-3991 is an elevation of privilege vulnerability in Symantec Data Loss Prevention (DLP) Windows Endpoint that could allow a local attacker to gain elevated access to resources.
Vim Code Execution Vulnerability via Crafted Files (CVE-2026-34714)
2 rules 2 TTPsVim versions before 9.2.0272 allow code execution upon opening a specially crafted file due to %{expr} injection in tabpanel lacking P_MLE in the default configuration, potentially leading to arbitrary code execution.
GNU C Library iconv() Function Assertion Failure (CVE-2026-4046)
2 rules 1 TTPA vulnerability in the iconv() function of the GNU C Library (versions 2.43 and earlier) can cause a crash due to an assertion failure when handling IBM1390 or IBM1399 character sets, potentially leading to remote application denial-of-service.
Parse Server LiveQuery Protected Field Leak via Shared Mutable State
3 rulesParse Server versions before 8.6.65 and between 9.0.0 and 9.7.0-alpha.9 are vulnerable to a data leak where protected fields and authentication data can be exposed to unauthorized clients due to shared mutable objects across concurrent LiveQuery subscribers.
TinaCMS GraphQL Path Traversal Vulnerability
2 rules 2 TTPsA path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root by manipulating the relativePath parameter in GraphQL mutations, leading to potential arbitrary code execution.
Glances XML-RPC Server Cross-Origin Information Disclosure
2 rules 3 TTPs 2 IOCsThe Glances XML-RPC server exposes sensitive system information due to a permissive CORS policy and missing Content-Type validation, enabling attackers to bypass CORS restrictions and steal data like hostnames, OS details, IP addresses, and process lists.
Gotenberg Chromium Deny-List Bypass via Case-Insensitive URL Scheme
2 rules 1 TTPGotenberg versions before 8.29.0 are vulnerable to unauthenticated arbitrary file read, where a case-insensitive URL scheme bypasses the Chromium deny-list, allowing attackers to read sensitive files such as /etc/passwd by using mixed-case or uppercase URL schemes like FILE:///etc/passwd, leading to the leakage of sensitive data from the Gotenberg container and bypassing the fix for CVE-2024-21527.
libp2p-gossipsub Remote Denial of Service via Integer Overflow
2 rules 1 TTPA remote, unauthenticated attacker can crash applications using libp2p-gossipsub versions prior to 0.49.4 by sending a crafted PRUNE control message with a near-maximum backoff value, causing an arithmetic overflow during heartbeat processing.
Multiple Vulnerabilities in Wazuh Leading to Code Execution and Data Manipulation
2 rules 6 TTPsMultiple vulnerabilities in Wazuh allow an attacker to perform denial-of-service attacks, execute arbitrary code, manipulate data, and disclose sensitive information, potentially leading to significant data breaches and system compromise.
Red Hat Undertow Multiple Vulnerabilities Allow Security Bypass
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat Undertow to bypass security measures, manipulate data, and disclose sensitive information.
Multiple Vulnerabilities in Fleet
2 rules 8 TTPsMultiple vulnerabilities in Fleet allow an attacker to perform SQL injection, denial of service, bypass security measures, disclose information, and execute arbitrary program code with administrator privileges.
Multiple Vulnerabilities in Grafana
2 rules 4 TTPsMultiple vulnerabilities in Grafana allow a remote attacker to conduct a denial-of-service attack, execute code, or disclose information.
Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation
2 rules 4 TTPsDetection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.
Langflow Vulnerability Allows File Manipulation
2 rules 1 TTPAn authenticated, remote attacker can exploit a vulnerability in Langflow to manipulate files, potentially leading to unauthorized data modification or application compromise.
ArthurFiorette steam-trader 2.1.1 Sensitive Information Exposure
2 rules 3 TTPsCVE-2026-5128 exposes sensitive Steam account data via the /users API endpoint and logs in ArthurFiorette steam-trader 2.1.1, allowing account takeover.
OpenBao Multiple Vulnerabilities Allow Security Bypass and XSS
2 rules 4 TTPsAn anonymous, remote attacker can exploit multiple vulnerabilities in OpenBao to bypass security measures or conduct cross-site scripting attacks.
Multiple Vulnerabilities in Dovecot Mail Server
2 rules 2 TTPsMultiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.
Internet Systems Consortium BIND Vulnerabilities Leading to Denial of Service
2 rules 1 TTPMultiple vulnerabilities in Internet Systems Consortium BIND can be exploited by a remote attacker to conduct a denial of service attack or bypass security measures.
Multiple Vulnerabilities in NGINX and NGINX Plus
2 rules 1 TTPMultiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.
Multiple Vulnerabilities in F5 BIG-IP and F5OS
2 rules 5 TTPsMultiple vulnerabilities in F5 BIG-IP and F5OS allow an attacker to bypass security mechanisms, escalate privileges, cause a denial-of-service condition, perform a cross-site scripting attack, and disclose or manipulate information.
Gigabyte Control Center Arbitrary File Write Vulnerability
2 rules 2 TTPsGigabyte Control Center has an Arbitrary File Write vulnerability (CVE-2026-4415) that allows unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.
Tinyproxy HTTP Chunked Encoding Integer Overflow Denial of Service
2 rules 1 TTPAn integer overflow vulnerability in Tinyproxy's HTTP chunked transfer encoding parser (versions <= 1.11.3) allows an unauthenticated remote attacker to cause a denial of service by sending a crafted chunk size that bypasses validation, leading to resource exhaustion.
CVE-2026-2328 Unauthenticated Path Traversal Vulnerability
2 rules 1 TTP 2 IOCsCVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.
CrowdStrike Falcon Cloud Security Advances CNAPP with Adversary-Informed Risk Prioritization
2 rules 5 TTPsCrowdStrike Falcon Cloud Security enhances its CNAPP capabilities, incorporating adversary intelligence to prioritize cloud risks based on threat actor behavior, particularly focusing on groups like LABYRINTH CHOLLIMA and SCATTERED SPIDER, to enable security teams to understand and remediate cloud exposures more effectively.
Securing AI Agents and Governing Shadow AI
2 rules 1 TTPCrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 1 TTPThe aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.
GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)
2 rules 2 TTPs 1 IOCGitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.
Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)
2 rules 1 TTPXiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.
OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability
2 rules 1 TTPThe openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.
OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs
2 rules 1 TTPOpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.
Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)
2 rules 1 TTPA remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.
XPath Boolean Expression DoS Vulnerability
2 rules 1 TTPA vulnerability in the antchfx/xpath package allows for denial of service via CPU exhaustion by exploiting boolean expressions that evaluate to true, leading to an infinite loop.
Tenda FH1201 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5046)
2 rules 1 TTP 1 IOCA stack-based buffer overflow vulnerability (CVE-2026-5046) in Tenda FH1201 version 1.2.0.14(408) allows remote attackers to execute arbitrary code by manipulating the GO argument in the formWrlExtraSet function of the /goform/WrlExtraSet component.
CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools
2 rules 2 TTPsCrowdStrike's Falcon Next-Gen SIEM now supports third-party EDR solutions, starting with Microsoft Defender, to extend AI-native SOC capabilities without replacing existing endpoint agents.
OpenClaw Credential Exposure via Leaked Pairing Codes
2 rules 1 TTPOpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.
Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTPA stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.
OpenClaw Insufficient File Permissions Vulnerability (CVE-2026-33572)
2 rules 1 TTP 4 IOCsOpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents and extract sensitive information.
OpenClaw Code Execution via Script Modification (CVE-2026-32979)
2 rules 1 TTPOpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.
OpenClaw Bootstrap Code Replay Vulnerability (CVE-2026-32987)
2 rules 2 TTPs 1 IOCOpenClaw before 2026.3.13 is vulnerable to a replay attack during device pairing verification, allowing attackers to repeatedly verify a bootstrap code and escalate privileges to operator.admin.
OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)
2 rules 1 TTPOpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.
OpenClaw Exec Allowlist Bypass via POSIX Path Overmatching (CVE-2026-32973)
2 rules 1 TTPOpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability (CVE-2026-32973) due to improper normalization of patterns, allowing attackers to execute unintended commands via wildcard matching in POSIX paths.
OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)
2 rules 1 TTPOpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.
OpenClaw Privilege Escalation Vulnerability (CVE-2026-32922)
2 rules 2 TTPs 2 IOCsOpenClaw before 2026.3.11 is vulnerable to privilege escalation in the device.token.rotate function, allowing attackers with limited operator.pairing scope to mint tokens with elevated operator.admin privileges, potentially leading to remote code execution.
OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)
2 rules 2 TTPsOpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.
OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)
2 rules 1 TTP 3 IOCsOpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.
Belkin F9K1122 Router Stack-Based Buffer Overflow Vulnerability
2 rules 3 TTPs 4 IOCsA stack-based buffer overflow vulnerability (CVE-2026-5042) exists in the Belkin F9K1122 router version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the webpage argument in the formCrossBandSwitch function.
Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown
2 rules 2 TTPsThe Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.
Tenda 4G06 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5036)
2 rules 1 TTPA stack-based buffer overflow vulnerability (CVE-2026-5036) exists in the fromDhcpListClient function of the Tenda 4G06 router (version 04.06.01.29), potentially allowing remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/DhcpListClient endpoint.
Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 5 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.
CrowdStrike CNAPP Adds Adversary-Informed Risk Prioritization
2 rules 1 TTPCrowdStrike's CNAPP enhancements prioritize cloud risks based on adversary behavior, application context, and configuration change tracking to reduce breach likelihood.
Securing AI Agents with Falcon AIDR and NVIDIA NeMo Guardrails
3 rules 4 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents by blocking prompt injection attacks, redacting sensitive data, defanging malicious content, and moderating unwanted topics, ensuring compliance and preventing abuse.
CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender EDR
2 rules 2 TTPsCrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions like Microsoft Defender, enabling unified detection and response across diverse environments, addressing the challenges of cross-domain attacks and fragmented security systems.
code-projects Accounting System 1.0 SQL Injection Vulnerability (CVE-2026-5034)
2 rules 1 TTPA remote SQL injection vulnerability exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' parameter in '/edit_costumer.php', potentially allowing unauthorized database access.
Tenda F453 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5021)
2 rules 1 TTPA stack-based buffer overflow vulnerability in Tenda F453 1.0.0.3 allows a remote attacker to execute arbitrary code by manipulating the 'delno' argument in the fromPPTPUserSetting function of the /goform/PPTPUserSetting component's httpd process.
Wavlink WL-WN579X3-C Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTPA stack-based buffer overflow vulnerability exists in Wavlink WL-WN579X3-C 231124's UPNP Handler component, specifically in the /cgi-bin/firewall.cgi file and the sub_4019FC function, allowing remote attackers to execute arbitrary code by manipulating the UpnpEnabled argument; public exploits are available, but the vendor has not responded to the disclosure.
CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization
2 rules 3 TTPsCrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for improved risk prioritization, addressing limitations in infrastructure visibility, threat actor behavior analysis, and alert triage.
SQL Injection Vulnerability in Simple Food Order System 1.0
2 rules 1 TTPA SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.
code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)
2 rules 1 TTPCVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.
elecV2 elecV2P Server-Side Request Forgery Vulnerability (CVE-2026-5016)
2 rules 2 TTPsA server-side request forgery vulnerability exists in elecV2 elecV2P up to 3.8.3, affecting the eAxios function within the /mock URL handler, allowing remote attackers to manipulate the req argument and potentially conduct internal reconnaissance or other malicious activities.
CrowdStrike Falcon SIEM Integration with Microsoft Defender
2 rules 10 TTPsCrowdStrike's Falcon Next-Gen SIEM expands to support third-party EDR solutions, beginning with Microsoft Defender, to unify detection, investigation, and response without requiring the Falcon sensor and modernize security operations.
CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection
2 rules 2 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails, providing enterprise-grade protection for AI agents by defending against runtime attacks like prompt injection, redacting sensitive data, defanging malicious content, and moderating unwanted topics to ensure agents stay within compliance boundaries in sectors like finance, healthcare, customer service, and software development.
Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 1 TTPCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents from attacks like prompt injection, data exfiltration, and unauthorized actions, enabling organizations to deploy AI applications more securely.
CrowdStrike Innovations Secure AI Agents and Govern Shadow AI
2 rules 2 TTPsCrowdStrike is introducing innovations to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by extending AI detection and response (AIDR) capabilities to cover desktop AI applications and provide visibility into AI-related components, helping to prevent prompt attacks, data leaks, and policy violations.
CrowdStrike Falcon SIEM Integrates with Microsoft Defender EDR
2 rules 1 TTPCrowdStrike Falcon Next-Gen SIEM is expanding its capabilities to integrate with third-party EDR solutions, starting with Microsoft Defender, to enable organizations to extend their AI-native SOC across heterogeneous environments without replacing existing endpoint agents.
Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails
2 rules 2 TTPsCrowdStrike Falcon AIDR integrates with NVIDIA NeMo Guardrails to provide comprehensive protection for AI agents against prompt injection, data leaks, and malicious content.
CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization
2 rules 2 TTPsCrowdStrike has enhanced its CNAPP capabilities by adding application-layer visibility and prioritizing risks based on known adversary tactics, techniques, and procedures (TTPs).
SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension
2 rules 1 TTPA SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.
Crashmail 1.6 Stack-Based Buffer Overflow Vulnerability
2 rules 5 TTPsCrashmail 1.6 is vulnerable to a stack-based buffer overflow, allowing remote attackers to execute arbitrary code via malicious input and potentially leading to denial of service.
SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)
2 rules 1 TTPSC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.
Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)
2 rules 1 TTPFlat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.
EChat Server 3.1 Buffer Overflow Vulnerability in chat.ghp Endpoint
2 rules 1 TTPEChat Server 3.1 is vulnerable to a buffer overflow in the chat.ghp endpoint, allowing remote attackers to execute arbitrary code by sending a crafted GET request with an oversized username parameter.
JAD Java Decompiler Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPsJAD Java Decompiler 1.5.8e-1kali1 and prior is vulnerable to a stack-based buffer overflow, allowing attackers to execute arbitrary code by providing overly long input to the jad command leading to a return-oriented programming chain execution and shell spawning.
PInfo 0.6.9-5.1 Local Buffer Overflow Vulnerability
2 rules 1 TTPPInfo version 0.6.9-5.1 is susceptible to a local buffer overflow vulnerability, enabling local attackers to execute arbitrary code by providing an overly large argument to the '-m' parameter, ultimately allowing for shellcode execution with user privileges.
yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)
2 rules 1 TTPyTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.
TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)
2 rules 1 TTPTiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.
Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)
2 rules 1 TTPMulti Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.
xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.
Undertow Request Smuggling Vulnerability (CVE-2026-28368)
2 rules 1 TTPCVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.
Tenda AC15 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4975)
2 rules 1 TTPA stack-based buffer overflow vulnerability (CVE-2026-4975) exists in the Tenda AC15 router version 15.03.05.19, allowing remote attackers to execute arbitrary code by manipulating the 'funcpara1' argument in a POST request to /goform/setcfm.
LibreChat SSRF Vulnerability (CVE-2026-31943)
2 rules 2 TTPs 1 IOCLibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.
Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage
2 rules 1 TTPA server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.
LangChain Core Path Traversal Vulnerability in Legacy APIs
1 rule 1 TTPA path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.
CrowdStrike Falcon Enhancements for Securing AI Environments
2 rules 2 TTPsCrowdStrike is enhancing its Falcon platform with new features focusing on AI Detection and Response (AIDR) capabilities across endpoints, SaaS, and cloud environments to mitigate risks such as prompt injection attacks, data leaks, and policy violations related to AI agents and shadow AI.
CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization
2 rules 3 TTPsCrowdStrike Falcon Cloud Security enhances CNAPP capabilities with application-layer visibility and adversary-informed risk prioritization, enabling security teams to focus on attacker-aligned risks and known threat actors.
CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization
2 rules 8 TTPsCrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.
CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI
2 rules 3 TTPsCrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.
CrowdStrike Agentic MDR and SOC Transformation Services
2 rules 2 TTPsCrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.
CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Automated Security Operations
2 rulesCrowdStrike introduces Charlotte AI AgentWorks and Agentic SOAR to enhance security operations through AI-driven automation and orchestration, reducing manual workloads and improving decision accuracy.
CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools
2 rulesCrowdStrike Falcon Next-Gen SIEM is expanding to support third-party EDR solutions, starting with Microsoft Defender, enabling organizations to extend their AI-native SOC across their ecosystem by unifying detection, investigation, and response.
CrowdStrike Charlotte AI AgentWorks for Agentic SOC Transformation
2 rules 2 TTPsCrowdStrike's Charlotte AI AgentWorks facilitates the development and deployment of AI-driven security agents within the SOC, aiming to enhance analyst capabilities through automated and orchestrated responses to threats.
CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Agentic Security Operations
2 rulesCrowdStrike's Charlotte AI AgentWorks and Agentic SOAR aim to revolutionize security operations by enabling the creation and orchestration of AI-powered agents, enhancing analyst capabilities and automating tasks to combat AI-accelerated adversaries.
Tycoon2FA PhaaS Platform Resurgence After Takedown
2 rules 2 TTPs 1 IOCThe Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.
CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails Secure AI Agents
2 rules 1 TTPCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0), providing enterprise-grade protection for AI agents by managing data access, controlling responses, ensuring policy compliance, and blocking prompt injection attacks.
CrowdStrike Agentic MDR and SOC Transformation Services
2 rules 2 TTPsCrowdStrike's Agentic MDR combines machine-speed execution with expert oversight, leveraging deterministic automation and adaptive AI agents to enhance breach prevention and SOC modernization.
Tycoon2FA Phishing-as-a-Service Resurgence After Takedown
2 rules 2 TTPs 1 IOCThe Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.
CrowdStrike Flex for Services Expands Access to Incident Response Expertise
2 rules 2 TTPsCrowdStrike is expanding its Falcon Flex model to its services offering, providing flexible access to incident response, proactive security services, advisory, platform services, and training.
CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization
3 rules 2 TTPsCrowdStrike's new CNAPP capabilities in Falcon Cloud Security focus on adversary-informed risk prioritization by correlating application-layer visibility with threat actor profiles and techniques, enabling security teams to understand cloud risk, prioritize remediation, and accelerate response.
CrowdStrike Falcon Flex for Services Expansion
3 rules 2 TTPsCrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.
CrowdStrike Falcon Next-Gen SIEM Integrates with Microsoft Defender
2 rules 1 TTPCrowdStrike Falcon Next-Gen SIEM now supports third-party EDR solutions, beginning with Microsoft Defender, enabling organizations to extend their AI-native SOC and unify detection across heterogeneous environments.
CrowdStrike Falcon Enhancements for Securing AI Agents and Governing Shadow AI
2 rulesCrowdStrike is enhancing its Falcon platform with new AI detection and response capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments, addressing threats like prompt injection and data leaks.
CrowdStrike Falcon Data Security Introduction
2 rules 2 TTPsCrowdStrike's Falcon Data Security aims to protect sensitive data by providing visibility into data movement across various environments and preventing data theft.
CrowdStrike Agentic MDR and SOC Transformation Services
3 rulesCrowdStrike's agentic MDR combines automation, AI agents, and human oversight for rapid breach response, while SOC Transformation Services modernize security operations for an agentic SOC approach.
Compromised trivy-action GitHub Action Enables Credential Theft
2 rules 1 TTPThe trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.
Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)
2 rules 1 TTPThe Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.
eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)
2 rules 2 TTPsCVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.
WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)
2 rules 1 TTPWeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.
OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope
2 rules 1 TTPThe openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.
MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability
2 rules 1 TTPA vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.
Giskard-agents ChatWorkflow.chat() Server-Side Template Injection
2 rules 1 TTPGiskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.
LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)
2 rules 1 TTPLinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.
UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)
2 rules 2 TTPsUniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.
Totolink LR350 Remote Buffer Overflow Vulnerability (CVE-2026-4976)
2 rules 1 TTPA buffer overflow vulnerability in Totolink LR350 version 9.3.5u.6369_B20220309 allows a remote attacker to execute arbitrary code by manipulating the 'ssid' argument in the setWiFiGuestCfg function.
Gematik Authenticator Authentication Flow Hijacking Vulnerability (CVE-2026-33875)
2 rules 2 TTPsGematik Authenticator versions prior to 4.16.0 are vulnerable to authentication flow hijacking via malicious deep links, potentially allowing attackers to authenticate with victim user identities.
Tenda AC7 Stack-Based Buffer Overflow in SetSysTimeCfg
2 rules 1 TTPA stack-based buffer overflow vulnerability exists in Tenda AC7 version 15.03.06.44 within the fromSetSysTime function of the /goform/SetSysTimeCfg component's POST Request Handler, allowing a remote attacker to potentially execute arbitrary code by manipulating the 'Time' argument.
AWS SDK for PHP CloudFront Policy Document Injection via Special Characters
2 rules 1 TTP 1 IOCA vulnerability exists in the AWS SDK for PHP CloudFront signing utilities where special characters in input values are not properly handled when creating policy documents, potentially leading to unintended access restrictions, affecting versions 3.11.7 through 3.371.3.
Langflow IDOR Vulnerability Allows Cross-User Flow Manipulation
2 rules 3 TTPsLangflow versions 1.5.0 and earlier contain an IDOR vulnerability (CVE-2026-34046) that allows authenticated users to read, modify, and delete flows belonging to other users due to a missing ownership check, potentially exposing sensitive information and enabling unauthorized control over AI agent logic.
@mobilenext/mobile-mcp Path Traversal Vulnerability
2 rules 2 TTPsThe @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.
letta-ai letta 0.16.4 Remote Code Injection Vulnerability (CVE-2026-4965)
2 rules 2 TTPsletta-ai letta version 0.16.4 contains a remote code injection vulnerability (CVE-2026-4965) in the resolve_type function of ast_parsers.py, stemming from improper neutralization of directives in dynamically evaluated code, allowing unauthenticated remote attackers to execute arbitrary code.
Moby Authorization Plugin Bypass via Oversized Request Bodies
2 rulesA vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.
Tenda AC6 Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTPA stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.
Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)
2 rules 1 TTPA remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.
Incus Image Cache Poisoning Vulnerability
2 rules 1 TTP 3 IOCsA vulnerability exists in Incus where it does not properly verify the combined fingerprint when downloading images from simplestreams servers, allowing an attacker to perform image cache poisoning and potentially expose other tenants to running attacker-controlled images.
Postiz App SSRF Vulnerability via Next.js
2 rules 1 TTP 1 IOCA high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.
Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)
2 rules 3 TTPsThe 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.
mingSoft MCMS Server-Side Request Forgery Vulnerability (CVE-2026-4953)
2 rules 3 TTPsA server-side request forgery (SSRF) vulnerability (CVE-2026-4953) exists in mingSoft MCMS version 5.5.0, allowing remote attackers to manipulate the 'catchimage' argument in the catchImage function to potentially access or interact with internal resources.
Group-Office JMAP Contact/Query SQL Injection Vulnerability
2 rules 3 TTPsAn authenticated SQL Injection vulnerability in Group-Office's JMAP Contact/query endpoint allows data extraction, including session tokens, leading to account takeover if unpatched.
Grafana Enterprise Plugin SQL Expression RCE via CVE-2026-27876
2 rules 2 TTPs 2 IOCsA chained attack leveraging SQL Expressions and a Grafana Enterprise plugin, tracked as CVE-2026-27876, can lead to remote arbitrary code execution on vulnerable Grafana instances with the sqlExpressions feature enabled.
Multiple Vulnerabilities in Canva Affinity, TP-Link, and HikVision Devices
3 rules 6 TTPsCisco Talos disclosed multiple vulnerabilities in Canva Affinity, TP-Link Archer AX53, and HikVision Ultra Face Recognition Terminal products which could lead to sensitive information disclosure, arbitrary code execution, or credentials leak if exploited.
OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update
2 rules 2 TTPsOpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.
Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)
2 rules 2 TTPsA stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.
Tenda AC5 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4903)
2 rules 1 TTPA stack-based buffer overflow vulnerability exists in Tenda AC5 version 15.03.06.47, allowing remote attackers to execute arbitrary code by manipulating the `PPPOEPassword` argument in the `formQuickIndex` function of the `/goform/QuickIndex` component.
LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)
2 rules 2 TTPsAn out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.
Kestra Orchestration Platform XSS Vulnerability (CVE-2026-33664)
2 rules 1 TTPKestra versions up to 1.3.3 are vulnerable to a cross-site scripting (XSS) vulnerability (CVE-2026-33664) allowing arbitrary JavaScript execution by viewing crafted flow metadata.
EVerest Out-of-Bounds Access Vulnerability (CVE-2026-26008)
2 rules 2 TTPs 2 IOCsEVerest, an EV charging software stack, has an out-of-bounds access vulnerability in versions prior to 2026.02.0, which can lead to remote crash or memory corruption when the CSMS sends UpdateAllowedEnergyTransferModes over the network.
EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.
CVE-2026-4926: Regular Expression Denial of Service
2 rules 2 TTPsCVE-2026-4926 describes a denial-of-service vulnerability due to an inefficient regular expression complexity issue when handling multiple sequential optional groups, leading to exponential growth and resource exhaustion.
BadAML Injection Allows Arbitrary Code Execution in Confidential VMs
2 rules 1 TTPThe BadAML injection attack allows arbitrary code execution in confidential VMs by exploiting the ACPI interface, enabling attackers with host control to execute malicious AML code within the guest.
Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)
2 rules 1 TTP 2 IOCsCVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.
Critical Vulnerabilities in n8n Workflow Automation Tool
3 rules 2 TTPsMultiple critical vulnerabilities in n8n, including prototype pollution, code injection, and SQL injection, allow authenticated users to achieve remote code execution, read sensitive files, and perform unauthorized database operations.
Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)
2 rules 1 TTPDoveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.
ManageSieve AUTHENTICATE Command Denial-of-Service Vulnerability (CVE-2025-59032)
2 rules 1 TTP 1 IOCCVE-2025-59032 describes a vulnerability in ManageSieve's AUTHENTICATE command, where using a literal as a SASL initial response can crash the ManageSieve service, leading to a denial-of-service condition.
Spring AI Redis Store TAG Injection Vulnerability (CVE-2026-22744)
2 rules 1 TTPCVE-2026-22744 is a code injection vulnerability in Spring AI's RedisFilterExpressionConverter which allows an attacker to inject arbitrary commands into RediSearch TAG blocks via unescaped user-controlled strings, affecting versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4.
Spring AI SimpleVectorStore SpEL Injection Vulnerability (CVE-2026-22738)
2 rules 1 TTP 1 IOCA SpEL injection vulnerability exists in Spring AI's SimpleVectorStore when a user-supplied value is used as a filter expression key, potentially allowing malicious actors to execute arbitrary code in vulnerable applications.
Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)
2 rules 1 TTP 2 IOCsSpring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.
Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability
2 rules 1 TTP 5 IOCsA SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.
cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects
2 rules 1 TTPThe cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.
Tenda AC5 Stack-Based Buffer Overflow Vulnerability
2 rules 1 TTPA stack-based buffer overflow vulnerability (CVE-2026-4905) exists in Tenda AC5 firmware version 15.03.06.47 allowing remote attackers to execute arbitrary code by manipulating the 'index' argument in a POST request to the /goform/WifiWpsOOB endpoint.
vLLM Remote Code Execution Vulnerability (CVE-2026-27893)
2 rules 1 TTP 1 IOCvLLM versions before 0.18.0 are vulnerable to remote code execution due to hardcoded trust of remote code, even when explicitly disabled by the user, allowing attackers to execute arbitrary code via malicious model repositories.
Incus Instance Template Vulnerability CVE-2026-33897
3 rules 1 TTPA vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.
C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)
2 rules 1 TTPThe c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.
Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)
2 rules 1 TTPA path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.
Forge Ed25519 Signature Forgery Vulnerability
2 rules 1 TTPForge is vulnerable to signature forgery in Ed25519 due to a missing check that S < L, allowing non-canonical signatures and potentially bypassing authentication/authorization logic, affecting versions before 1.4.0.
Node-Forge Certificate Chain Verification Bypass due to basicConstraints Violation
2 rules 3 TTPs 1 IOCNode-forge's certificate chain verification fails to enforce RFC 5280 basicConstraints, allowing leaf certificates without basicConstraints and keyUsage extensions to act as Certificate Authorities, leading to potential certificate forgery and man-in-the-middle attacks.
OpenClaw ACP Chat Command Injection Vulnerability
2 rulesA vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.
Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338
2 rules 3 TTPs 2 IOCsCVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.
Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)
2 rules 1 TTPOry Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.
OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability
2 rulesThe openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.
Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
2 rules 1 TTP 2 IOCsNetty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.
Netty HTTP/2 CONTINUATION Frame Flood Denial of Service
1 ruleA denial of service vulnerability exists in Netty's HTTP/2 server implementation where an unauthenticated user can exhaust server CPU resources by sending a flood of CONTINUATION frames with zero-byte payloads, bypassing size-based mitigations and leading to service unavailability with minimal bandwidth usage; affected versions include netty-codec-http2 < 4.1.132.Final and netty-codec-http2 versions >= 4.2.0.Alpha1 and < 4.2.10.Final.
OpenBao OIDC Direct Callback Authentication Bypass Vulnerability
2 rules 1 TTPOpenBao versions before 2.5.2 lack user confirmation for OIDC direct callback mode, allowing attackers to perform remote phishing and bypass authentication.
Ory Kratos SQL Injection Vulnerability in ListCourierMessages API
2 rules 1 TTPA SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.
Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)
2 rules 1 TTPMattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.
Kysely SQL Injection Vulnerability (CVE-2026-33468)
2 rules 1 TTPA SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.
SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)
2 rules 1 TTPKysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.
EVerest EV Charging Stack Data Race Vulnerability (CVE-2026-26074)
2 rulesEVerest versions prior to 2026.02.0 exhibit a data race vulnerability (CVE-2026-26074) where concurrent network requests and physical events can corrupt the event queue, leading to potential denial of service or other undefined behavior.
n8n Prototype Pollution Vulnerability Leads to Remote Code Execution
2 rules 1 TTPA prototype pollution vulnerability in the n8n GSuiteAdmin node allows authenticated users with workflow creation/modification permissions to achieve remote code execution (RCE) by injecting attacker-controlled values into `Object.prototype`.
CPCI85 and SICORE Base System XML Out-of-Bounds Write Vulnerability
2 rules 1 TTPAn unauthenticated attacker can exploit an out-of-bounds write vulnerability in CPCI85 Central Processing/Communication and SICORE Base System by sending a malicious XML request, potentially causing a service crash leading to a denial-of-service condition.
EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability
2 rules 3 TTPsA stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.
EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)
2 rules 1 TTP 1 IOCEVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.
Fluent Booking WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.
HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)
2 rules 1 TTPCVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.
HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)
2 rules 1 TTP 1 IOCA missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.
Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)
2 rules 1 TTPA command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.
Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)
2 rules 1 TTP 4 IOCsOnline Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.
KomSeo Cart 1.3 SQL Injection Vulnerability
2 rules 1 TTPKomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.
ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability
2 rules 1 TTPASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.
Wecodex Hotel CMS 1.0 SQL Injection Vulnerability
2 rules 1 TTPWecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.
School Management System CMS 1.0 SQL Injection Vulnerability
2 rules 1 TTPSchool Management System CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing attackers to bypass authentication by injecting SQL code through the username parameter.
SiYuan Note Taking Application Directory Traversal Vulnerability
2 rules 1 TTPSiYuan note taking application is vulnerable to a directory traversal via the /api/file/readDir endpoint, which does not require authentication, allowing an attacker to enumerate the directory structure and retrieve file names, potentially leading to arbitrary document reading.
OpenEMR XXE Vulnerability (CVE-2026-33913)
2 rules 1 IOCOpenEMR before version 8.0.0.3 is vulnerable to XML External Entity (XXE) injection, allowing an authenticated user with access to the Carecoordination module to upload a crafted CCDA document and read arbitrary files from the server.
OpenEMR Missing Authorization Allows Unauthorized Data Deletion
2 rules 1 TTPOpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.
node-tesseract-ocr OS Command Injection Vulnerability
2 rules 1 TTP 5 IOCsThe node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.
NATS Server WebSocket Frame Length Overflow Denial of Service
2 rules 1 TTPA vulnerability in NATS server allows a remote, unauthenticated attacker to cause a denial of service by sending a crafted WebSocket frame, leading to a server crash due to missing validation on WebSocket frame length.
n8n Merge Node AlaSQL Injection Vulnerability
2 rules 1 TTPAn authenticated user with workflow creation/modification permissions can exploit insufficient restrictions in the n8n Merge node's AlaSQL sandbox to achieve remote code execution by reading local files or executing commands on the n8n host.
Malicious LiteLLM Versions Harvest Credentials
2 rules 2 TTPsCompromised versions of the LiteLLM package (1.82.7 and 1.82.8) on PyPI contained malware designed to harvest sensitive credentials and files, exfiltrating them to a remote API, impacting users who installed and ran the package.
GitLab Improper HTML Sanitization Vulnerability (CVE-2026-2995)
2 rules 2 TTPs 1 IOCCVE-2026-2995 is a vulnerability in GitLab EE versions 15.4 to 18.10.1 where an authenticated user can add email addresses to other user accounts due to improper HTML sanitization, potentially leading to account takeover or information disclosure.
GitLab GraphQL Denial of Service Vulnerability (CVE-2026-3988)
2 rules 1 TTPCVE-2026-3988 is a denial of service vulnerability in GitLab CE/EE allowing unauthenticated users to crash instances by sending malformed GraphQL requests, affecting versions 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1.
GitLab GraphQL CSRF Vulnerability (CVE-2026-3857)
2 rules 2 TTPs 1 IOCCVE-2026-3857 describes a vulnerability in GitLab CE/EE versions 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1, where an unauthenticated user can execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection, potentially leading to data modification or privilege escalation.
SQL Injection Vulnerability in Simple Laundry System 1.0
2 rules 1 TTP 6 IOCsA remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.
SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0
2 rules 1 TTPA remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.
code-projects Online Food Ordering System SQL Injection Vulnerability (CVE-2026-4844)
2 rules 1 TTPCVE-2026-4844 describes a SQL injection vulnerability in the Admin Login Module of code-projects Online Food Ordering System 1.0, which can be exploited remotely by manipulating the Username argument in the /admin.php file.
Netcore Power 15AX Remote Command Execution Vulnerability
2 rules 1 TTPCVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.
Blackhole for Bad Bots WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Blackhole for Bad Bots WordPress plugin through version 3.8 is vulnerable to stored cross-site scripting (XSS) via the User-Agent HTTP header, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the plugin's admin page.
SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)
2 rules 1 TTP 6 IOCsA remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.
Masteriyo LMS WordPress Plugin Privilege Escalation Vulnerability
2 rules 1 TTPThe Masteriyo LMS plugin for WordPress is vulnerable to privilege escalation, allowing authenticated users with student-level access or higher to gain administrator privileges by manipulating the 'InstructorsController::prepare_object_for_database' function.
WP Job Portal Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4758)
2 rules 3 TTPsThe WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with subscriber-level access or higher to delete arbitrary files, potentially leading to remote code execution.
OpenEMR Blind SQL Injection Vulnerability in Patient Search (CVE-2026-29187)
2 rules 1 TTPOpenEMR versions prior to 8.0.0.3 are susceptible to a blind SQL injection vulnerability in the Patient Search functionality, allowing authenticated attackers to execute arbitrary SQL commands by manipulating HTTP parameter keys.
IBM InfoSphere Information Server Plaintext Credential Storage Vulnerability
2 rules 1 TTPIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 stores user credentials in plaintext, allowing local users to read sensitive information.
Picomatch ReDoS Vulnerability via Extglob Quantifiers
2 rules 1 TTPPicomatch is vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns with quantifiers, leading to excessive CPU consumption and denial of service.
Protobuf PHP Library Denial of Service Vulnerability
2 rules 1 TTPA denial-of-service vulnerability exists in the Protobuf PHP library due to maliciously crafted messages with negative varints or deep recursion, leading to application crashes and impacting service availability.
Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability
2 rules 1 TTP 5 IOCsThe code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.
SiYuan Arbitrary Document Reading Vulnerability in Publishing Service
2 rules 1 TTPSiYuan is vulnerable to arbitrary document reading via the publishing service, allowing attackers to retrieve document IDs and view the content of all documents, including encrypted or prohibited ones, by exploiting the `/api/file/readDir` and `/api/block/getChildBlocks` interfaces.
LiquidJS replace_first Filter Exponential Memory Amplification DoS
2 rules 1 TTPThe `replace_first` filter in LiquidJS is vulnerable to exponential memory amplification due to its use of JavaScript's `String.prototype.replace()` and mishandling of the `$&` backreference pattern, allowing attackers to bypass the `memoryLimit` and cause denial of service.
OpenCart Core SQL Injection Vulnerability (CVE-2024-58341)
2 rules 1 TTPOpenCart Core 4.0.2.3 is vulnerable to SQL injection via the 'search' parameter, enabling unauthenticated attackers to manipulate database queries and extract sensitive information through boolean-based or time-based blind SQL injection.
pdf-image npm Package Command Injection Vulnerability (CVE-2026-26830)
2 rules 1 TTP 1 IOCThe pdf-image npm package through version 2.0.0 is vulnerable to OS command injection via the pdfFilePath parameter due to improper sanitization, potentially leading to arbitrary code execution.
Kiteworks Core Access Control Vulnerability (CVE-2026-23514)
2 rules 1 TTP 1 IOCKiteworks Core versions 9.2.0 and 9.2.1 contain an access control vulnerability (CVE-2026-23514) due to improper ownership management, allowing authenticated users to access unauthorized content, which can be mitigated by upgrading to version 9.2.2 or later.
CVE-2026-4729 Memory Safety Vulnerabilities in Firefox and Thunderbird
2 rules 8 TTPs 1 IOCFirefox 148 and Thunderbird 148 contain memory safety bugs that could potentially be exploited to execute arbitrary code, impacting versions prior to 149.
SourceCodester Online Catering Reservation SQL Injection Vulnerability (CVE-2026-4615)
2 rules 1 TTP 5 IOCsA SQL injection vulnerability exists in SourceCodester Online Catering Reservation 1.0's `/search.php` file, allowing remote attackers to execute arbitrary SQL commands by manipulating the `rcode` argument.
Salvo Web Framework Denial of Service Vulnerability (CVE-2026-33241)
2 rules 1 TTPThe Salvo web framework before version 0.89.3 is vulnerable to denial of service due to unbounded memory allocation when parsing form data, enabling attackers to crash services by sending large payloads.
Palo Alto Networks Recruiting Impersonation Phishing Campaign
2 rules 2 TTPs 6 IOCsSince August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.
Multiple Vulnerabilities in GnuPG and Gpg4win Allow for Arbitrary Code Execution and Denial of Service
2 rules 2 TTPsMultiple vulnerabilities exist in GnuPG and Gpg4win that could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
LiteLLM Package Compromised with Credential-Stealing Code via Trivy
2 rules 1 TTPThe LiteLLM package was compromised and infected with credential-stealing code through a supply chain attack leveraging the Trivy vulnerability scanner.
Langflow Path Traversal Vulnerability (CVE-2026-33497)
2 rules 1 TTPA path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.
Langflow GitHub Actions Shell Injection Vulnerability
2 rules 2 TTPs 1 IOCUnauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.
Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)
2 rules 1 TTPA remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.
GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials
2 rules 1 TTPGoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.
Firefox and Thunderbird Memory Safety Vulnerability (CVE-2026-4720)
2 rules 2 TTPs 1 IOCA memory safety vulnerability (CVE-2026-4720) in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 could lead to memory corruption and potential arbitrary code execution if successfully exploited.
Device Code Phishing Campaign Targeting Cloud Platforms
2 rules 2 TTPsA phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.
CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability
2 rules 2 TTPsA heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.
CPython Zipfile Module Vulnerability Allows File Manipulation
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in the zipfile module of CPython to manipulate files on affected systems.
CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)
2 rules 1 TTPAn unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.
Blinko Pre-1.8.4 OS Command Injection Vulnerability
2 rules 1 TTP 4 IOCsBlinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.
Apache CXF Vulnerability Allows DoS and Information Disclosure
2 rules 2 TTPsAn anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.
IBM WebSphere Application Server Liberty Multiple Vulnerabilities
2 rules 3 TTPsA remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.
TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation
2 rules 2 TTPsA remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.
Langflow Vulnerability Allows Arbitrary Code Execution
2 rules 1 TTPA vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.
Multiple Vulnerabilities in Redis
2 rules 2 TTPsMultiple vulnerabilities in Redis allow an attacker to execute arbitrary program code and perform a denial-of-service attack.
Multiple Vulnerabilities in Red Hat Developer Hub
2 rules 8 TTPsMultiple vulnerabilities in Red Hat Developer Hub allow a remote attacker to perform denial of service, execute arbitrary code, bypass security measures, and manipulate data.
Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.
Multiple Vulnerabilities in Grub Bootloader
2 rules 2 TTPsMultiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.
RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.
Multiple Vulnerabilities in Apache Tomcat Allow for Remote Code Execution and Data Manipulation
2 rules 3 TTPsMultiple vulnerabilities in Apache Tomcat can be exploited by a remote, authenticated or anonymous attacker to execute arbitrary code, bypass security measures, manipulate data, and cause a denial of service.
Red Hat OpenShift GitOps Multiple Vulnerabilities
2 rules 1 TTPAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.
IBM Tivoli Netcool/OMNIbus Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in IBM Tivoli Netcool/OMNIbus to achieve arbitrary code execution, information disclosure, file manipulation, or denial of service.
Asterisk and Digium Certified Asterisk Vulnerabilities
2 rules 8 TTPsAn authenticated remote attacker can exploit vulnerabilities in Asterisk and Digium Certified Asterisk to achieve arbitrary code execution, denial of service, or information disclosure.
Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments
2 rules 7 TTPsUncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.
Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS
2 rules 3 TTPsA remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.
Checkmk Vulnerability Allows Session Hijacking
2 rules 1 TTPAn authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.
Multiple Vulnerabilities in Vim Allow Local Code Execution and DoS
2 rules 2 TTPsMultiple vulnerabilities in vim allow a local attacker to execute arbitrary code, cause a denial-of-service condition, or manipulate data.
Multiple Vulnerabilities in Langflow Allow for Arbitrary Code Execution and Information Disclosure
2 rules 4 TTPsMultiple vulnerabilities in Langflow could be exploited by an attacker to execute arbitrary program code, disclose information, and potentially manipulate data, leading to potential system compromise.
Froxlor Vulnerability Allows File Manipulation and Information Disclosure
2 rules 1 TTPA vulnerability in Froxlor allows an attacker to manipulate files and disclose sensitive information, potentially leading to data breaches or system compromise.
CODESYS Multiple Vulnerabilities Allow Arbitrary Code Execution and DoS
2 rules 2 TTPsMultiple vulnerabilities in CODESYS allow a remote attacker to execute arbitrary program code and conduct a denial-of-service attack.
Multiple Vulnerabilities in GStreamer
3 rules 2 TTPsMultiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition, memory corruption, and potentially execute arbitrary code.
Critical Unauthenticated RCE Vulnerability Exploited in Microsoft SharePoint
2 rules 2 TTPsA remote code execution vulnerability in Microsoft SharePoint (CVE not specified) is being actively exploited by unauthenticated attackers, prompting urgent patching recommendations for internet-facing servers.
Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs
2 rules 1 TTPThe 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.
Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior
2 rules 1 TTPA remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.
Vikunja Account Reactivation Vulnerability (CVE-2026-33316)
3 rules 1 TTPA critical vulnerability in Vikunja versions prior to 2.2.0 allows disabled users to bypass administrator controls and reactivate their accounts by exploiting a flaw in the password reset logic.
Free5GC AMF Denial-of-Service Vulnerability (CVE-2026-30653)
2 rules 2 TTPsA remote attacker can exploit CVE-2026-30653 in Free5GC v4.2.0 and earlier by sending crafted requests to the AMF component's HandleAuthenticationFailure function, leading to a denial-of-service condition.
NGINX ngx_mail_auth_http_module Denial-of-Service Vulnerability (CVE-2026-27651)
2 rules 2 TTPs 1 IOCNGINX Plus and NGINX Open Source are vulnerable to a denial-of-service condition (CVE-2026-27651) when the ngx_mail_auth_http_module is enabled, CRAM-MD5 or APOP authentication is used, and the authentication server permits retry via the Auth-Wait response header, leading to worker process termination.
GlassWorm Supply Chain Attack Using Unicode Encoding and Credential Theft
2 rules 4 TTPsThe GlassWorm campaign employs Unicode variation selectors to conceal malicious code within supply chain artifacts, subsequently querying a Solana wallet for C2 URLs and exfiltrating sensitive credentials.
SQL Injection Vulnerability in Free Hotel Reservation System 1.0
2 rules 1 TTPA SQL injection vulnerability (CVE-2026-4612) exists in itsourcecode Free Hotel Reservation System 1.0 within the Parameter Handler component, allowing remote attackers to execute arbitrary SQL commands via the account_id parameter in the /hotel/admin/mod_users/index.php script.
Census CSWeb 8.0.1 Configuration File Disclosure Vulnerability
2 rules 1 TTPCensus CSWeb 8.0.1 is vulnerable to unauthenticated remote configuration file disclosure via HTTP requests to the `/app/config` path, potentially exposing sensitive secrets; fixed in 8.1.0 alpha.
Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4723)
2 rules 1 TTPA use-after-free vulnerability, CVE-2026-4723, in the JavaScript Engine of Mozilla Firefox and Thunderbird before version 149 could allow arbitrary code execution if successfully exploited by an attacker.
Mozilla Firefox and Thunderbird Canvas2D Use-After-Free Vulnerability (CVE-2026-4725)
2 rules 1 TTP 1 IOCA use-after-free vulnerability in the Canvas2D component of Mozilla Firefox and Thunderbird versions before 149 allows for a potential sandbox escape.
Uninitialized Memory Vulnerability in Firefox Canvas2D (CVE-2026-4715)
2 rulesCVE-2026-4715 is a critical vulnerability involving uninitialized memory in the Graphics: Canvas2D component of Firefox, Firefox ESR, and Thunderbird, potentially leading to information disclosure or arbitrary code execution.
Mozilla Firefox and Thunderbird Graphics Text Component Vulnerability (CVE-2026-4719)
2 rules 2 TTPsCVE-2026-4719 describes an incorrect boundary condition in the Graphics: Text component of Mozilla Firefox and Thunderbird, potentially leading to a denial-of-service condition in vulnerable versions.
Firefox Netmonitor Privilege Escalation Vulnerability (CVE-2026-4717)
2 rules 1 TTP 1 IOCCVE-2026-4717 is a critical privilege escalation vulnerability in the Netmonitor component of Firefox, Firefox ESR, and Thunderbird, potentially allowing an attacker to gain elevated privileges on a vulnerable system.
WebRTC Signaling Denial-of-Service Vulnerability (CVE-2026-4704)
2 rules 1 TTPCVE-2026-4704 is a denial-of-service vulnerability in the WebRTC Signaling component affecting Firefox, Firefox ESR, and Thunderbird, potentially disrupting service availability.
Firefox and Thunderbird Mitigation Bypass Vulnerability (CVE-2026-4700)
2 rules 2 TTPsCVE-2026-4700 is a critical vulnerability in the Networking: HTTP component of Firefox, Firefox ESR, and Thunderbird, allowing a mitigation bypass in versions prior to Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Mozilla Firefox and Thunderbird WebCodecs Boundary Condition Vulnerability (CVE-2026-4695)
2 rules 1 TTPAn incorrect boundary condition in the Audio/Video Web Codecs component in Mozilla Firefox and Thunderbird (CVE-2026-4695) could lead to a denial-of-service (DoS) condition due to a vulnerability that affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
Mozilla Firefox and Thunderbird Web Codecs Denial-of-Service Vulnerability (CVE-2026-4697)
2 rules 1 TTP 1 IOCCVE-2026-4697 is a denial-of-service vulnerability due to incorrect boundary conditions in the Audio/Video Web Codecs component of Mozilla Firefox and Thunderbird, potentially leading to application crashes.
Mozilla Firefox and Thunderbird Audio/Video Playback Denial-of-Service Vulnerability (CVE-2026-4693)
2 rules 1 TTP 1 IOCCVE-2026-4693 is a vulnerability due to incorrect boundary conditions in the Audio/Video: Playback component of Mozilla Firefox and Thunderbird, potentially leading to a denial-of-service condition.
Firefox and Thunderbird JIT Miscompilation Vulnerability (CVE-2026-4698)
2 rules 5 TTPsA critical JIT miscompilation vulnerability (CVE-2026-4698) in the JavaScript engine affects Firefox and Thunderbird, potentially leading to remote code execution.
Mozilla Firefox Canvas2D Improper Boundary Condition Vulnerability (CVE-2026-4685)
2 rules 2 TTPsAn improper boundary condition vulnerability in the Canvas2D component of Mozilla Firefox, Firefox ESR, and Thunderbird (CVE-2026-4685) could allow for a denial-of-service condition.
Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4688)
2 rules 1 TTPA use-after-free vulnerability in the Disability Access APIs component of Mozilla Firefox and Thunderbird (CVE-2026-4688) allows for sandbox escape, potentially leading to arbitrary code execution outside the sandbox.
Firefox and Thunderbird Sandbox Escape Vulnerability (CVE-2026-4687)
2 rules 2 TTPsCVE-2026-4687 is a sandbox escape vulnerability in Firefox and Thunderbird due to incorrect boundary conditions in the Telemetry component, potentially allowing an attacker to execute arbitrary code outside the sandbox.
CVE-2026-4690: Mozilla Firefox, Firefox ESR, and Thunderbird XPCOM Sandbox Escape
2 rules 1 TTP 1 IOCA sandbox escape vulnerability, identified as CVE-2026-4690, exists in the XPCOM component of Mozilla Firefox, Firefox ESR, and Thunderbird due to incorrect boundary conditions and an integer overflow, potentially allowing an attacker to execute arbitrary code outside the sandbox.
Multiple Vulnerabilities in Cpython Allow Remote Code Execution
2 rules 1 TTPA remote, authenticated attacker can exploit multiple vulnerabilities in Cpython to manipulate files or execute arbitrary code.
Oracle MySQL Multiple Vulnerabilities
2 rules 1 TTPA remote attacker, either anonymous or authenticated, can exploit multiple vulnerabilities in Oracle MySQL to compromise confidentiality, integrity, and availability.
GNU libc Vulnerability Allows Local Code Execution
2 rules 1 TTPA local attacker can exploit a vulnerability in GNU libc to execute arbitrary program code on Linux systems.
libpng Vulnerability Allows Code Execution
2 rules 4 TTPsA vulnerability in libpng allows a remote, anonymous attacker to potentially execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.
Citrix Systems NetScaler Vulnerabilities Allow Information Disclosure and Session Hijacking
2 rules 2 TTPsAn anonymous or authenticated remote attacker can exploit multiple vulnerabilities in Citrix Systems NetScaler to disclose information and take over a user session.
Tabs Mail Carrier 2.5.1 MAIL FROM Buffer Overflow Vulnerability
2 rules 1 TTPTabs Mail Carrier 2.5.1 is vulnerable to a buffer overflow in the MAIL FROM SMTP command, allowing remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter with an oversized buffer to overwrite the EIP register and execute a bind shell payload via port 25.
PhreeBooks ERP 5.2.3 Remote Code Execution Vulnerability
2 rules 3 TTPsPhreeBooks ERP 5.2.3 is vulnerable to remote code execution, allowing authenticated attackers to upload and execute arbitrary PHP files via the image manager, leading to reverse shell connections and system command execution.
Netartmedia Vlog System SQL Injection Vulnerability
2 rules 1 TTP 3 IOCsNetartmedia Vlog System is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter in the forgotten_password module.
eNdonesia Portal v8.7 SQL Injection Vulnerability
2 rules 1 TTPeNdonesia Portal v8.7 is vulnerable to SQL injection allowing unauthenticated attackers to execute arbitrary SQL queries via the bid parameter in banners.php, potentially leading to sensitive data extraction.
Bootstrapy CMS Unauthenticated SQL Injection Vulnerabilities
3 rules 1 TTP 3 IOCsBootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through POST parameters to extract sensitive database information or cause denial of service.
Inout Article Base CMS SQL Injection Vulnerability (CVE-2019-25640)
2 rules 1 TTP 4 IOCsInout Article Base CMS is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters via XOR-based payloads in GET requests to portalLogin.php, potentially leading to sensitive information extraction or denial-of-service.
Zeeways Matrimony CMS Unauthenticated SQL Injection Vulnerability
2 rules 1 TTP 4 IOCsZeeways Matrimony CMS is vulnerable to SQL injection via the profile_list endpoint, where an unauthenticated attacker can inject SQL code via the up_cast, s_mother, and s_religion parameters, potentially allowing them to extract sensitive information.
Zeeways Jobsite CMS SQL Injection Vulnerability (CVE-2019-25636)
2 rules 1 TTP 4 IOCsZeeways Jobsite CMS is vulnerable to SQL injection, allowing unauthenticated attackers to inject SQL code through the 'id' GET parameter in crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php to extract sensitive database information.
X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability
2 rules 1 TTPX-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.
Meeplace Business Review Script SQL Injection Vulnerability (CVE-2019-25638)
2 rules 1 TTP 4 IOCsMeeplace Business Review Script is vulnerable to SQL injection via the 'id' parameter in the addclick.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries and potentially extract sensitive database information or cause a denial of service.
Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)
2 rules 2 TTPsBase64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.
PhreeBooks ERP 5.2.3 Arbitrary File Upload Vulnerability
2 rules 2 TTPsPhreeBooks ERP 5.2.3 is vulnerable to arbitrary file upload in the Image Manager component, allowing authenticated attackers to upload malicious PHP files leading to remote code execution.
AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)
2 rules 3 TTPsAIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.
FlexHEX 2.71 Local Buffer Overflow Vulnerability (CVE-2019-25627)
2 rules 2 TTPsFlexHEX 2.71 is vulnerable to a local buffer overflow in the Stream Name field, allowing local attackers to execute arbitrary code via a structured exception handler (SEH) overflow.
Download Accelerator Plus (DAP) SEH Buffer Overflow Vulnerability
2 rules 1 TTP 4 IOCsDownload Accelerator Plus DAP 10.0.6.0 is vulnerable to a structured exception handler buffer overflow, allowing remote attackers to execute arbitrary code via malicious crafted URLs by overwriting SEH pointers and executing embedded shellcode.
AIDA64 Extreme 5.99.4900 Structured Exception Handler Buffer Overflow
2 rules 1 TTP 4 IOCsAIDA64 Extreme 5.99.4900 is vulnerable to a structured exception handler buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious CSV log file path through the Hardware Monitoring logging preferences.
Compromised Litellm PyPI Package Versions
2 rules 4 TTPs 1 IOCVersions 1.82.7 and 1.82.8 of the Litellm package on PyPI were compromised in a supply chain attack, potentially impacting numerous users, with recommendations to avoid updating to these versions.
Multiple Vulnerabilities in cPanel/WHM
2 rules 2 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in cPanel/WHM to bypass security measures, perform XSS and SSRF attacks, disclose information, and potentially execute code.
WWBN AVideo Unauthenticated decryptString Vulnerability
2 rules 1 TTPWWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.
WP Job Portal Plugin SQL Injection Vulnerability
2 rules 1 TTPThe WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.
Unauthenticated CLI Escape Vulnerability (CVE-2026-3587)
2 rules 2 TTPs 1 IOCAn unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface of a device, leading to full compromise and root access on the underlying Linux-based OS, as described in CVE-2026-3587.
TOTOLINK X6000R Remote Command Injection Vulnerability
2 rules 1 TTPA remote command injection vulnerability exists in TOTOLINK X6000R routers, specifically versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826, allowing attackers to execute arbitrary commands via manipulation of the Hostname argument in the setLanCfg function.
strongSwan EAP-TTLS AVP Integer Underflow Vulnerability (CVE-2026-25075)
2 rules 1 TTPAn integer underflow vulnerability in strongSwan's EAP-TTLS AVP parser allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication, leading to excessive memory allocation or a NULL pointer dereference.
SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.
ReviewX WordPress Plugin Arbitrary Method Call Vulnerability
2 rules 1 TTPThe ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.
OwnTone Server DAAP Request NULL Pointer Dereference Denial-of-Service (CVE-2026-26828)
2 rules 2 TTPs 1 IOCA NULL pointer dereference vulnerability in the daap_reply_playlists function of owntone-server allows attackers to cause a Denial of Service (DoS) by sending a crafted DAAP request.
Oracle Fusion Middleware RCE Vulnerability (CVE-2026-21992)
2 rules 2 TTPsCVE-2026-21992 allows an unauthenticated attacker to gain network access via HTTP and execute code remotely on Oracle Identity Manager and Oracle Web Services Manager.
OpenClaw Improper Header Validation Leads to Credential Leakage
2 rules 1 TTPOpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.
MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)
2 rules 1 TTPA missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.
Lucky Pasta Shellcode Loader for Windows
2 rules 3 TTPs 2 IOCsA shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.
JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow
2 rules 2 TTPs 5 IOCsJetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.
Easy Chat Server 3.1 Denial of Service Vulnerability (CVE-2019-25613)
2 rules 1 TTP 5 IOCsEasy Chat Server 3.1 is vulnerable to a denial-of-service attack where a remote attacker can crash the application by sending oversized data in the message parameter via a POST request to the body2.ghp endpoint after establishing a session, leading to service unavailability.
DNS Queries to RMM Domains from Non-Browser Processes
2 rules 74 IOCsDetection of DNS queries to known remote monitoring and management (RMM) domains originating from non-browser processes on Windows systems indicates potential abuse of legitimate software for command and control.
Crunchyroll Data Breach via Telus Supply Chain Compromise
2 rules 3 TTPs 1 IOCCrunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.
CrowdStrike Falcon Flex for Services Expansion
2 rules 2 TTPsCrowdStrike is expanding the Falcon Flex model to its services offering to provide organizations with more flexible access to incident response and proactive security services.
Critical RCE Vulnerability in Langflow AI Pipelines (CVE-2026-33017)
2 rules 2 TTPsA critical remote code execution vulnerability, CVE-2026-33017, exists in Langflow AI pipelines prior to version 1.9.0 that allows an unauthenticated remote attacker to execute code with full server process privileges, impacting availability, integrity, and confidentiality.
Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)
2 rules 1 TTP 1 IOCConnect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.
Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)
2 rules 2 TTPsCVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.
Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability
2 rules 2 TTPsA remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.
VMware Tanzu Spring Framework and Spring Security Vulnerabilities Allow Security Bypass
2 rules 1 TTPAn anonymous, remote attacker can exploit multiple vulnerabilities in VMware Tanzu Spring Security and VMware Tanzu Spring Framework to bypass security measures.
Znuny Cross-Site Scripting Vulnerability
2 rules 1 TTPAn anonymous remote attacker can exploit a vulnerability in Znuny to perform a cross-site scripting attack, potentially leading to information disclosure or session hijacking.
OpenSSH Vulnerabilities Allow Local Code Execution
2 rules 1 TTPA local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.
cURL Vulnerability Allows File Manipulation
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in cURL to manipulate files on a vulnerable system.
PostgreSQL JDBC Driver SQL Injection Vulnerability
2 rules 1 TTPAn anonymous, remote attacker can exploit a vulnerability in the PostgreSQL JDBC Driver to perform SQL injection attacks.
Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service
2 rules 2 TTPsMultiple vulnerabilities in libpng allow a remote, anonymous attacker to perform denial of service attacks and execute arbitrary code.
Apache CXF Multiple Vulnerabilities Allow Information Disclosure and SSRF
2 rules 1 TTPA remote attacker can exploit multiple vulnerabilities in Apache CXF to disclose information and perform Server-Side Request Forgery (SSRF) attacks.
GIMP Vulnerability Allows Remote Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in GIMP to execute arbitrary code on a targeted system.
Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.
Apache Commons FileUpload Denial of Service Vulnerability
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in Apache Commons FileUpload to perform a denial of service attack.
Apache Commons BeanUtils Security Bypass Vulnerability
1 rule 1 TTPAn authenticated remote attacker can exploit a vulnerability in Apache Commons BeanUtils to bypass security measures, potentially leading to unauthorized access or privilege escalation.
MIT Kerberos Security Bypass Vulnerability
2 rules 1 TTPAn anonymous, remote attacker can exploit a vulnerability in MIT Kerberos to bypass security measures.
Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation
2 rules 3 TTPsA local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.
Android-ImageMagick7 Memory Leak Vulnerability (CVE-2026-33852)
2 rules 1 TTP 1 IOCA missing release of memory vulnerability (CVE-2026-33852) in MolotovCherry Android-ImageMagick7 before version 7.1.2-11 can lead to a denial-of-service condition due to memory exhaustion.
RetroDebugger Out-of-Bounds Read Vulnerability (CVE-2026-4753)
2 rules 2 TTPs 1 IOCRetroDebugger before v0.64.72 is vulnerable to an out-of-bounds read (CVE-2026-4753), potentially leading to information disclosure or denial of service.
Out-of-bounds Read Vulnerability in fabiangreffrath woof (CVE-2026-4750)
2 rules 1 TTPCVE-2026-4750 is a critical out-of-bounds read vulnerability affecting fabiangreffrath woof versions before 15.3.0, potentially leading to information disclosure or denial of service.
Out-of-bounds Write Vulnerability in DualSenseY-v2
2 rules 3 TTPsCVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.
doslib Memory Buffer Overflow Vulnerability (CVE-2026-33851)
2 rules 3 TTPsAn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in joncampbell123's doslib before version doslib-20250729, potentially leading to arbitrary code execution.
Android-ImageMagick7 Out-of-Bounds Write Vulnerability (CVE-2026-33854)
2 rules 1 TTP 1 IOCAn unauthenticated, remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-33854) in MolotovCherry Android-ImageMagick7 versions before 7.1.2-10 by enticing a user to open a malicious image, potentially leading to arbitrary code execution.
linkingvision rapidvms Improper Memory Buffer Restriction Vulnerability (CVE-2026-33847)
2 rules 2 TTPs 1 IOCAn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms before PR#96 could lead to arbitrary code execution.
Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)
2 rules 1 TTPCVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.
Galaxy Software Services Vitals ESP Missing Authentication Vulnerability (CVE-2026-4640)
2 rules 1 TTP 3 IOCsVitals ESP developed by Galaxy Software Services suffers from a missing authentication vulnerability (CVE-2026-4640), enabling unauthenticated remote attackers to execute functions and obtain sensitive information.
SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)
2 rules 1 TTPCVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.
D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)
2 rules 2 TTPsCVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.
SourceCodester Online Admission System 1.0 SQL Injection Vulnerability
2 rules 1 TTP 6 IOCsA SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.
DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability
2 rules 10 TTPsA server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.
Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)
2 rules 1 TTPA use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.
Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)
2 rules 1 TTP 1 IOCA remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.
Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)
2 rules 1 TTPA use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)
2 rules 3 TTPsA remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.
Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)
2 rules 1 TTP 1 IOCA use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.
Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)
2 rules 1 TTP 2 IOCsA remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.
Spring Cloud Config Server Path Traversal Vulnerability (CVE-2026-22739)
2 rules 1 TTP 1 IOCA path traversal vulnerability exists in Spring Cloud Config Server versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2, allowing unauthenticated remote attackers to access files outside configured search directories when using the native file system backend.
SourceCodester E-Commerce Site SQL Injection Vulnerability (CVE-2026-4613)
2 rules 1 TTPA remote SQL injection vulnerability (CVE-2026-4613) exists in SourceCodester E-Commerce Site 1.0 within the /products.php file due to improper input sanitization of the 'Search' argument, potentially allowing attackers to read or modify sensitive database information.
Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)
2 rules 3 TTPs 1 IOCCVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.
Go MCP SDK Vulnerable to Cross-Site POST Requests (CVE-2026-33252)
1 rule 1 TTPThe Go MCP SDK before v1.4.1 is vulnerable to cross-site POST requests due to insufficient origin validation and content type enforcement, potentially leading to arbitrary tool execution on local servers in stateless or sessionless deployments.
Tekton Pipelines Git Resolver Path Traversal Vulnerability
2 rules 1 TTPThe Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.
Salvo Web Framework Path Traversal Vulnerability
2 rules 1 TTPSalvo web framework versions 0.39.0 through 0.89.2 are vulnerable to Path Traversal and Access Control Bypass, allowing unauthenticated external attackers to bypass proxy routing constraints and access unintended backend paths.
Ruby on Rails Active Storage DoS Vulnerability (CVE-2026-33174)
2 rules 1 TTPA denial-of-service vulnerability (CVE-2026-33174) exists in Ruby on Rails Active Storage versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1 due to unbounded memory allocation when handling large or unbounded Range headers in proxy delivery mode.
Blinko Privilege Escalation via upsertUser Endpoint
2 rules 1 TTPAn authenticated user can exploit the Blinko upsertUser endpoint to escalate privileges, modify other users' passwords, and achieve account takeover due to missing authentication and verification checks.
Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability
2 rules 1 TTPA DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.
WWBN AVideo SQL Injection Vulnerability (CVE-2026-33723)
2 rules 1 TTPWWBN AVideo platform versions up to 26.0 are vulnerable to SQL injection (CVE-2026-33723), allowing authenticated attackers to inject arbitrary SQL commands via the 'user_id' POST parameter and extract sensitive data such as password hashes, API keys, and encryption salts.
WWBN AVideo Privilege Escalation via Moderator Account
2 rules 1 TTPWWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.
Schneider Electric Modicon PLC Denial-of-Service Vulnerability
2 rules 1 TTP 2 IOCsTeam82 disclosed vulnerabilities in Schneider Electric Modicon Controllers M241, M251, and M262 PLC lines, which can allow an attacker to cause a denial-of-service condition and affect controller availability.
Citrix NetScaler ADC and Gateway Vulnerabilities
2 rulesCitrix has released a security advisory addressing multiple vulnerabilities in NetScaler ADC and NetScaler Gateway that could lead to sensitive information disclosure and user session mix-up under specific configurations.
Erupt Framework SQL Injection Vulnerability (CVE-2026-4594)
2 rules 1 TTPA SQL injection vulnerability (CVE-2026-4594) exists in erupts erupt up to version 1.13.3, allowing remote attackers to execute arbitrary SQL commands by manipulating the sort.field argument in the geneEruptHqlOrderBy function.
AVideo Unauthenticated Server-Side Request Forgery Vulnerability
2 rules 1 TTPAVideo versions up to 26.0 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `plugin/Live/test.php` endpoint, allowing attackers to make the server send arbitrary HTTP requests, potentially exposing internal resources and cloud metadata.
WWBN AVideo Unauthorized File Access and Deletion Vulnerability
2 rules 2 TTPsWWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.
cgltf Integer Overflow Vulnerability in Sparse Accessor Validation
2 rules 2 TTPscgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors, allowing attackers to trigger out-of-bounds reads via crafted glTF/GLB files, leading to denial of service and potential memory disclosure.
Iperius Backup 6.1.0 Privilege Escalation via Malicious Backup Jobs (CVE-2019-25608)
2 rules 2 TTPsIperius Backup 6.1.0 is vulnerable to privilege escalation, allowing low-privilege users to execute arbitrary programs with elevated privileges by creating malicious backup jobs that execute pre- or post-backup scripts with SYSTEM privileges.
WWBN AVideo Channel Password Bypass Vulnerability (CVE-2026-33297)
2 rules 1 TTPWWBN AVideo versions prior to 26.0 are vulnerable to a credential access vulnerability where passwords containing non-numeric characters are incorrectly processed, effectively setting the password to '0' and allowing trivial channel access bypass.
Notepad2 PROPSYS.dll Uncontrolled Search Path Vulnerability (CVE-2026-4545)
2 rules 1 TTPCVE-2026-4545 describes a vulnerability in Flos Freeware Notepad2 4.2.25, where manipulating PROPSYS.dll leads to an uncontrolled search path, potentially allowing a local attacker to execute arbitrary code with elevated privileges.
Lavavo CD Ripper 4.20 SEH Buffer Overflow Vulnerability
2 rules 1 TTPLavavo CD Ripper 4.20 is vulnerable to a structured exception handling (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field leading to arbitrary code execution and a bind shell.
FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)
2 rules 1 TTPFTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.
EquityPandit 1.0 Insecure Logging Vulnerability (CVE-2019-25605)
2 rules 1 TTPEquityPandit 1.0 contains an insecure logging vulnerability (CVE-2019-25605) that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge, specifically exposing plaintext passwords during the forgot password function.
Admin Express 1.2.5.485 Local SEH Buffer Overflow Vulnerability
2 rules 2 TTPsAdmin Express 1.2.5.485 is susceptible to a local structured exception handling buffer overflow vulnerability, enabling local attackers to execute arbitrary code via a crafted payload in the Folder Path field of the System Compare feature.
Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)
2 rules 1 TTP 3 IOCsAn unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.
TuneClone 2.20 SEH Buffer Overflow Vulnerability (CVE-2019-25603)
2 rules 1 TTP 4 IOCsTuneClone 2.20 is vulnerable to a structured exception handler (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious license code string via the application's license registration feature.
Tenda F453 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-4553)
2 rules 5 TTPsA stack-based buffer overflow vulnerability exists in Tenda F453 version 1.0.0.3 in the fromNatlimit function of the /goform/Natlimit Parameters Handler component, triggered remotely by manipulating the 'page' argument, allowing for potential arbitrary code execution.
MiniFtp Buffer Overflow Vulnerability (CVE-2019-25611)
2 rules 2 TTPsMiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function allowing local attackers to execute arbitrary code by supplying oversized configuration values in the miniftpd.conf file.
Linksys MR9600 SmartConnect OS Command Injection (CVE-2026-4558)
2 rules 1 TTPA remote OS command injection vulnerability exists in the Linksys MR9600 router version 2.0.6.206937, allowing attackers to execute arbitrary commands by manipulating specific function arguments via the SmartConnect.lua file.
DVDXPlayer Pro 5.5 Local Buffer Overflow Vulnerability (CVE-2019-25604)
2 rules 2 TTPsDVDXPlayer Pro 5.5 is vulnerable to a local buffer overflow, allowing local attackers to execute arbitrary code by crafting malicious playlist files.
Axessh 4.2 Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 6 IOCsAxessh 4.2 is vulnerable to a stack-based buffer overflow in the log file name field, allowing local attackers to execute arbitrary code by supplying an excessively long filename.
Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking
2 rules 1 TTP 2 IOCsA supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.
Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)
2 rules 1 TTPA guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.
Jsrsasign < 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)
2 rules 1 TTPJsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.
Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)
2 rules 1 TTPJsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.
jsrsasign DSA Signing Vulnerability (CVE-2026-4601)
2 rules 1 TTPjsrsasign versions before 11.1.1 are vulnerable to a missing cryptographic step in the DSA signing implementation, allowing an attacker to recover the private key by manipulating the signature generation process.
Tenda A15 Router Stack-Based Buffer Overflow (CVE-2026-4567)
2 rules 1 TTP 7 IOCsA stack-based buffer overflow vulnerability (CVE-2026-4567) exists in the UploadCfg function of the /cgi-bin/UploadCfg file in Tenda A15 firmware version 15.13.07.13, allowing remote attackers to execute arbitrary code by manipulating the File argument.
Belkin F9K1122 Router Stack-Based Buffer Overflow
2 rules 1 TTPA stack-based buffer overflow vulnerability exists in Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWISP5G' function.
Tenda AC21 Router Buffer Overflow Vulnerability
2 rules 1 TTPA buffer overflow vulnerability exists in Tenda AC21 firmware version 16.03.08.16, allowing remote attackers to execute arbitrary code by manipulating arguments to the formSetQosBand function.
WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)
2 rules 1 TTPThe WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.
Inner Warden Security Agent Capabilities
2 rules 1 TTPThe open-source Inner Warden project is a security agent leveraging eBPF for kernel-level monitoring and autonomous response actions like IP blocking and process termination, aiming to create a distributed security mesh.
Trivy Scanner Compromised in Supply Chain Attack
2 rules 3 TTPsThe widely used Trivy scanner has been compromised in an ongoing supply chain attack, potentially impacting numerous organizations using the tool for vulnerability management.
GhostLoader Malware Targeting macOS via GitHub and AI Workflows
2 rules 1 TTPGhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.
UniFi Network Application Vulnerabilities CVE-2026-22557 and CVE-2026-22558
2 rules 2 TTPsA combination of path traversal (CVE-2026-22557) and NoSQL injection (CVE-2026-22558) vulnerabilities in the UniFi Network Application allows attackers to access files, escalate privileges, and potentially compromise the entire system.
Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft
2 rules 4 TTPsAttackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.
RagaSerpent 'Tax Audit' Campaign Targeting Multiple Countries
2 rules 1 TTPThe RagaSerpent cluster, also known as SideWinder-Adjacent, is conducting targeted attacks across multiple countries between 2025 and 2026, associated with a 'Tax Audit' themed campaign.
Critical Vulnerabilities in Quest KACE SMA Allow System Takeover
2 rules 4 TTPsMultiple critical vulnerabilities in Quest KACE Systems Management Appliance (SMA), including authentication bypass and 2FA bypass, allow unauthenticated attackers to achieve system takeover and cause denial of service; active exploitation is reported.
Claude Code Workspace Trust Dialog Bypass via Settings Loading Order (CVE-2026-33068)
2 rules 1 TTPA maliciously crafted `.claude/settings.json` file in a Claude Code repository (versions prior to 2.1.53) can bypass the workspace trust confirmation dialog by exploiting a configuration loading order defect, allowing for arbitrary code execution within a supposedly untrusted workspace.
Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration
2 rules 1 TTPThe Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.
Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)
2 rules 1 TTP 1 IOCCVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.
Potential snap-confine Privilege Escalation via CVE-2026-3888
2 rules 1 TTPAn unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.
Disruption of Large IoT DDoS Botnets
2 rules 1 TTPLaw enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.
SnappyClient Malware Delivered via HijackLoader
2 rules 3 TTPsSnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.
Vulnerabilities in Paxton Net2 Access Control Units
2 rules 8 TTPs 1 IOCVulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.
CISA Urges Endpoint Management System Hardening After Cyberattack
2 rules 5 TTPsCISA is urging hardening of endpoint management systems following a cyberattack against a US organization, highlighting the potential for significant impact via compromised management infrastructure.
DarkSword iOS Exploit Used in Infostealer Attack
2 rules 3 TTPsA new exploit dubbed 'DarkSword' is being actively exploited in infostealer campaigns targeting iPhones, potentially leading to unauthorized data access and device compromise.
Memory Exhaustion Vulnerability in Widely Used Python Library
2 rules 1 TTPA memory exhaustion vulnerability (CVE-2026-33155) exists in a widely used Python library, affecting services like SageMaker, DataHub, and acryl-datahub due to an incomplete patch for CVE-2025-58367, requiring pinning to version 8.6.2.
MOTW Bypass via CAB, TAR, and 7-Zip Chaining
2 rules 2 TTPs 1 IOCA newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.
Vulnerabilities Disclosed in IP KVM Devices from Multiple Vendors
2 rules 2 TTPsResearchers have disclosed unspecified vulnerabilities in IP KVM devices from four manufacturers, potentially allowing attackers to gain unauthorized access to connected systems.
CVE-2026-22729: JSONPath Injection Vulnerability in Spring AI's PgVectorStore
2 rules 1 TTPCVE-2026-22729 is a JSONPath Injection vulnerability found in Spring AI's PgVectorStore, potentially allowing for unauthorized data access or modification.
Critical XSS Vulnerabilities in AFFiNE
2 rules 1 TTP 2 IOCsTwo critical XSS vulnerabilities, Reflected XSS in the /image-proxy endpoint and Stored XSS in bookmark cards, were discovered in AFFiNE, a self-hosted alternative to Notion, with the vendor being unresponsive.
CISA Urges Securing Microsoft Intune Systems Following Stryker Breach
2 rules 6 TTPsCISA is urging US organizations to secure their Microsoft Intune systems due to a breach at Stryker, highlighting potential vulnerabilities in cloud-based device management that could lead to unauthorized access and control over managed devices.
DarkSword iOS Exploit Chain Proliferation
1 rule 2 TTPsThe DarkSword exploit chain targets iOS versions 18 and under by exploiting a WebKit vulnerability, and is being adopted by multiple threat actors for initial access and execution.
CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection
2 rules 6 TTPsCrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0) to protect AI agents from prompt injection, data exposure, and unauthorized actions, enabling safer deployment of AI applications.
StoatWaffle Malware Used by WaterPlum Actor
2 rules 1 TTPStoatWaffle is malware employed by the WaterPlum threat actor, used for an unknown purpose.
Interlock Ransomware Campaign Targeting Enterprise Firewalls
2 rules 3 TTPsThe Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.
ScreenConnect 26.1 Cryptographic Material Protection Vulnerability
2 rules 1 TTPScreenConnect version 26.1 has a vulnerability related to the insufficient protection of server-level cryptographic material, potentially allowing unauthorized access and data compromise.
RegPwnBOF Registry Symlink Race Condition Exploit
2 rules 2 TTPsRegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.
Ubuntu 24.04 Snapd Local Privilege Escalation (CVE-2026-3888)
2 rules 1 TTPCVE-2026-3888 allows a local attacker to escalate privileges to root on Ubuntu 24.04 systems due to a vulnerability in the snapd service.
EmEditor Supply Chain Compromise Delivering Infostealer
2 rules 1 TTPA trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.
Entra ID Federated Identity Credential Issuer Modified
2 rules 2 TTPsModification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.
DarkSword iOS Exploit Kit Targeting iOS Devices
2 rules 3 TTPsThe DarkSword exploit kit targets iOS devices, leveraging unknown vulnerabilities to compromise devices.
SOC Analyst Toolkit with Threat Hunting Queries
2 rules 1 TTP 2 IOCsA free, offline SOC toolkit aimed at Tier 1 analysts includes IR checklists, triage playbooks, and threat hunting guides mapped to MITRE ATT&CK, with Splunk and Elastic queries for threats such as Kerberoasting, Pass-the-Hash, LOLBAS, scheduled task persistence, and C2 on non-standard ports.
NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)
2 rules 1 TTPA phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).
Self-Hosted Email Threat Detection Tool
2 rulesA user created a self-hosted email threat detection tool, named VerdictMail, employing IMAP IDLE for real-time monitoring and multi-stage enrichment via SPF, DKIM, DMARC, DNSBL, WHOIS, URLhaus, and VirusTotal, coupled with an LLM for threat assessment.
Credential Guard Bypass and Detection Strategies
2 rules 2 TTPs 1 IOCThis brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.
Angular Cross-Site Scripting (XSS) Vulnerability
2 rules 5 TTPsA cross-site scripting (XSS) vulnerability exists in Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, allowing attackers to execute arbitrary code within the context of the vulnerable application, potentially leading to session hijacking, data exfiltration, and unauthorized actions.
Iranian Botnet Operation Exposed via Open Directory
1 rule 1 TTP 1 IOCAn Iranian botnet operation utilizing a 15-node relay network and active C2 infrastructure was exposed through an open directory.
Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
2 rules 2 TTPsDetects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.
GlassWorm Threat: DLL Injection and Chrome Hijacking
2 rules 2 TTPsThe GlassWorm threat involves DLL injection and Chrome hijacking via COM abuse, confirming a full supply chain loop, potentially leading to data theft and system compromise.
Persistnux - Linux Persistence Detection Tool
3 rules 3 TTPsPersistnux is a bash-based tool designed to identify known Linux persistence mechanisms used by attackers to maintain access to compromised systems, generating detailed reports for DFIR analysis.
CrackArmor: AppArmor Flaws Enable Local Privilege Escalation
2 rules 1 TTPQualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.
HushSpec: Security Policy Specification for AI Agent Action Boundaries
2 rules 1 TTP 2 IOCsHushSpec is an open specification under development to standardize security policies at the action boundary of AI agents, focusing on actions such as file access, network egress, and shell execution, aiming to create a portable and engine-agnostic policy layer.
Stealthy WMI Lateral Movement via StealthyWMIExec.py
2 rules 1 TTPThe StealthyWMIExec.py script facilitates lateral movement via WMI, potentially evading standard detection mechanisms by employing stealthy techniques.
GlassWorm Campaign Deploying Wave 3 Windows Payload
2 rules 2 TTPsThe GlassWorm campaign has been observed deploying a Wave 3 Windows payload, indicating ongoing malicious activity targeting Windows systems.
Unscoped API Keys in AI Agent Frameworks
2 rules 1 TTP 2 IOCsA research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.
Mirai C2 Remote Denial-of-Service Vulnerability (CVE-2024-45163)
2 rules 1 TTPCVE-2024-45163 is a remote denial-of-service vulnerability affecting Mirai command and control (C2) infrastructure, potentially disrupting botnet operations and related malicious activities.
JPCERT/CC Study on Reverse Engineering Rust Binaries
2 rulesJPCERT/CC published a study on the reverse engineering of binaries created with the Rust programming language, providing insights for malware analysis and detection engineering.
PylangGhost RAT Observed on npm Registry
2 rules 1 TTPA new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.
Maltrail IOC Feed Update for Multiple Threats
3 rules 6 TTPs 50 IOCsThis brief summarizes IOCs extracted from the Maltrail feed on March 15, 2026, covering domains and URLs associated with threats targeting macOS and Android platforms, including OSX_Atomic, FakeApp, Android_Joker, Lummack2, APT_Sidewinder, APT_Kimsuky, and Hak5Cloud_C2.
Fileless Multi-Stage Remcos RAT via Phishing
2 rules 4 TTPsA fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.
Malware Spreading Through Fake 'Claude Code' Google Ads
2 rules 1 TTPMalware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.
Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories
3 rules 4 TTPs 1 IOCThe Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.
GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis
2 rules 2 TTPsAnalysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.
Phishing Campaign Abusing Google Cloud Storage Redirectors
2 rules 1 TTP 2 IOCsA phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.
Multiple Network Intrusion Attempts Detected
3 rules 2 TTPs 8 IOCsMultiple network-based intrusion attempts were detected on 2026-03-14, targeting PHP information exposure, Fortigate VPN exploitation, sensitive file access, and credential exposure.
Multiple Critical Vulnerabilities in Veeam Backup & Replication Allow Remote Code Execution
2 rules 3 TTPsMultiple critical vulnerabilities in Veeam Backup & Replication, including CVE-2026-21666, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708, allow for remote code execution, privilege escalation, and arbitrary file manipulation by authenticated users, potentially leading to a complete compromise of the backup infrastructure.
KRVTZ-NET IDS Alerts Analysis: Network Scanning and Exploitation Attempts
3 rules 4 TTPs 13 IOCsMultiple IDS alerts indicate potential network reconnaissance, vulnerability exploitation attempts targeting Fortigate VPN (CVE-2023-27997), and ColdFusion servers originating from various IP addresses on March 13, 2026.
RegPwn Windows Local Privilege Escalation Vulnerability
2 rules 1 TTPRegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.
Kubernetes Sensitive Role Creation or Modification
2 rules 2 TTPsThis rule detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs (e.g., bind, escalate, impersonate), potentially leading to privilege escalation or unauthorized access within the cluster.
Kubernetes Endpoint Permission Enumeration
2 rules 1 TTPA single user and source IP attempts to enumerate Kubernetes endpoints, issuing API requests across multiple endpoints to identify accessible resources for further exploitation.
Apache Artemis and ActiveMQ Artemis Authentication Bypass Vulnerability
2 rules 5 TTPsCVE-2026-27446 allows an unauthenticated remote attacker to inject malicious messages or exfiltrate data from Apache Artemis and ActiveMQ Artemis brokers due to a missing authentication check in the Core protocol.
AWS STS Role Assumption by User
2 rules 2 TTPsDetection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.
Fortigate VPN CVE-2023-27997 Exploitation Attempt
2 rules 1 TTP 1 IOCIDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.
Maltrail IOCs Report: Tracking Multiple Threat Actors
3 rules 5 TTPs 27 IOCsThis brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.
Critical Unauthenticated RCE Vulnerability in Junos OS Evolved
2 rules 3 TTPsA critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.
Critical Vulnerabilities in n8n Workflow Automation Platform
3 rules 3 TTPsMultiple critical vulnerabilities in n8n versions prior to 2.10.1, 2.9.3, and 1.123.22 enable authenticated users to execute arbitrary code and system commands, potentially leading to full system compromise.
Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution
2 rules 3 TTPsMultiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.
Multiple Vulnerabilities in SWITCH EV Charging Stations
2 rules 7 TTPs 1 IOCMultiple vulnerabilities in SWITCH EV swtchenergy.com charging stations could allow attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data due to missing authentication, rate limiting issues, session expiration flaws, and exposed credentials.
Mobility46 Charging Station Vulnerabilities Allow Unauthorized Control and Disruption
2 rules 3 TTPs 1 IOCMultiple vulnerabilities in Mobility46 charging stations allow attackers to gain unauthorized administrative control or disrupt charging services through missing authentication, improper authentication restrictions, insufficient session expiration, and exposed credentials.
Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)
2 rules 1 TTPA critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.
Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability
2 rules 1 TTPAn authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.
EV2GO Charging Station Vulnerabilities Allow Impersonation and Denial of Service
2 rules 3 TTPs 1 IOCMultiple vulnerabilities in EV2GO charging stations, including missing authentication and session management flaws, could allow attackers to impersonate stations, hijack sessions, and cause denial-of-service conditions.
Critical RCE Vulnerability in Cisco Catalyst SD-WAN Controller
2 rules 2 TTPs 4 IOCsA critical remote code execution vulnerability exists in Cisco Catalyst SD-WAN Controllers (CVE-2026-20127) due to improper authentication, allowing unauthenticated remote attackers to bypass authentication and gain administrative privileges, potentially leading to network configuration manipulation.
Multiple Vulnerabilities in EV Energy ev.energy Charging Stations
2 rulesMultiple vulnerabilities exist in EV Energy ev.energy that could allow an attacker to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.
Multiple Vulnerabilities in Chargemap Charging Stations
2 rules 5 TTPs 1 IOCUnauthenticated attackers can exploit multiple vulnerabilities in Chargemap's charging stations, including missing authentication, improper authentication attempt restrictions, insufficient session expiration, and unprotected credentials, potentially leading to unauthorized control and denial-of-service.
Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities
2 rules 4 TTPsMultiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.
Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution
2 rules 3 TTPsMultiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.
Copeland XWEB and XWEB Pro Multiple Vulnerabilities
2 rules 6 TTPsMultiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and earlier could allow attackers to bypass authentication, inject commands, and execute arbitrary code, leading to complete system compromise.
Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent
3 rules 2 TTPs 3 IOCsMultiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.
VMware Aria Operations Vulnerabilities Allow Remote Code Execution and Privilege Escalation
2 rules 2 TTPs 3 IOCsMultiple vulnerabilities in VMware Aria Operations, Cloud Foundation, and Telco Cloud Platform/Infrastructure could allow unauthenticated remote code execution (CVE-2026-22719) and privilege escalation (CVE-2026-22720, CVE-2026-22721).
Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution
2 rules 2 TTPsCritical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.
Ongoing Exploitation of Cisco SD-WAN Systems
3 rules 4 TTPsMalicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.
Suspicious AWS EC2 Key Pair Import Activity
2 rules 1 TTPThe import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.
AWS SAML Provider Deletion Activity
2 rules 2 TTPsAn adversary may delete an AWS SAML provider to disrupt administrative access, hindering incident response and potentially escalating privileges within the AWS environment.
Bitbucket Secret Scanning Rule Deleted
2 rules 1 TTPAttackers may delete secret scanning rules in Bitbucket to impair defenses and introduce secrets into the code repository undetected, potentially leading to unauthorized access or data breaches.
OpenC3 COSMOS Script Runner Permissions Bypass
2 rules 1 TTPThe OpenC3 COSMOS Script Runner widget allows authenticated users to bypass API permissions checks and execute administrative actions by running specially crafted Python and Ruby scripts, leading to data manipulation and privilege escalation.
LiteLLM Proxy API Key Verification SQL Injection
2 rules 1 TTPA SQL injection vulnerability exists in LiteLLM versions 1.81.16 to prior to 1.83.7 allowing an unauthenticated attacker to inject SQL queries via a crafted 'Authorization' header, potentially leading to unauthorized data access or modification.
Suspicious Pod Creation in Kubernetes System Namespace
2 rules 1 TTPAn attacker may deploy a pod within the kube-system namespace in Kubernetes to mimic legitimate system pods and evade detection.
LiteLLM Server-Side Template Injection Vulnerability
2 rules 1 TTPA server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.
Powercat PowerShell Implementation Detection
2 rules 2 TTPsAdversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.
Active Directory Group Modification by SYSTEM Account
2 rules 2 TTPsDetection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.
NornicDB Improper Network Binding Exposes Bolt Server
2 rules 2 TTPsNornicDB versions prior to 1.0.42-hotfix have an improper network binding vulnerability in its Bolt server, allowing unauthorized remote access because the `--address` CLI flag is not correctly plumbed through to the Bolt server config, causing the Bolt listener to always bind to the wildcard address and expose the database with default credentials.
GitHub SSH Certificate Configuration Changed
2 rules 4 TTPsAttackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.
WDAC Policy File Creation by Unusual Process
2 rules 1 TTPAdversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.
Unusual Spike in Okta User Lifecycle Management Change Events
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta user lifecycle management change events, indicating potential privileged access activity where threat actors may manipulate user accounts to gain higher access rights or persist within the environment.
Untrusted DLL Loaded by Azure AD Connect Authentication Agent
2 rules 1 TTPThe loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.
Potential Privilege Escalation via SUID/SGID on Linux
2 rules 2 TTPsAttackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.
MemProcFS Usage for Memory Dump Mounting and Credential Access
2 rules 3 TTPsAdversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.
Kubernetes Admission Controller Modification
2 rules 2 TTPsAn adversary modifies Kubernetes admission controller configurations to achieve persistence, escalate privileges, or gain unauthorized access to credentials within the cluster.
go-zserio Unbounded Memory Allocation Vulnerability
2 rules 1 TTPgo-zserio versions prior to 0.9.1 are vulnerable to unbounded memory allocation when deserializing data, potentially leading to denial of service.
Detect AWS Route Table Modification via CloudTrail
2 rulesAn attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.
Bitbucket Global SSH Settings Changed
2 rules 2 TTPsAn attacker modifies Bitbucket global SSH settings to potentially enable unauthorized access and lateral movement.
GitHub Security Feature Disablement
3 rules 3 TTPsAn administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.
OpenCanary HTTPPROXY Login Attempt Detection
2 rules 1 TTPDetection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.
OpenCanary Telnet Login Attempt
1 rule 2 TTPsThe OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.
New AWS Network ACL Entry Creation Detected
2 rules 1 TTPDetection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.
MsiExec Child Process Spawning Network Connections for Defense Evasion
2 rules 1 TTPDetection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.
Linux Shell Invocation via Env Command
2 rules 1 TTPThe 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.
Dgraph Pre-Auth DQL Injection Vulnerability
1 rule 1 TTPA pre-authentication DQL injection vulnerability in Dgraph's `/mutate` endpoint, when ACL is disabled, allows attackers to exfiltrate the entire database by crafting a malicious `cond` field in an upsert mutation.
Bitbucket Audit Log Configuration Modified
2 rules 1 TTPAn attacker may modify the Bitbucket audit log configuration to impair security monitoring and evade detection.
Persistence via Windows Installer (Msiexec)
3 rules 3 TTPsAdversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.
Evolver Path Traversal Vulnerability in `fetch` Command
2 rules 2 TTPsA path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.
GitHub Secret Scanning Feature Disabled
2 rules 1 TTPDetection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.
Malicious Usage of AWS IMDS Credentials Outside of Expected Services
2 rules 3 TTPsCompromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.
Alternate Data Stream Creation/Execution at Volume Root Directory
2 rules 1 TTPDetection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.
Unsigned DLL Loaded by DNS Service
2 rules 3 TTPsThe rule identifies the loading of unusual or unsigned DLLs by the DNS Server process, which can indicate exploitation of the ServerLevelPluginDll functionality, potentially leading to privilege escalation and remote code execution with SYSTEM privileges.
Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing
2 rules 1 TTPA high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.
russh Keyboard-Interactive Authentication Denial-of-Service
2 rules 2 TTPsA denial-of-service vulnerability exists in the russh crate, where a malicious client can crash any russh-based server implementing keyboard-interactive authentication by sending a crafted SSH_MSG_USERAUTH_INFO_RESPONSE message with a large response count, leading to excessive memory allocation and an out-of-memory crash without requiring any credentials.
Potential Veeam Credential Access via SQL Commands
2 rules 5 TTPsAttackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.
OpenSC Stack Buffer Overflow Vulnerability (CVE-2025-66215)
2 rules 1 CVECVE-2025-66215 is a critical stack buffer overflow vulnerability within the OpenSC project, specifically affecting the `card-oberthur` component, potentially leading to arbitrary code execution.
OpenSC Stack Buffer Overflow Vulnerability (CVE-2025-49010)
2 rules 1 CVECVE-2025-49010 is a critical stack buffer overflow vulnerability within the GET RESPONSE function of OpenSC, potentially leading to arbitrary code execution.
Detecting Potential PowerShell Pass-the-Hash/Relay Scripts
2 rules 2 TTPsThis rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.
Potential Windows Session Hijacking via CcmExec
2 rules 1 TTPAdversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.
NTDS Dump via Wbadmin
2 rules 2 TTPsAttackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.
Microsoft Management Console File Execution from Unusual Path
2 rules 4 TTPsAdversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.
Grafana Vulnerability Allows Remote Code Execution
2 rules 1 TTPAn authenticated remote attacker can exploit a vulnerability in Grafana to execute arbitrary code, potentially leading to system compromise and data exfiltration.
DNS Global Query Block List Modified or Disabled
2 rules 3 TTPsAttackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.
Suspicious Registry Hive Access via RegBack
2 rules 1 TTPThis rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.
SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation
2 rules 1 TTP 1 CVEA missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.
SimpleHelp Path Traversal Vulnerability (CVE-2024-57728)
2 rules 3 TTPs 1 CVECVE-2024-57728 is a path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file, potentially leading to arbitrary code execution.
Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)
3 rules 1 TTP 1 CVECVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.
Roundcube Vulnerabilities Leading to Cross-Site Scripting and Information Disclosure
2 rules 1 TTP 3 CVEsMultiple vulnerabilities in Roundcube allow an attacker to perform a cross-site scripting attack and disclose confidential information.
Unauthorized Modification of Azure Conditional Access Policy
2 rules 2 TTPsAn unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.
Suspicious DNS-Named Record Creation in Active Directory Integrated DNS
2 rules 1 TTPDetection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.
Suspicious ScreenConnect Client Child Process Activity
2 rules 11 TTPs 2 CVEsThis rule identifies suspicious child processes spawned by ScreenConnect client processes, potentially indicating unauthorized access and command execution abusing ScreenConnect remote access software to perform malicious activities such as data exfiltration or establishing persistence.
Suspicious Child Processes Spawned by JetBrains TeamCity
2 rules 17 TTPs 1 CVEDetection of suspicious processes spawned by JetBrains TeamCity indicates potential exploitation of remote code execution vulnerabilities, with attackers using command interpreters and system binaries for malicious purposes.
Windows Parent Process PID Spoofing Detection
3 rules 1 TTPAdversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.
Azure AD Root Certificate Authority Added for Passwordless Authentication
2 rules 4 TTPsAn attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.
OpenCanary SSH Connection Attempt
2 rules 1 TTPAn SSH connection attempt to an OpenCanary node indicates a potential adversary probing for vulnerable services or attempting unauthorized access within a network.
Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability
2 rules 1 TTPThe Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.
Potential ADIDNS Poisoning via Wildcard Record Creation
2 rules 1 TTPAttackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.
Veeam Backup Library Loaded by Unusual Process
2 rules 3 TTPsDetects potential credential decryption operations by PowerShell or unsigned processes using the Veeam.Backup.Common.dll library, indicating potential credential access attempts to target backups as part of destructive operations.
GStreamer Multiple Vulnerabilities Allow Remote Code Execution and Denial of Service
2 rules 2 TTPs 5 CVEsMultiple vulnerabilities in GStreamer could be exploited by a remote, anonymous attacker to execute arbitrary code or cause a denial of service condition.
GStreamer Multiple Vulnerabilities Allow for Remote Code Execution and Denial of Service
2 rules 2 TTPs 5 CVEsMultiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition or execute arbitrary code.
GitHub Push Protection Disabled
2 rules 1 TTPAn administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.
OpenCanary SSH Login Attempt Detection
2 rules 1 TTPDetects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.
GenAI Process Connection to Unusual Domain on macOS
2 rules 1 TTPThis rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.
Zserio Runtime Unbounded Memory Allocation Vulnerability
2 rules 1 TTPA crafted payload can force memory allocations of up to 16 GB, leading to a denial-of-service condition in applications using the Zserio serialization framework, including those within the automotive Navigation Data Standard (NDS).
Monetr Lunch Flow SSRF Vulnerability
2 rules 1 TTP 1 IOCA server-side request forgery (SSRF) vulnerability in Monetr's Lunch Flow integration allows authenticated users on self-hosted instances to send HTTP GET requests to arbitrary URLs, potentially exposing sensitive information.
Kubernetes Event Deletion for Defense Evasion
2 rules 1 TTPAn adversary may delete Kubernetes events to evade detection and hide malicious activity within a Kubernetes environment by removing audit logs.
Dgraph Unauthenticated Admin Token Disclosure via /debug/vars
3 rules 2 TTPsDgraph versions prior to 25.3.3 expose the admin token via the `/debug/vars` endpoint, allowing unauthenticated attackers to bypass authentication and gain administrative access.
Potential Data Exfiltration to Unusual Geographic Region via Machine Learning
2 rules 1 TTPA machine learning job has detected potential data exfiltration activity to an unusual geographical region, specifically by region name, indicating exfiltration over command and control channels.
Okta Admin Console Unusual Behavior Detection
2 rules 4 TTPsThis brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.
Unusual Remote File Size Indicating Lateral Movement
2 rules 3 TTPsA machine learning job has detected an unusually high file size shared by a remote host, indicating potential lateral movement as attackers bundle data into a single large file transfer to evade detection when exfiltrating valuable information.
Grafana Privilege Escalation Vulnerability
2 rules 1 TTPA remote, authenticated attacker can exploit a vulnerability in Grafana to escalate privileges.
Azure AD Certificate-Based Authentication Enabled
2 rules 1 TTPEnabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.
Bitbucket Global Secret Scanning Rule Deletion
2 rules 1 TTPAn adversary with administrative privileges may delete global secret scanning rules in Bitbucket to impair defenses and exfiltrate sensitive data without detection.
Potential Abuse of AWS Console GetSigninToken
2 rules 2 TTPsAdversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.
GitHub Push Protection Bypass Detection
2 rulesDetection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.
ConnectWise ScreenConnect Path Traversal Vulnerability (CVE-2024-1708)
2 rules 1 TTP 1 CVECVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect that could allow an attacker to execute remote code or directly impact confidential data and critical systems.
Bitbucket Repository Exempted from Secret Scanning
2 rules 1 TTPAn attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.
Bitbucket Project Secret Scanning Allowlist Added
2 rulesAn adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.
Bitbucket User Login Failure Detection
2 rules 3 TTPsDetection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.
Okta Password Entered in AlternateID Field
2 rules 1 TTPOkta logs may contain user passwords if a user mistakenly enters their password into the username field during login, potentially exposing credentials in logs.
Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)
2 rules 1 TTP 1 CVEThe Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
Suspicious Child Processes from Communication Applications
3 rules 3 TTPsThe detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.
Network-Level Authentication (NLA) Disabled via Registry Modification
2 rules 2 TTPsAdversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.
Azure Identity Protection Suspicious Browser Activity
2 rules 6 TTPsA suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.
Azure Firewall Rule Collection Modification or Deletion
2 rules 2 TTPsAn attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.
Potential Enumeration via Active Directory Web Service
2 rules 3 TTPsAdversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.
Wireless Credential Dumping via Netsh
2 rules 2 TTPsAdversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.
Windows Console History Clearing
2 rules 2 TTPsAdversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.
TYPO3 CMS 14.2.0 Stores Passwords in Cleartext
1 rule 1 TTPTYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.
System File Ownership Change for Defense Evasion
3 rules 1 TTPAdversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.
Suspicious Windows Process Cluster from Parent Process via Machine Learning
2 rules 2 TTPsA machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.
Spike in Number of RDP Connections from a Single Source IP
2 rules 2 TTPsA machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.
Service Reconnaissance via WMIC.exe
2 rules 1 TTPAdversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.
Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation
2 rules 1 TTPA vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.
PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)
2 rules 1 TTP 1 CVEPrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.
Potential Account Takeover via Mixed Logon Types
2 rules 1 TTPA Windows account, usually a service account, exhibiting a sudden shift in logon type patterns may indicate account compromise and lateral movement.
PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load
2 rules 2 TTPsPhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.
Netsh Helper DLL Persistence
2 rules 2 TTPsAttackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.
Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)
2 rules 1 TTP 1 CVEKentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.
Expired or Revoked Driver Loaded
2 rules 3 TTPsAn expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.
Detection of New GitHub Actions Secrets Creation
3 rules 3 TTPsThis analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.
CVE-2022-2068 c_rehash Command Injection Vulnerability
2 rules 1 TTP 1 CVECVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.
CI4MS Authenticated Remote Code Execution via Theme Upload
2 rules 2 TTPsCI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.
changedetection.io XXE Vulnerability
2 rules 1 TTPA vulnerability in changedetection.io versions 0.54.9 and earlier allows a remote attacker to perform XML External Entity (XXE) attacks, potentially exposing sensitive local files.
Azure AD Sign-In with Unfamiliar Properties
2 rules 4 TTPsThis alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.
Azure AD Sign-in from New Country/Region
2 rules 1 TTPDetection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.
MsXsl.exe Network Connection for Defense Evasion
2 rules 2 TTPsMsxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.
Azure AD Authentication from Unexpected Geo-locations
2 rules 1 TTPDetection of successful authentications originating from geographic locations outside of an organization's expected operational footprint, potentially indicating compromised credentials or unauthorized access.
VaultCmd Usage for Listing Windows Credentials
2 rules 2 TTPsAdversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.
Suspicious Registry Modifications by Scripting Engines
2 rules 3 TTPsThe use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.
Suspicious Managed Code Hosting Process
2 rules 1 TTPThis rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.
rust-openssl AES Key Wrap Out-of-Bounds Write Vulnerability
2 rulesThe rust-openssl package is vulnerable to an out-of-bounds write due to an incorrect bounds assertion in the `aes::unwrap_key()` function, potentially leading to arbitrary code execution if attacker-controlled buffer sizes are permitted.
Program Files Directory Masquerading
2 rules 1 TTPAdversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.
Okta Policy Rule Modification or Deletion
2 rules 1 TTPAn Okta policy rule was modified or deleted, potentially weakening security controls.
Multiple Logon Failure from the Same Source Address
2 rules 2 TTPsDetection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.
Kubernetes Cluster Enumeration via Audit Logs
3 rules 2 TTPsAttackers attempt to enumerate and discover sensitive information within a Kubernetes cluster by leveraging common shells, utilities, and specialized tools, as reflected in audit logs.
AWS Identity API Access from Rare ASN Organizations
2 rules 1 TTPThis rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.
Admidio SAML Assertion Consumer Service (ACS) URL Validation Bypass
2 rules 2 TTPs 2 IOCsAdmidio's SAML IdP implementation in its SSO module is vulnerable to sending SAML responses to unvalidated Assertion Consumer Service URLs, allowing an attacker to craft a SAML AuthnRequest with an arbitrary AssertionConsumerServiceURL, causing the IdP to send the signed SAML response, containing user identity attributes, to an attacker-controlled URL, enabling impersonation of the victim user on the legitimate SP by replaying the SAML assertion.
Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.
Potential Remote Install via MsiExec
2 rules 1 TTPThis rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.
Potential Exploitation of an Unquoted Service Path Vulnerability
2 rules 1 TTPThis rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.
Potential Abuse of Certreq for File Transfer via HTTP POST
2 rules 4 TTPsAdversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.
Windows Registry Classes Autorun Keys Modification for Persistence
3 rules 1 TTPAdversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.
Remote File Download via Script Interpreter
2 rules 3 TTPsAttackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.
Kerberos Pre-authentication Disabled for User Account
3 rules 4 TTPsDetection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.
Detection of Obfuscated IP Address Usage in Download Commands
2 rules 2 TTPsThis brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.
AMSI Enable Registry Key Modification for Defense Evasion
2 rules 1 TTPAdversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.
Microsoft Office 'Office Test' Registry Persistence Abuse
2 rules 2 TTPsAttackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.
Kyverno Controller Denial of Service via forEach Mutation Panic
2 rules 2 TTPsAn unchecked type assertion in Kyverno versions v1.13.0 to v1.17.1 allows a user with permission to create a Policy or ClusterPolicy to crash the cluster-wide background controller into a persistent CrashLoopBackOff, leading to a denial of service, by crafting a malicious policy that triggers a nil pointer dereference in the forEach mutation handler.
Active Directory msPKIAccountCredentials Modification
2 rules 2 TTPsAttackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.
XSL Script Execution via COM Interface in Microsoft Office
2 rules 5 TTPsAdversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.
Okta Network Zone Deactivation or Deletion
2 rules 1 TTPAn Okta network zone was deactivated or deleted, potentially indicating malicious activity aimed at bypassing security controls.
Suspicious Alternate Data Stream (ADS) File Creation
2 rules 1 TTPDetects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.
xmldom XML Node Injection via Comment Serialization
2 rules 1 TTPThe xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.
System Shells Launched via Windows Services
2 rules 4 TTPsAttackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.
S3Browser IAM Policy Creation with Default Bucket Name
2 rules 3 TTPsAn AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.
Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)
2 rules 1 TTP 1 CVECVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.
PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access
2 rules 1 TTPDetection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.
Potential Kerberos Coercion via DNS-Based SPN Spoofing
2 rules 1 TTPAdversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.
MindsDB Unrestricted File Upload Vulnerability (CVE-2026-7711)
2 rules 1 TTP 1 CVECVE-2026-7711 allows for remote, unrestricted file uploads in MindsDB up to version 26.01 due to insufficient validation in the `exec` function of `proc_wrapper.py`, potentially leading to code execution or data exfiltration.
LSASS Credential Dumping via Windows Error Reporting (WER) Abuse
2 rules 2 TTPsAttackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.
i18next-http-middleware Prototype Pollution and Path Traversal Vulnerability
2 rules 2 TTPsVersions of i18next-http-middleware before 3.9.3 are vulnerable to prototype pollution, path traversal, and server-side request forgery (SSRF) due to improper validation of user-controlled language and namespace parameters, potentially leading to denial of service or remote code execution.
Group Policy Discovery via Microsoft GPResult Utility
2 rules 1 TTPDetects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.
Detection of Malicious Browser Extension Installation
2 rulesThis rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.
Azure AD Device Registration Policy Changes Detected
2 rules 1 TTPMonitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.
Unusual Network Connection via RunDLL32
2 rules 2 TTPsThe rule detects unusual outbound network connections made by rundll32.exe, specifically when executed with minimal arguments, which may indicate command and control activity or defense evasion tactics on Windows systems.
Persistence via BITS Job Notify Cmdline
2 rules 1 TTPAdversaries can achieve persistence by abusing the Background Intelligent Transfer Service (BITS) SetNotifyCmdLine method to execute a program after a job finishes, leading to arbitrary code execution and system compromise.
Google Workspace Suspicious Login Activity
3 rules 1 TTPDetect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.
CVE-2026-3229 Integer Overflow in Certificate Chain Allocation
2 rules 1 CVECVE-2026-3229 is an integer overflow vulnerability in certificate chain allocation affecting a Microsoft product, potentially leading to denial of service or arbitrary code execution.
Unusual Executable File Creation by a System Critical Process
2 rules 1 TTPThe rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.
Okta Identity Provider Creation Detected
3 rules 2 TTPsAn adversary may create a rogue identity provider within Okta to establish persistence and potentially escalate privileges by impersonating legitimate users or bypassing multi-factor authentication.
i18next-fs-backend Path Traversal Vulnerability
2 rules 1 TTPi18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.
First Time Seen Account Performing DCSync
2 rules 1 TTPDetection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.
Detecting Rare SMB Connections for Potential NTLM Credential Theft
2 rules 2 TTPsThis brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.
CVE-2026-41445 KissFFT Integer Overflow leads to Heap Buffer Overflow
1 rule 1 TTP 1 CVECVE-2026-41445 is a reported integer overflow vulnerability in the KissFFT library that could lead to a heap buffer overflow.
Unusually High Mean of RDP Session Duration Detected by Machine Learning
3 rules 2 TTPsA machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.
Xerte Online Toolkits Unauthenticated Remote Code Execution via elFinder Connector
2 rules 1 TTP 1 CVEXerte Online Toolkits versions 3.15 and earlier are vulnerable to unauthenticated remote code execution due to a missing authentication check in the elFinder connector, allowing arbitrary file operations that can be chained with other vulnerabilities.
Windows Script Execution from Archive File
2 rules 3 TTPsThis rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.
Unusual Process Performing NewCredentials Logon
2 rules 1 TTPAnomalous NewCredentials logon events triggered by uncommon processes may indicate access token manipulation for privilege escalation.
Unusual Group Name Accessed by User via Privileged Access Detection
2 rules 5 TTPsA machine learning job detected a user accessing an uncommon group name for privileged operations, potentially indicating privilege escalation or unauthorized account manipulation on a Windows system.
Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability
2 rules 1 TTP 1 CVEA cross-site scripting (XSS) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) could allow attackers to execute arbitrary JavaScript within a user's session, potentially leading to unauthorized access to sensitive information.
radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.
Potential Privilege Escalation via SUID/SGID Abuse on Linux
2 rules 3 TTPsThis rule detects potential privilege escalation attempts on Linux systems by identifying processes running with root privileges but initiated by non-root users, indicative of SUID/SGID abuse.
NocoBase SQL Injection via Missing Validation on Update Endpoint
2 rules 1 TTPA SQL injection vulnerability exists in nocobase plugin-collection-sql versions 2.0.32 and earlier due to missing validation on the sqlCollection:update endpoint, allowing attackers with collection management permissions to execute arbitrary SQL queries and exfiltrate data.
Nimiq Node Panic due to Invalid BLS Key
2 rules 3 TTPsAn unauthenticated peer can crash a Nimiq node by sending a malformed election macro block containing an invalid BLS voting key, leading to a denial of service.
Multiple Alerts in Different ATT&CK Tactics by Host
3 rules 3 TTPsThis rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.
Icinga Web Reflected XSS Vulnerability via Malformed Search Requests
2 rules 1 TTPA reflected cross-site scripting (XSS) vulnerability exists in Icinga Web versions 0.13.0 and earlier, allowing attackers to inject malicious JavaScript into a victim's browser through malformed search requests, potentially leading to arbitrary code execution within the Icinga Web context.
First Time Seen Remote Monitoring and Management Tool Execution
3 rulesDetects the execution of previously unseen remote monitoring and management (RMM) tools or remote access software on compromised Windows endpoints, often leveraged for command-and-control, persistence, and execution of malicious commands.
Executable File Creation with Multiple Extensions
2 rules 2 TTPsDetection of executable files created with multiple extensions, a masquerading technique to evade defenses.
engramx vulnerable to CSRF enabling graph exfiltration and prompt injection
2 rules 2 TTPsThe engramx HTTP server, enabled by default and binding to 127.0.0.1:7337, is vulnerable to CSRF and prompt injection attacks, allowing a malicious website to exfiltrate the local knowledge graph and inject persistent prompt-injection payloads.
CVE-2026-31611: ksmbd Sub-Authority Validation Vulnerability
2 rules 1 TTP 1 CVECVE-2026-31611 is a vulnerability in ksmbd, requiring at least three sub-authorities before reading sub_auth[2], potentially leading to unauthorized access or code execution.
CVE-2026-31609 SMB Client Double-Free Vulnerability
2 rules 1 CVECVE-2026-31609 is a critical double-free vulnerability in the SMB client, specifically within the smbd_free_send_io() function after smbd_send_batch_flush(), potentially leading to arbitrary code execution.
Credential Acquisition via Registry Hive Dumping
2 rules 1 TTPDetects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.
CoreDNS TSIG Authentication Bypass Vulnerability
2 rules 1 TTPCoreDNS versions prior to 1.14.3 are vulnerable to TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports, allowing unauthenticated network attackers to bypass authentication and potentially access TSIG-protected zone data or submit dynamic DNS updates.
Azure AD Threat Intelligence Detection
2 rules 1 TTPThis brief focuses on detecting unusual user activity and sign-in patterns flagged by Azure AD Threat Intelligence, which may indicate stealthy attacks, persistence attempts, privilege escalation, or initial access.
UAC Bypass via Windows Firewall MMC Snap-In Hijack
2 rules 2 TTPsAttackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.
Potential Process Injection via PowerShell
2 rules 2 TTPsThis detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.
Multiple Alerts Involving a User Detection
2 rules 3 TTPsThis rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.
Spike in Number of Processes in an RDP Session
2 rules 2 TTPsA machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.
Windows Defender Disabled via Registry Modification
2 rules 3 TTPsAttackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.
Unusual Process Spawned by a Parent Process via Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.
Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection
2 rules 2 TTPsDetection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.
Spoofing AD FS Signing Logs via Azure AD Hybrid Health Service
2 rules 1 TTPA threat actor can create a new, rogue AD Health ADFS service within Azure and then create a fake server instance, which can be leveraged to spoof AD FS signing logs without compromising on-prem AD FS servers.
Renamed Automation Script Interpreter
2 rules 1 TTPDetects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.
Okta User Account Created
2 rules 1 TTPDetection of new user account creation in Okta, which could indicate malicious activity related to credential access.
Okta Security Threat Detected
2 rules 1 TTPThis alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.
Okta Admin Role Assignment Creation
2 rules 1 TTPDetection of new admin role assignments in Okta, potentially indicating privilege escalation or persistence attempts by malicious actors.
ksmbd Out-of-Bounds Write Vulnerability in QUERY_INFO (CVE-2026-31432)
2 rules 1 CVECVE-2026-31432 is a critical out-of-bounds write vulnerability in ksmbd, specifically within the QUERY_INFO functionality when handling compound requests, potentially leading to code execution or denial of service.
GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks
2 rules 1 TTP 1 CVEA vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.
Curl or Wget Execution from Container Context
2 rules 2 TTPsThis rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.
BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.
Azure Authentication Method Change Detection
2 rules 3 TTPsAn attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.
AWS CloudTrail Logging Disabled or Modified
3 rules 1 TTPDetection of AWS CloudTrail being disabled, deleted, or updated by an adversary to impair defenses and evade detection.
Qualcomm Camera Sensor Memory Corruption Vulnerability
2 rules 1 CVECVE-2025-47405 is a memory corruption vulnerability in Qualcomm products related to processing camera sensor input/output control codes with invalid output buffers, potentially leading to arbitrary code execution.
AWS KMS Key Policy Updated via PutKeyPolicy
2 rules 2 TTPsDetection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.
CVE-2026-34293: Unspecified Vulnerability in Microsoft Product
2 rules 1 CVECVE-2026-34293 is an unspecified vulnerability affecting a Microsoft product, for which details are currently unavailable, posing a potential risk to affected systems.
Unusual Remote File Directory Lateral Movement Detection
2 rules 2 TTPsAn Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.
Suspicious WMIC XSL Script Execution
2 rules 3 TTPsThis rule detects suspicious execution of scripts via WMIC, potentially used for allowlist bypass, by identifying WMIC executions with atypical arguments and the loading of specific libraries like jscript.dll or vbscript.dll for defense evasion and execution.
ProblemChild ML Detection of Suspicious Windows Processes
2 rules 2 TTPsThe ProblemChild machine learning model has detected a user with suspicious Windows processes exhibiting unusually high malicious probability scores, potentially indicating defense evasion via masquerading or LOLbins.
Potential Ransomware Behavior - Note Files Dropped via SMB
2 rules 4 TTPsThis rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.
CVE-2026-31613 SMB Client Out-of-Bounds Read Vulnerability
2 rules 1 TTP 1 CVECVE-2026-31613 is an out-of-bounds read vulnerability in the SMB client when parsing symlink error responses, requiring patching to prevent potential information disclosure or denial-of-service.
Azure Privileged Identity Management (PIM) Invalid License Detection
2 rules 1 TTPDetection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).
Admidio Inverted 2FA Reset Allows Privilege Escalation
2 rules 2 TTPsA logic error in Admidio's two-factor authentication reset inverts the authorization check, allowing non-admin users to remove other users' TOTP, including administrators, reducing their security to password-only authentication in versions 5.0.8 and earlier.
Detection of Sensitive LDAP Attribute Access
2 rules 5 TTPsThis rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.
Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)
2 rules 1 TTP 1 CVECisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.
NetExec File Creation Detection
2 rules 3 TTPsThis brief covers the detection of NetExec, a post-exploitation and lateral movement tool, through monitoring for unique file creation patterns associated with its execution and file extraction in Windows environments.
Okta End-User Reports Suspicious Account Activity
2 rules 1 TTPAn Okta end-user reports potentially suspicious activity on their account, indicating possible compromise or unauthorized access.
Detect Suspicious Windows Service Installation
2 rules 1 TTPThis detection identifies the creation of new Windows services with suspicious command values, often used for privilege escalation and persistence by malicious actors.
NLTEST.EXE Used for Domain Trust Discovery
2 rules 2 TTPsAdversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.
Windows Sandbox Abuse with Sensitive Configuration
3 rules 1 TTPThis rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.
PowerShell Kerberos Ticket Request via KerberosRequestorSecurityToken
2 rules 1 TTPThis rule detects PowerShell scripts that request Kerberos service tickets using KerberosRequestorSecurityToken, potentially indicating Kerberoasting attacks for offline password cracking of service accounts.
PhpSpreadsheet XML Reader Denial of Service via Unbounded Row Index
2 rules 1 TTPPhpSpreadsheet is vulnerable to a denial-of-service attack by crafting a SpreadsheetML XML file with an excessively large row index, which exhausts server CPU resources due to unbounded iteration.
Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation
2 rules 4 TTPs 5 IOCsAdversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.
Azure Kubernetes Events Deleted
2 rules 1 TTPAdversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.
Uncommon Destination Port Connection by Web Server on Linux
2 rules 4 TTPsThe rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.
Detecting External RPC Traffic for Initial Access
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.
Microsoft Build Engine Started by an Office Application
2 rules 1 TTPThe Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.
Potential Antimalware Scan Interface Bypass via PowerShell
3 rules 1 TTPThis rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.
Unauthorized Removal of Azure Conditional Access Policy
2 rules 3 TTPsAn unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.
Successful AWS Console Login Without MFA
2 rules 1 TTPSuccessful AWS console logins without multi-factor authentication can indicate compromised credentials, misconfigured security settings, or unauthorized access attempts.
PowerShell Share Enumeration via ShareFinder or Native APIs
2 rules 1 TTPDetection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.
Potential DGA Activity Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected potential DGA (domain generation algorithm) activity indicative of malware command and control (C2) channels, identifying source IP addresses making DNS requests with a high probability of being DGA-generated, a technique used by adversaries to evade detection.
Azure AD Activity From Anonymous IP Address
2 rules 4 TTPsDetection of user activity originating from an IP address identified as an anonymous proxy, potentially indicating unauthorized access, privilege escalation, or persistence within an Azure Active Directory environment.
Linux Service Stop and Disable Detection
3 rules 2 TTPsAttackers may halt or disable security services on Linux systems to evade defenses, maintain persistence, or disrupt operations, detected through the use of utilities like 'systemctl', 'service', and 'chkconfig'.
PowerShell Invoke-NinjaCopy Script Detection
2 rules 1 TTPThe Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.
Windows EventLog Autologger Session Disabled via Registry Modification
2 rules 1 TTPAdversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.
Potential Local NTLM Relay via HTTP
2 rules 1 TTPAdversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.
Multiple Logon Failure Followed by Logon Success
2 rules 1 TTPThis rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.
Account Discovery Command via SYSTEM Account
3 rules 3 TTPsThe rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.
Suspicious WMI Image Load from MS Office
2 rules 1 TTPAdversaries may exploit Windows Management Instrumentation (WMI) to execute code stealthily, bypassing traditional security measures by loading `wmiutils.dll` from Microsoft Office applications, potentially indicating malicious execution.
Suspicious LSASS Access via Malicious Secondary Logon Service
3 rules 1 TTPAn attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.
rustls-webpki Denial-of-Service Vulnerability via Malformed CRL BIT STRING
2 rules 1 TTPA denial-of-service vulnerability exists in rustls-webpki versions prior to 0.103.13 and between 0.104.0-alpha.1 and 0.104.0-alpha.7 due to a panic in `bit_string_flags()` when processing a malformed CRL BIT STRING, triggered when CRL checking is enabled and an attacker provides a crafted CRL.
Persistence via Scheduled Job Creation
2 rules 1 TTPThis detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.
OpenClaw MCP Loopback Token Spoofing Vulnerability
2 rules 1 TTPA vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.
Okta Group Lifecycle Change Spike Indicating Privilege Escalation
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta group lifecycle change events, indicating potential privilege escalation activity, where adversaries may be altering group structures to escalate privileges, maintain persistence, or facilitate lateral movement within an organization’s identity management system.
MSBuild Making Network Connections Indicating Potential Defense Evasion
2 rules 2 TTPsMsBuild.exe making outbound network connections may indicate adversarial activity as attackers leverage MsBuild to execute code and evade detection.
LSASS Process Access via Windows API
2 rules 2 TTPsDetection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.
liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)
2 rules 1 TTP 1 CVEA SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.
Linux Log Clearing Attempts via Common Utilities
3 rules 1 TTPAdversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.
Contour HTTPProxy Lua Code Injection via Cookie Path Rewrite
2 rules 3 TTPsContour's Cookie Rewriting feature is vulnerable to Lua code injection; an attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in the `spec.routes[].cookieRewritePolicies[].pathRewrite.value` or `spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value` fields, resulting in arbitrary code execution in the Envoy proxy.
Unusual Source IP for Okta Privileged Operations Detected
2 rules 3 TTPsA machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.
Suspicious WerFault Child Process Abuse
2 rules 3 TTPsThis rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.
PowerShell Script Block Logging Disabled via Registry Modification
2 rules 2 TTPsAttackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.
Potential Timestomping of Executable Files on Windows
2 rules 1 TTPThis rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.
Potential LSASS Clone Creation via PssCaptureSnapShot
2 rules 1 TTPDetection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.
MSBuild Making Network Connections
2 rules 2 TTPsDetection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.
Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.
IIS AppCmd Tool Used to Dump Service Account Credentials
2 rules 2 TTPsAttackers with access to IIS web servers may use the AppCmd command-line tool to dump sensitive configuration data, including application pool credentials, potentially leading to lateral movement and privilege escalation.
GitPython Command Injection Vulnerability
2 rules 1 TTPGitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.
Evolver Remote Code Execution via Command Injection in `_extractLLM()`
2 rules 1 TTPA command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.
Disabling Windows Defender Security Settings via PowerShell
2 rules 2 TTPsAttackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.
Detection of Custom Shim Database Installation for Persistence
2 rules 1 TTPAttackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.
Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)
2 rules 1 TTPAdversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.
CoreDNS DoH GET Query Denial-of-Service
2 rules 1 TTPCoreDNS is vulnerable to a denial-of-service attack where processing oversized DNS-over-HTTPS GET requests exhausts resources prior to returning an error.
rust-openssl Deriver::derive and PkeyCtxRef::derive Buffer Overflow Vulnerability (CVE-2026-41676)
2 rules 1 CVECVE-2026-41676 is a buffer overflow vulnerability in rust-openssl's Deriver::derive and PkeyCtxRef::derive functions when used with OpenSSL 1.1.1, potentially leading to denial of service or arbitrary code execution.
Royal Elementor Addons Plugin SSRF Vulnerability
2 rules 1 TTP 1 CVEThe Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.
Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment
2 rules 3 TTPs 1 CVEExploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.
Suspicious PDF Reader Child Process Activity
2 rules 13 TTPsAdversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.
Detection of Downloaded URL Files Used in Phishing Campaigns
2 rules 3 TTPsThis detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.
Detection of Wevtutil.exe Used to Disable Event Logs
2 rules 1 TTPThe execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.
GitHub Repository Archive Status Changed
2 rules 3 TTPsDetection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.
Unusual Service Host Child Process - Childless Service
2 rules 2 TTPsThis detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.
UAC Bypass via DiskCleanup Scheduled Task Hijack
2 rules 3 TTPsAttackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.
Process Execution from Suspicious Windows Directories
2 rules 1 TTPAdversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.
Persistence via Malicious Microsoft Outlook VBA Template
2 rules 1 TTPAttackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.
Kubernetes Sensitive Role Creation or Modification
2 rules 2 TTPsDetects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs, potentially leading to privilege escalation or unauthorized access within the cluster.
Detection of Command and Control Activity via Commonly Abused Web Services
2 rules 2 TTPsThis rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.
DCOM Lateral Movement via ShellWindows/ShellBrowserWindow
2 rules 2 TTPsThis analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.
Abuse of Windows Update Client for DLL Loading
2 rules 3 TTPsThe Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.
Disable Windows Event and Security Logs Using Built-in Tools
3 rules 3 TTPsAttackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.
Incoming Execution via PowerShell Remoting
2 rules 2 TTPsThis rule identifies remote execution via Windows PowerShell remoting, which allows a user to run any Windows PowerShell command on one or more remote computers, potentially indicating lateral movement.
Unusual Time or Day for an RDP Session Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.
Azure PIM Account Stale Sign-in Alert
2 rules 1 TTPDetection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.
Okta Session Hijacking via Multiple Device Token Hashes
2 rules 2 TTPsDetection of multiple device token hashes and source IPs for a single Okta session, indicating potential session hijacking and unauthorized access to Okta resources.
Process Activity via Compiled HTML File Execution
2 rules 5 TTPsAdversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.
Azure Firewall Modification or Deletion Detected
2 rules 1 TTPAn Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.
Azure AD Bitlocker Key Retrieval
2 rules 3 TTPsAn adversary with sufficient privileges in Azure Active Directory may attempt to retrieve BitLocker keys to decrypt drives for lateral movement or data exfiltration.
Azure PIM Elevation Approved or Denied
2 rules 3 TTPsDetection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.
Azure AD User Added to Global or Device Admin Role
2 rules 3 TTPsAn attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.
WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)
2 rules 1 TTP 1 CVEThe Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.
PowerShell P/Invoke Process Injection API Chain Detection
2 rules 8 TTPsThis analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.
Kubernetes RBAC Wildcard Elevation on Existing Role
2 rules 1 TTPThe rule detects when a Kubernetes Role or ClusterRole is patched or updated to grant wildcard verbs and resources, effectively granting cluster-admin-like privileges, which is often a deliberate privilege expansion and could indicate malicious activity.
Cisco 802.1X (dot1x) Disabled on Network Interface
2 rules 2 TTPsDetection of manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface, potentially allowing unauthorized network access and lateral movement.
Azure PIM Role Activation Without MFA
2 rules 1 TTPDetection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.
Detection of Downloaded Shortcut Files
2 rules 3 TTPsThis rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.
Suspicious AWS SAML Activity Detection
2 rules 3 TTPsThis rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.
User Added to Group with Conditional Access Policy Modification Access
3 rules 4 TTPsAn attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.
Kubernetes Secret Access by Node or Pod Service Account
2 rules 1 TTPThis rule detects Kubernetes audit events where a node or pod service account attempts to read secrets directly, which is often a sign of credential access.
Symbolic Link Creation to Shadow Copies for Credential Access
2 rules 3 TTPsAdversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.
Outlook Security Settings Registry Modification
2 rules 1 TTPAttackers modify Outlook security settings via registry changes to enable malicious mail rules and bypass security controls, potentially leading to persistence and data compromise.
InstallUtil Process Making Network Connections for Defense Evasion
2 rules 1 TTPDetection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.
Browser Process Spawned from an Unusual Parent
2 rules 1 TTPAttackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.
Third-party Backup Files Deleted via Unexpected Process
2 rules 2 TTPsThis detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.
Azure Network Firewall Policy Modification or Deletion
3 rulesAn adversary may modify or delete Azure Network Firewall Policies to impair defenses and potentially impact network security.
Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)
2 rules 1 TTP 1 CVETenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.
Suspicious Windows Process Cluster Detection via Machine Learning
2 rules 2 TTPsA machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.
Suspicious PowerShell Script Using Cryptography Namespace
2 rules 1 TTPThe analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.
Suspicious Execution via Scheduled Task
2 rules 2 TTPsThis rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.
PowerShell Suspicious Payload Encoded and Compressed
2 rules 1 TTPDetects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.
itsourcecode Electronic Judging System SQL Injection Vulnerability (CVE-2026-7555)
2 rules 1 TTP 1 CVEA remote SQL injection vulnerability (CVE-2026-7555) exists in itsourcecode Electronic Judging System 1.0 via manipulation of the Username argument in the /intrams/login.php file, potentially leading to unauthorized data access and modification.
AWS GuardDuty Detector Deletion or Disablement
3 rulesAttackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.
Potential Credential Access via LSASS Handle Duplication
2 rules 1 TTPDetection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.
Detect Application AppID URI Configuration Changes in Azure
2 rules 2 TTPsDetection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.
SeEnableDelegationPrivilege Assignment Detection
3 rules 2 TTPsDetection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.
Windows Account Discovery of Administrator Accounts
2 rules 4 TTPsAdversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.
Network Connection via Compiled HTML File
2 rules 3 TTPsThis rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.
Mimikatz MemSSP Log File Detection
2 rules 1 TTP 1 IOCThis rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.
Long Base64 Encoded Command via Scripting Interpreter
2 rules 5 TTPsDetection of oversized command lines used by Python, PowerShell, Node.js, or Deno interpreters containing base64 decoding or encoded-command patterns, indicating potential evasion and malicious execution.
Windows Subsystem for Linux Distribution Installed via Registry Modification
2 rules 3 TTPsThis rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.
Spike in Bytes Sent to an External Device via Airdrop
2 rules 1 TTPA machine learning job has detected a spike in bytes of data written to an external device via Airdrop, potentially indicating illicit data copying or transfer activities.
MSBuild запускает необычные процессы
2 rules 3 TTPsAdversaries may exploit MSBuild to execute malicious scripts or compile code, bypassing security controls; this rule detects unusual processes initiated by MSBuild, such as PowerShell or C# compiler, signaling potential misuse for executing unauthorized or harmful actions.
Malicious Azure Kubernetes Admission Controller Configuration
2 rules 4 TTPsAn adversary can exploit Kubernetes Admission Controllers in Azure to achieve persistence, privilege escalation, or credential access by manipulating webhook configurations.
High Command Line Entropy Detected for Privileged Commands on Linux
2 rules 2 TTPsA machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.
Detection of Invoke-Obfuscation via Standard Input
2 rules 2 TTPsThis brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.
Detection of Bcdedit Boot Configuration Modification
2 rules 1 TTPThis rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.
Azure AD Temporary Access Pass Added to Account
2 rules 4 TTPsDetection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.
Azure AD Authentication to Important Apps Using Single-Factor Authentication
2 rules 3 TTPsDetection of successful Azure AD authentications to critical applications that only required single-factor authentication, potentially indicating a security lapse or policy violation leading to unauthorized access.
Adversaries Disabling Important Scheduled Tasks
2 rules 1 TTPAdversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.
Detection of Azure Application Deletion
2 rules 1 TTPThis alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.
Remote File Download via PowerShell
2 rules 2 TTPsDetects PowerShell being used to download executable files from untrusted remote destinations, a common technique for attackers to introduce tooling or malware into a compromised environment.
Non-Firefox Process Accessing Firefox Profile Directory
2 rules 1 TTPThis analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.
Windows Time-Based Evasion via Choice Exec
2 rules 1 TTPDetection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.
Windows Service Security Descriptor Tampering via sc.exe
2 rules 2 TTPsAdversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.
Windows Backup Deletion via Wbadmin
2 rules 2 TTPsAdversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.
Unusual Remote File Extension Detected via Machine Learning
2 rules 2 TTPsAn Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.
Unusual Network Activity from Windows System Binaries
3 rules 5 TTPsDetection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.
Suspicious Process Access via Direct System Call
2 rules 3 TTPsDetects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.
Suspicious MSIExec Remote Download
2 rules 2 TTPsThe analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.
Suspicious Modification of Sensitive Linux Files
3 rules 1 TTPThis threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.
Suspicious Enumeration Commands Spawned via WMIPrvSE
2 rules 12 TTPsThis rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.
Suspicious Child Processes Spawned by WScript or CScript
2 rules 3 TTPsDetects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.
Suspicious Antimalware Scan Interface DLL Creation
2 rules 1 TTPAn adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.
Spike in Special Privilege Use Events
2 rules 4 TTPsA machine learning job detected an unusual increase in special privilege usage events on Windows, such as privileged operations and service calls, potentially indicating unauthorized privileged access and privilege escalation attempts.
SourceCodester Hotel Management System SQL Injection Vulnerability
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.
Script Execution via Microsoft HTML Application
3 rules 1 TTPDetects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.
PowerShell Obfuscation via Concatenated Dynamic Command Invocation
2 rules 1 TTPThis rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.
Potential Remote Credential Access via Registry
2 rules 2 TTPsDetects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.
Potential NTLM Relay Attack against a Computer Account
2 rulesThis rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.
Okta Alerts Following Unusual Proxy Authentication
2 rules 1 TTPAttackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.
Nsenter to PID Namespace via Auditd
2 rules 1 TTPThis rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.
Machine Learning Detects High Bytes Written to External Device
2 rules 1 TTPA machine learning job has detected high bytes of data written to an external device, potentially indicating illicit data copying or transfer activities leading to data exfiltration over a physical medium such as USB.
Execution of Persistent Suspicious Programs via Run Keys
2 rules 8 TTPsThis analytic identifies suspicious programs such as script interpreters, rundll32, or MSBuild being executed shortly after user logon, indicating potential persistence mechanisms abusing the registry run keys.
Detection of Command and Control Activity via Common Web Services
2 rules 1 TTPThis rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.
Detection of Azure Subscription Permission Elevation
2 rules 1 TTPDetection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.
Conhost Proxy Execution for Defense Evasion
3 rules 1 TTPAdversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.
Azure AD User Password Reset Detection
2 rules 1 TTPDetects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.
Azure AD Guest to Member User Type Conversion
2 rules 1 TTPAn adversary may convert a guest user account to a member account in Azure Active Directory to elevate privileges and gain persistent access to resources.
AWS SES Identity Deletion
2 rules 1 TTPDetection of an AWS Simple Email Service (SES) identity deletion event, potentially indicating an adversary attempting to cover their tracks after malicious activity.
AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity
2 rules 4 TTPsThis rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.
Attrib.exe Used to Hide Files and Directories
2 rules 1 TTPDetection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.
Potential Shadow Credentials added to AD Object
2 rules 2 TTPsThis rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.
Detection of NetExec Hacktool Execution
2 rules 2 TTPsThe threat brief details the detection of NetExec (formerly CrackMapExec), a post-exploitation tool used for Active Directory penetration testing and network enumeration, often employed by threat actors for lateral movement and credential harvesting.
WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)
2 rules 1 TTP 1 CVEAn unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.
Windows Firewall Disabled via Netsh
2 rules 1 TTPDetection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.
Unusual Process Loading Mozilla NSS/Mozglue Module
2 rules 1 TTPDetection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.
System Restore Disabled via Registry Modification
1 rule 1 TTPAttackers may attempt to disable system restore via registry modifications through the command line to prevent recovery after malicious activity.
Suspicious Scripts in the Startup Directory
2 rules 2 TTPsThis rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.
Suspicious Script Interpreter Execution from Environment Variable Folders
2 rules 1 TTPMalware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.
Suspicious PowerShell Execution via Windows Script Host
2 rules 4 TTPsDetection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.
RDP (Remote Desktop Protocol) from the Internet
2 rules 3 TTPs 1 CVEThis rule detects network events indicative of RDP traffic originating from the internet, which poses a significant security risk due to its frequent exploitation as an initial access or backdoor vector.
Nginx-UI SSRF Vulnerability via Cluster Node Proxy
2 rules 1 TTP 1 IOCNginx-UI version 2.3.4 and earlier is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users to access internal services by manipulating cluster node configurations.
Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting
3 rules 2 TTPsThis rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.
MSIExec Spawning Discovery Commands
2 rules 1 TTPDetection of msiexec.exe spawning discovery commands indicating potential reconnaissance activity by attackers for system information gathering and lateral movement.
Linux Cron File Creation for Persistence
2 rules 1 TTPAn attacker may create new cron files in cron directories to establish persistence on a Linux system, potentially leading to privilege escalation and arbitrary code execution.
Invoke-Obfuscation via Clip.exe
2 rules 2 TTPsThe use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.
GitHub Self-Hosted Runner Configuration Changes Detected
3 rules 8 TTPsDetection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.
Excessive Global Administrator Accounts in Azure PIM
2 rules 3 TTPsDetection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.
Detection of Python One-Liners with Base64 Decoding
2 rules 2 TTPsThis brief outlines a method to detect malicious use of Python one-liners employing base64 decoding to execute obfuscated payloads, a common tactic for evading traditional security measures.
Detection of Privileged Identity Management (PIM) Settings Modifications
2 rules 4 TTPsDetects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.
Detection of Azure Service Principal Creation
3 rules 1 TTPDetects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.
Azure AD Successful Authentication Increase
2 rules 1 TTPThis detection identifies a statistically significant (10% or greater) increase in successful sign-ins to Azure Active Directory, potentially indicating credential compromise or account takeover attempts.
Azure AD Hybrid Health AD FS Service Deletion for Defense Evasion
2 rules 1 TTPThreat actors may delete Azure AD Hybrid Health AD FS service instances after using them to spoof AD FS signing logs for defense evasion.
AWS SecurityHub Findings Evasion via API Calls
3 rules 2 TTPsAttackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.
AWS Identity Center Identity Provider Modification
2 rules 1 TTPAn adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.
AWS IAM User or Access Key Creation via S3 Browser
2 rules 2 TTPsThe use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.
Detecting RPC Traffic to the Internet
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.
Azure Service Principal Removal Detection
2 rules 1 TTPDetection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.
Proxy Execution via Windows OpenSSH Client
2 rulesDetection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.
Kubernetes Multi-Resource Discovery Reconnaissance
2 rules 1 TTPAdversaries may perform reconnaissance in a Kubernetes environment by rapidly querying multiple resource types to map the environment and identify potential privilege escalation paths.
Azure Application URI Configuration Modification
3 rules 4 TTPsDetection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.
Windows User Account Creation via Net.exe
2 rules 2 TTPsThis rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.
Unusual Network Connection via DllHost
2 rules 2 TTPsThe rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.
Unsigned DLL Side-Loading from Suspicious Folders by Trusted Processes
2 rules 2 TTPsThis detection identifies a Windows trusted program running from locations often abused by adversaries to masquerade as a trusted program and loading a recently dropped unsigned DLL, which indicates an attempt to evade defenses via side-loading a malicious DLL within the memory space of a signed process.
Suspicious Process Writing to Startup Folder for Persistence
2 rules 1 TTPAdversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.
Suspicious PowerShell Engine ImageLoad
2 rules 1 TTPThis rule identifies instances where the PowerShell engine is loaded by processes other than powershell.exe, potentially indicating attackers attempting to use PowerShell functionality stealthily by using the underlying System.Management.Automation namespace and bypassing PowerShell security features.
Suspicious MSBuild Execution from Scripting Processes
2 rules 6 TTPsAdversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.
Suspicious Execution via Microsoft Office Add-Ins
3 rules 3 TTPsThis rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.
Suspicious Execution from a Mounted Device
2 rules 9 TTPsAttackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.
Suspicious CertUtil Commands Used for Defense Evasion
2 rules 3 TTPsAttackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.
Remote Execution via File Shares
2 rules 2 TTPsThis rule identifies the execution of a file that was created by the virtual system process, potentially indicating lateral movement via network file shares in Windows environments.
Remote Execution via File Shares
2 rules 2 TTPsThe rule identifies the execution of a file created by the virtual system process, potentially indicating lateral movement via network file shares, by detecting a sequence of file creation/modification followed by process execution, excluding trusted vendors.
Potential RemoteMonologue Attack via Registry Modification
2 rules 4 TTPsThis rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.
Potential Defense Evasion via Filter Manager (fltMC.exe)
2 rules 1 TTPAdversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.
MSBuild Process Injection Detection
2 rules 3 TTPsThe Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.
Execution from Unusual Directory - Command Line
2 rules 2 TTPsThis rule identifies process execution from suspicious default Windows directories, which adversaries may abuse to hide malware in trusted paths to evade defenses.
Detecting Remote Windows Service Installation for Lateral Movement
2 rules 3 TTPsThis rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.
xmldom XML Injection Vulnerability
2 rules 1 TTPThe xmldom package is vulnerable to XML injection. The package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. To address this applications that pass untrusted data to createDocumentType() or write untrusted values directly to a DocumentType node's publicId, systemId, or internalSubset properties should audit all serializeToString() call sites and add the option.
Xerte Online Toolkits Path Traversal Vulnerability
2 rules 2 TTPs 1 CVEXerte Online Toolkits 3.15 and earlier are vulnerable to relative path traversal, allowing attackers to move files and potentially achieve remote code execution.
WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106
2 rules 1 TTP 1 CVEHighland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.
WMI Incoming Lateral Movement
3 rules 2 TTPsDetection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.
Windows USN Journal Deletion via Fsutil
2 rules 1 TTPAdversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.
Windows System Restore Disabled via Registry Modification
2 rules 1 TTPAttackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.
Windows Subsystem for Linux Enabled via Dism Utility
2 rules 1 TTPAdversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.
Windows Script Interpreter Executing Process via WMI
2 rules 4 TTPsThe rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.
Windows Scheduled Tasks AT Command Enabled via Registry Modification
2 rules 2 TTPsAttackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.
Windows Root Certificate Modification Detection
2 rules 2 TTPsThe modification of root certificates on Windows systems by unauthorized processes can allow attackers to masquerade malicious files as valid signed components and intercept/decrypt SSL traffic, leading to defense evasion and data collection.
Windows Remote Desktop Network Bruteforce Attempt
2 rules 1 TTPThis detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.
Windows Netsh Tool Used for Firewall Discovery
2 rules 1 TTPThe analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.
Windows Host Network Discovery Enabled via Netsh
2 rules 1 TTPAttackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.
Windows Firewall Disabled via PowerShell
2 rules 2 TTPsAttackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.
Windows Files and Dirs Access Rights Modification via Icacls
2 rules 1 TTPDetection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.
Windows Defender Exclusions Added via PowerShell
2 rules 3 TTPsAdversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.
Werfault ReflectDebugger Persistence via Registry Modification
2 rules 2 TTPsAttackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.
WebPros cPanel & WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)
2 rules 1 TTP 1 CVECVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel & WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability
2 rules 2 TTPs 1 CVEWeaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.
VM2 Sandbox Escape via __lookupGetter__ Vulnerability
3 rules 2 TTPsVM2 is vulnerable to a sandbox breakout via the `__lookupGetter__` method, enabling attackers to execute arbitrary commands on the host system by exploiting context switching and property descriptor manipulation, leading to remote code execution.
User Removed from Group with Conditional Access Policy Modification Access
2 rules 3 TTPsAn attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.
User Added to Privileged Group in Active Directory
2 rules 1 TTPAdversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.
Unusual Windows Processes Connecting to Domains Using Free SSL Certificates
2 rules 1 TTP 4 IOCsThis rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.
Unusual System Utilities Initiating Network Connections
2 rules 3 TTPsAdversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.
Unusual Scheduled Task Update
2 rules 1 TTPThis rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.
Unusual Process Connecting to Docker or Containerd Socket
2 rules 3 TTPsAn unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.
Unusual Persistence via Services Registry Modification
2 rules 3 TTPsDetection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.
Unusual Parent Process for cmd.exe
2 rules 1 TTPThe detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.
Unused Privileged Identity Management (PIM) Roles in Azure
2 rules 1 TTPDetection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.
Unsecured Outlook Credentials Access in Windows Registry
2 rules 1 TTPAn attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.
Uncommon Registry Persistence Change Detection
2 rules 2 TTPsThis rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.
Unauthorized Guest User Invitation Attempt in Azure
2 rules 1 TTPDetection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.
Unauthorized Conditional Access Policy Creation in Azure AD
2 rules 1 TTPAn unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.
Unauthorized Access to Chrome Local State File
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.
UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer
2 rules 3 TTPsThis threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.
Totolink A8000RU OS Command Injection Vulnerability
2 rules 1 TTP 1 CVEA remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.
Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.
Suspicious Whoami Process Activity
2 rules 2 TTPsThis rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.
Suspicious Use of sc.exe for Remote Service Manipulation
3 rules 3 TTPsThe rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.
Suspicious SUID Binary Execution on Linux
3 rules 2 TTPsThis rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.
Suspicious SolarWinds Child Process Execution
2 rules 2 TTPsDetection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.
Suspicious SMB Connections via LOLBin or Untrusted Process
3 rules 1 TTPThis rule identifies potentially suspicious processes, excluding those signed by Microsoft, making Server Message Block (SMB) network connections over port 445, which could indicate lateral movement attempts.
Suspicious Script Object Execution via scrobj.dll
2 rules 2 TTPsDetection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.
Suspicious Script Interpreter Execution from Environment Variable Folders
2 rules 1 TTPAdversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.
Suspicious Process Execution from Unusual File Paths
2 rules 2 TTPsAttackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.
Suspicious Process Accessing Sensitive Identity Files via Auditd
3 rules 2 TTPsThis rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.
Suspicious Network Connection via Registration Utility
2 rules 4 TTPsThe native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.
Suspicious MS Office Child Process
2 rules 18 TTPsDetects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.
Suspicious Mofcomp Activity
2 rules 2 TTPsThis rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.
Suspicious Modifications to Windows Security Support Provider (SSP) Registry
2 rules 2 TTPsAdversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.
Suspicious Microsoft Antimalware Service Executable Execution
3 rules 1 TTPDetects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.
Suspicious LSASS Process Access
3 rules 1 TTPThis rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.
Suspicious Image Load (taskschd.dll) from MS Office
2 rules 2 TTPsDetection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.
Suspicious HTML File Creation Leading to Potential Payload Delivery
3 rules 3 TTPsThis detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.
Suspicious Execution via Windows Subsystem for Linux
2 rules 3 TTPsAdversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.
Suspicious Execution from VS Code Extension
2 rules 9 TTPsMalicious VS Code extensions can execute arbitrary commands, leading to initial access and subsequent payload deployment on Windows systems.
Suspicious Endpoint Security Parent Process Detected
2 rules 2 TTPsThis rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.
Suspicious Dynamic .NET Compilation via Csc.exe
2 rules 1 TTPAttackers may use csc.exe to compile .NET code on the fly to evade detection, often placing the compiler and source code in suspicious locations, which can be detected by monitoring process creation events.
Suspicious DNS Queries to RMM Domains from Non-Browser Processes
2 rulesDetection of DNS queries to remote monitoring and management (RMM) domains from non-browser processes indicating potential misuse of legitimate remote access tools for command and control.
Suspicious Copy from or to System Directory
3 rules 1 TTPThis threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.
Suspicious AWS STS GetSessionToken Usage
2 rules 2 TTPsThe AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.
Suspicious AWS EC2 Key Pair Creation from Non-Cloud AS
2 rules 3 TTPsAn AWS EC2 CreateKeyPair event triggered by a new principal originating from a network autonomous system (AS) organization not associated with major cloud providers, indicating potential unauthorized access or persistence activity.
Startup or Run Key Registry Modification
3 rules 2 TTPsAttackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.
SolarWinds Process Disabling Services via Registry Modification
2 rules 3 TTPsA SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.
Signed Proxy Execution via MS Work Folders
2 rules 3 TTPsAttackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.
Signal K Server WebSocket Login Brute-Force Vulnerability
1 rule 1 TTPThe Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.
Service Startup Type Modification via WMIC
2 rules 2 TTPsAdversaries use the Windows Management Instrumentation Command-line (WMIC) utility to modify the startup type of services, setting them to 'Manual' or 'Disabled' to impair defenses or disrupt system operations.
Server-Side Request Forgery in mcp-data-vis
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in AlejandroArciniegas' mcp-data-vis due to improper handling of HTTP requests, potentially allowing remote attackers to make arbitrary requests through the vulnerable server.
SeDebugPrivilege Enabled by a Suspicious Process
2 rules 1 TTPThe rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.
Schtasks Run Task On Demand
2 rules 1 TTPDetection of on-demand execution of Windows Scheduled Tasks via the schtasks.exe command-line utility, a common technique for persistence and lateral movement.
Scheduled Task Creation via Scripting
3 rules 3 TTPsDetection of scheduled task creation by Windows scripting engines like cscript.exe, wscript.exe, or powershell.exe, used by adversaries to establish persistence on compromised systems.
rust-openssl Stack Buffer Overflow Vulnerability
2 rulesThe rust-openssl crate is vulnerable to a stack-based buffer overflow (CVE-2026-41681) where the `EVP_DigestFinal()` function writes beyond the allocated buffer, potentially corrupting the stack, affecting versions >= 0.10.39 and < 0.10.78.
RMM Domain DNS Queries from Non-Browser Processes
2 rules 75 IOCsDetects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.
Renamed Utility Executed with Short Program Name
2 rules 1 TTPThis rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.
Remote Scheduled Task Creation via RPC
2 rules 2 TTPsThe creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.
Remote Management Access Launch After MSI Install
2 rulesDetects an MSI installer execution followed by the execution of commonly abused Remote Management Software like ScreenConnect, potentially indicating abuse where an attacker triggers an MSI install then connects via a guest link with a known session key.
Remote File Download via Desktopimgdownldr Utility
3 rules 1 TTPThe desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.
Remote File Copy to a Hidden Share
2 rules 3 TTPsThis rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.
Registry Persistence via AppInit DLL Modification
2 rules 2 TTPsModification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.
Registry Persistence via AppCert DLL Modification
2 rules 2 TTPsDetection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.
RDP Enabled via Registry Modification
2 rules 2 TTPsAn adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.
Rare Connection to WebDAV Target via Rundll32
2 rules 2 TTPsThis rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.
pyp2spec Code Injection Vulnerability
3 rules 1 TTPpyp2spec before 0.14.1 is vulnerable to code injection by writing PyPI package metadata into generated spec files without escaping RPM macro directives, allowing malicious packages to execute arbitrary commands on the build machine.
pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber
2 rules 1 TTPpygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.
pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider
2 rules 1 TTPA path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.
PsExec Lateral Movement via Network Connection
2 rules 3 TTPsThe rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.
Process Created with a Duplicated Token
2 rules 2 TTPsThis rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.
Privileged Identity Management (PIM) Alerting Disabled
2 rules 1 TTPAn adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.
Print.exe Used to Dump Sensitive Files for Credential Access
2 rules 2 TTPsAttackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.
PowerShell Token Obfuscation via Process Creation
3 rules 1 TTPAdversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.
PowerShell Script with Encryption/Decryption Capabilities
2 rules 3 TTPsPowerShell scripts employing .NET cryptography APIs are used to encrypt data for impact or decrypt payloads for defense evasion.
PowerShell P/Invoke API Chain for Process Injection
3 rules 7 TTPsThis brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.
PowerShell Obfuscation via String Concatenation
2 rules 1 TTPThis rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.
PowerShell Obfuscation via Character Array Reconstruction
2 rules 1 TTPDetects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.
PowerShell MiniDump Script Detection
2 rules 1 TTPThis brief detects PowerShell scripts that reference MiniDumpWriteDump or full-memory minidump types, potentially used to capture process memory from credential-bearing processes like LSASS.
Potential Windows Error Manager Masquerading
2 rules 1 TTPAdversaries may masquerade malicious processes as legitimate Windows Error Reporting processes (WerFault.exe or Wermgr.exe) to evade detection by establishing network connections without arguments, thus blending into normal system activity.
Potential PowerShell Obfuscation via Special Character Overuse
2 rules 3 TTPsThis rule detects PowerShell scripts heavily obfuscated with whitespace and special characters, often used to evade static analysis and AMSI, by identifying scripts with low symbol diversity and a high proportion of whitespace and special characters.
Potential Port Monitor or Print Processor Registration Abuse
2 rules 4 TTPsThis rule detects registry modifications indicative of privilege escalation and persistence attempts by adversaries abusing port monitors and print processors to execute malicious DLLs with SYSTEM privileges on Windows systems.
Potential Persistence via Mandatory User Profile Modification
2 rules 2 TTPsAdversaries may abuse Windows mandatory profiles by dropping a malicious NTUSER.MAN file containing pre-populated persistence-related registry keys to establish persistence, which can evade traditional registry-based monitoring.
Potential Masquerading as Communication Apps
2 rules 3 TTPsAttackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.
Potential Machine Account Relay Attack via SMB
2 rules 2 TTPsThe rule identifies potential relay attacks against a machine account by detecting network share access events originating from a remote source IP but utilizing the target server's computer account, which may indicate an SMB relay attack.
Potential LSA Authentication Package Abuse
2 rules 2 TTPsAdversaries can abuse the Local Security Authority (LSA) authentication packages by modifying the Windows registry to achieve privilege escalation or persistence by executing binaries with SYSTEM privileges.
Potential Kerberos Relay Attack via Coerced Authentication against a Computer Account
3 rules 1 TTP 1 CVEDetects potential Kerberos relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host, indicating an attacker has captured and relayed Kerberos authentication material to execute code on behalf of the compromised system.
Potential DNS Tunneling via NsLookup
2 rules 2 TTPsDetection of multiple nslookup.exe executions with explicit query types from a single host, potentially indicating command and control activity via DNS tunneling, where attackers abuse DNS for data infiltration or exfiltration.
Potential Credential Access via Windows Utilities
3 rules 3 TTPsThis rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.
PhpSpreadsheet CPU Denial of Service via Unbounded Row Number
2 rules 1 TTPA vulnerability in PhpSpreadsheet exists where a crafted XLSX file containing a large row number can cause excessive CPU consumption due to unbounded loop iterations, leading to a denial of service.
Persistence via WMI Event Subscription
2 rules 2 TTPsAdversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.
Persistence via Visual Studio Tools for Office (VSTO) Add-ins
2 rules 1 TTPThe Visual Studio Tools for Office (VSTO) add-ins can be abused by attackers to establish persistence in Microsoft Office applications by modifying registry keys.
Patreon OAuth Provider ID Collision Vulnerability in go-pkgz/auth
2 rules 1 TTPThe Patreon OAuth provider in go-pkgz/auth and go-pkgz/auth/v2 maps every authenticated Patreon account to the same local user ID, leading to cross-account access, privilege confusion, and subscription-state leakage.
Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.
Pardus Software Center Path Traversal Vulnerability (CVE-2026-5166)
2 rules 1 TTP 1 CVECVE-2026-5166 is a path traversal vulnerability affecting TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center before version 1.0.3, allowing attackers to bypass directory restrictions.
Outbound SMB Traffic Detection
2 rules 1 TTPThis analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.
OpenMRS Stored Velocity SSTI to RCE via ConceptReferenceRange
2 rules 2 TTPsOpenMRS is vulnerable to a Stored Velocity SSTI to RCE via ConceptReferenceRange, where the `ConceptReferenceRangeUtility.evaluateCriteria()` method evaluates database-stored criteria strings as Apache Velocity templates without a sandbox, allowing unrestricted Java reflection through template expressions, leading to persistent remote code execution and privilege escalation when a user with the `Manage Concepts` privilege stores a malicious Velocity template expression in a concept's reference range criteria field.
OpenMRS ModuleResourcesServlet Path Traversal Vulnerability
2 rules 1 TTPOpenMRS Core versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, contain a path traversal vulnerability in the ModuleResourcesServlet, allowing an unauthenticated attacker to read arbitrary files from the server filesystem by manipulating the URL.
OpenClaw Plugin Trust Verification Bypass via Environment Variable Override
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 allows attackers with control over workspace configuration to inject malicious plugins by overriding the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable through workspace .env files, compromising plugin trust verification.
OpenCATS PHP Code Injection Vulnerability (CVE-2026-27760)
2 rules 1 TTP 1 CVEUnauthenticated attackers can exploit a PHP code injection vulnerability in OpenCATS versions prior to commit 3002a29 by injecting malicious PHP code into the installer's AJAX endpoint, leading to arbitrary code execution.
Okta Unauthorized Application Access Attempt
3 rulesThis brief describes a detection for unauthorized application access attempts within an Okta environment, indicating a potential security breach or misconfiguration.
Okta Policy Modification or Deletion Detected
2 rules 1 TTPAn Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.
Okta MFA Reset or Deactivation Attempt
2 rules 1 TTPAn attacker attempts to disable or reset multi-factor authentication (MFA) for a user account in Okta, potentially leading to unauthorized access and account compromise.
Okta Group Privilege Change Spike via ML Detection
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta group privilege change events, indicating potential privileged access activity where attackers might be elevating privileges by adding themselves or compromised accounts to high-privilege groups, enabling further access or persistence.
Okta Group Application Assignment Spike Indicates Privilege Escalation
2 rules 4 TTPsA machine learning job identified a spike in Okta group application assignment changes, potentially indicating threat actors escalating privileges, maintaining persistence, or moving laterally by assigning applications to groups.
Okta FastPass Phishing Attempt Detection
2 rules 1 TTPOkta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.
Okta Application Sign-On Policy Modified or Deleted
2 rules 1 TTPAttackers may modify or delete Okta application sign-on policies to weaken security controls, potentially leading to unauthorized access and data breaches.
Okta Application Modified or Deleted
2 rules 1 TTPDetects when an Okta application is modified or deleted, potentially indicating unauthorized changes or removal of critical applications.
Okta API Token Revoked
2 rules 1 TTPDetection of Okta API token revocation events, indicating potential unauthorized access or compromise.
Okta API Token Creation
2 rules 1 TTPDetection of Okta API token creation events which can indicate malicious persistence activity.
Office Application Autorun Registry Key Modification
2 rules 1 TTPAdversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.
NullSessionPipe Registry Modification for Lateral Movement
3 rules 2 TTPsAttackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.
Note Mark OIDC Authentication Bypass via Hardcoded Password
2 rules 1 TTPA critical authentication bypass vulnerability in note-mark allows attackers to authenticate as any OIDC-registered user by submitting the password 'null' to the internal login endpoint due to a hardcoded bcrypt hash fallback, potentially leading to account takeover and persistent access.
Non-Chrome Process Accessing Chrome Login Data
2 rules 1 TTPThis analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.
NocoBase SQL Injection via Recursive Eager Loading
2 rules 4 TTPsNocoBase versions 2.0.32 and earlier are vulnerable to SQL injection due to string concatenation in the `queryParentSQL()` function, allowing attackers with record creation permissions to inject arbitrary SQL and potentially extract sensitive information or execute commands.
Newly Observed High Severity Detection Alert in Elastic SIEM
3 rulesThis rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.
New ActiveSync Allowed Device Added via PowerShell
2 rules 3 TTPsThe rule detects the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device, potentially allowing attackers to gain persistent access to sensitive email data by adding unauthorized devices.
Network Logon Provider Registry Modification
2 rules 2 TTPsAdversaries may modify the network logon provider registry to register a rogue network logon provider module for persistence and credential access by intercepting authentication credentials in clear text during user logon.
n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay
2 rules 1 TTPA credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.
Multiple Remote Management Tool Vendors on Same Host
2 rulesThis rule identifies Windows hosts where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.
Multiple Alerts in Same ATT&CK Tactic by Host
2 rules 4 TTPsThis rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.
Mshta Making Network Connections Indicative of Defense Evasion
2 rules 1 TTPMshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.
MSBuild Started by System Process for Defense Evasion and Execution
2 rules 2 TTPsAdversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.
MiroFish Command Injection Vulnerability (CVE-2026-7058)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.
Microsoft IIS Connection String Decryption via aspnet_regiis
3 rules 1 TTPAn attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.
Microsoft Defender Tampering via Registry Modification
2 rules 2 TTPsAdversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.
Microsoft CVE-2017-3736 Vulnerability
2 rulesCVE-2017-3736 is a vulnerability tracked by Microsoft, potentially leading to exploitation of affected systems.
Microsoft Build Engine Executed After Renaming
2 rules 2 TTPsAttackers may rename the Microsoft Build Engine (MSBuild) executable to evade detection and proxy execution of malicious code.
Microsoft 365 Suspicious Email Delivery
2 rules 2 TTPsThis brief outlines a threat where Microsoft Defender for Office 365 identifies an email as malicious or suspicious but still delivers it to a user's inbox or junk folder, potentially bypassing initial security measures.
MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name
2 rules 2 TTPsMCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.
mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)
2 rules 1 TTP 1 CVEAn OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.
LSA PPL Protection Setting Modification via CommandLine
2 rules 1 TTPAttackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.
LOLBIN Network Connection for Defense Evasion
2 rules 1 TTPAdversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.
LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints
2 rules 1 TTPAuthenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.
liquidjs Denial of Service via Circular Block Reference
2 rules 1 TTPA vulnerability in liquidjs versions prior to 10.25.7 allows for denial of service due to a circular block reference in the layout, causing an infinite recursive loop that exhausts memory and crashes the Node.js process.
Kubernetes Secret Access with Suspicious User Agent
2 rules 1 TTPDetects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.
Kubernetes Rapid Secret GET Activity Against Multiple Objects
2 rules 1 TTPDetects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.
Kirby CMS Missing Authorization Vulnerability
3 rules 1 TTPKirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.
Kata Containers CopyFile Policy Subversion via Symlinks
3 rules 2 TTPs 1 CVEAn oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.
JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability
2 rules 1 TTP 1 CVEA server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.
Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell
2 rules 2 TTPsAttackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.
Ingress Transfer via Windows BITS
2 rules 2 TTPsAdversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
Incoming Execution via WinRM Remote Shell
2 rules 1 TTPThis rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.
i18next-http-middleware HTTP Response Splitting and DoS Vulnerability
2 rules 1 TTPi18next-http-middleware versions before 3.9.3 are vulnerable to HTTP response splitting and denial-of-service attacks due to unsanitized Content-Language headers, potentially leading to session fixation, cache poisoning, reflected XSS, or complete service disruption depending on the Node.js version.
Host File System Changes via Windows Subsystem for Linux
2 rules 2 TTPsThis rule detects file creation and modification on the host system from the Windows Subsystem for Linux (WSL), potentially indicating defense evasion by adversaries.
Heimdall Authorization Bypass via Case-Sensitive URL-Encoded Slash Handling
2 rules 1 TTPHeimdall versions before 0.17.14 are vulnerable to inconsistent path interpretation due to case-sensitive handling of URL-encoded slashes; when `allow_encoded_slashes` is set to `off` (the default), the lowercase `%2f` is not recognized, potentially leading to authorization bypass if the default rule is overly permissive and the upstream service interprets `%2f` as a path separator.
Heap/Stack Overflow in rust-openssl with OpenSSL 1.1.x
2 rulesThe rust-openssl crate's `Deriver::derive` and `PkeyCtxRef::derive` functions can cause heap/stack overflows when used with OpenSSL 1.1.x due to insufficient buffer length validation in X25519, X448, DH, and HKDF-extract, affecting rust-openssl versions >= 0.9.27 and < 0.10.78.
Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Gravity Forms plugin for WordPress is vulnerable to unauthenticated stored cross-site scripting (XSS) in versions up to 2.10.0, allowing attackers to inject arbitrary JavaScript code into the product name field within repeater fields, which executes when an administrator views the affected entry.
GPO Scheduled Task or Service Creation/Modification
2 rules 3 TTPsDetection of the creation or modification of new Group Policy based scheduled tasks or services, which can be abused by attackers with domain admin permissions to execute malicious payloads remotely on domain-joined machines, leading to privilege escalation and persistence.
GPO Scheduled Task Abuse for Privilege Escalation and Lateral Movement
2 rules 3 TTPsAttackers abuse Group Policy Objects by modifying scheduled task attributes to execute malicious commands across objects controlled by the GPO, potentially leading to privilege escalation and lateral movement.
GPO Modification to Add Startup/Logon Scripts
2 rules 3 TTPsThis rule detects the modification of Group Policy Objects (GPO) to add a startup or logon script to user or computer objects, enabling attackers to achieve privilege escalation and persistence by executing arbitrary commands at scale.
GoBGP Remote Denial of Service via Malformed BGP UPDATE Message
2 rules 1 TTPA remote Denial of Service (DoS) vulnerability exists in GoBGP version 4.2.0 and earlier, where a malformed BGP UPDATE message can trigger a runtime error (index out of range panic), crashing the GoBGP process. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon, leading to a complete loss of routing capabilities.
GoBGP Remote Denial of Service via Malformed BGP Update Message
2 rules 1 TTPA denial-of-service vulnerability exists in GoBGP version 4.3.0 where a malformed BGP UPDATE message containing an unrecognized Well-known Path Attribute triggers a nil pointer dereference, causing the BGP daemon to crash.
GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)
2 rules 1 TTP 1 CVEA heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.
Frequent Azure PIM Role Activation Detected
2 rules 3 TTPsDetection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.
florensiawidjaja BioinfoMCP Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.
First Time Seen Driver Loaded
2 rules 3 TTPsThe rule identifies the load of previously unseen drivers, which may indicate attackers exploiting vulnerable drivers for privilege escalation and persistence.
Execution via Windows Subsystem for Linux
2 rules 2 TTPsThis detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.
Execution via Local SxS Shared Module
2 rules 2 TTPsThis rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.
Execution of a Downloaded Windows Script
3 rules 7 TTPsThis rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.
Execution from Removable Media with Network Connection
2 rules 1 TTPDetects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.
Executable or Script Creation in Temporary Paths
2 rules 1 TTPAdversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.
Exchange Mailbox Export via PowerShell
2 rules 4 TTPsAdversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.
Enumeration of Privileged Local Groups Membership
2 rules 1 TTPAn unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.
Encoded Executable Stored in the Registry
2 rules 3 TTPs 1 IOCThis rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.
Electerm Command Injection Vulnerability via runLinux Function
2 rules 1 TTPA command injection vulnerability exists in electerm's install.js due to insufficient validation in the runLinux() function, allowing attackers to execute arbitrary commands by manipulating remote release metadata.
DNS-over-HTTPS Enabled via Registry Modification
3 rules 2 TTPsDetection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.
Disabling LSA Protection via Registry Modification
2 rules 1 TTPAdversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.
Dgraph Pre-Auth Full Database Exfiltration via DQL Injection
2 rules 6 TTPsA pre-authentication DQL injection vulnerability in Dgraph's default configuration allows attackers to exfiltrate the entire database by crafting malicious JSON mutations to the `/mutate` endpoint, exploiting unsanitized language tags in predicates.
Detection of Python Base64 Encoded Execution on Linux
2 rules 2 TTPsThis brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.
Detection of Privileged Account Creation in Azure
2 rules 3 TTPsDetects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.
Detection of Out-of-Domain Email Forwarding in Google Workspace
2 rules 1 TTPDetects automatic email forwarding to external domains in Google Workspace, which may indicate data leakage or misuse by malicious insiders or compromised accounts.
Detection of Okta Administrator Role Assignment to User or Group
2 rules 1 TTPDetects the assignment of an Okta administrator role to a user or group, potentially indicating privilege escalation or persistence attempts by malicious actors.
Detection of Obfuscated IP Addresses via Command Line Tools
3 rules 1 TTPThe use of command-line tools like ping.exe or arp.exe with obfuscated IP addresses (hex, octal, etc.) in the command line can indicate reconnaissance activity or attempts to evade security controls by masking the true destination.
Detection of Important Scheduled Task Deletion or Disablement
2 rules 1 TTPAdversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.
Detection of Encrypted Archive Creation with WinRAR or 7-Zip
2 rules 2 TTPsAdversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.
Detect Suspicious WMI Event Subscription Creation for Persistence
2 rules 1 TTPThis threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.
Denial of Service Vulnerability in marked via Infinite Recursion
2 rules 1 TTPA denial of service vulnerability exists in marked version 18.0.0 due to infinite recursion when processing a specific 3-byte sequence (tab, vertical tab, and newline), leading to unbounded memory allocation and application crash.
Deletion of Critical Scheduled Tasks
2 rules 1 TTPAdversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.
CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine
2 rules 1 TTP 1 CVECVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).
CVE-2026-28390 NULL Dereference in CMS KeyTransportRecipientInfo Processing
2 rules 1 CVECVE-2026-28390 is a vulnerability related to a possible NULL pointer dereference when processing CMS KeyTransportRecipientInfo, potentially leading to a denial-of-service condition.
CVE-2019-1547 ECDSA Remote Timing Attack Vulnerability
2 rulesCVE-2019-1547 is a security vulnerability that could allow a remote timing attack.
Component Object Model (COM) Hijacking via Registry Modification
2 rules 4 TTPsAdversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.
Command Obfuscation via Unicode Modifier Letters
2 rules 1 TTPAdversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.
Command Execution via ForFiles Utility
2 rules 1 TTPAdversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.
CKAN Unauthenticated SQL Injection in datastore_search_sql
2 rules 1 TTPAn unauthenticated SQL injection vulnerability in CKAN's `datastore_search_sql` function allows attackers to access private resources and PostgreSQL system information, affecting versions prior to 2.10.10 and versions 2.11.0 through 2.11.4.
Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability
2 rules 1 TTP 1 CVEA vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.
Chmod Activity Targeting Sensitive Linux Directories
2 rules 1 TTPAttackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.
ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)
1 rule 1 TTP 1 CVECVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.
Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection
2 rules 1 TTP 1 CVEBeghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.
Azure Subscription Permission Elevation via Activity Logs
2 rules 1 TTPAn attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.
Azure Owner Removed from Application or Service Principal
2 rules 1 TTPAn adversary may remove an owner from an Azure application or service principal to weaken access controls, persist in the environment, or escalate privileges.
Azure AD User Added to Administrator Role
2 rules 4 TTPsAn adversary adds a user to an Azure Active Directory administrative role to gain initial access, persist in the environment, escalate privileges, and potentially operate stealthily.
Azure AD MFA Disabled to Bypass Authentication
2 rules 1 TTPAn adversary may disable multi-factor authentication (MFA) in Azure Active Directory to weaken an organization's security posture and bypass authentication mechanisms, potentially gaining unauthorized access to sensitive resources and maintaining persistence.
AWS VPC Flow Logs Deletion for Defense Evasion
2 rules 1 TTPAn adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.
AWS STS GetFederationToken with AdministratorAccess in Request
2 rules 2 TTPsDetection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.
AWS STS AssumeRole Misuse for Lateral Movement and Privilege Escalation
1 rule 2 TTPsAbuse of AWS STS AssumeRole can allow attackers to move laterally within an AWS environment and escalate privileges, potentially leading to unauthorized access to sensitive resources and data.
AWS IAM Customer Managed Policy Version Manipulation for Privilege Escalation
2 rules 2 TTPsSuccessful creation of new or setting default versions of customer-managed IAM policies can indicate privilege escalation attempts by attackers modifying policy permissions.
AWS EC2 Stop, Start, and User Data Modification Correlation
3 rules 2 TTPsDetection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.
AWS EC2 Instance Profile Associated with Running Instance
2 rules 2 TTPsAn attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.
AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN
2 rules 1 TTPDetects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.
Avo Framework Broken Access Control Vulnerability
2 rules 1 TTPAvo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.
AstrBotDevs AstrBot Vulnerability Leads to Hardcoded Credentials (CVE-2026-7579)
2 rules 1 TTP 1 CVECVE-2026-7579 describes a vulnerability in AstrBotDevs AstrBot up to version 4.16.0 where improper handling of the `auth.py` file in the dashboard component leads to hardcoded credentials being exposed, enabling remote exploitation.
ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)
2 rules 1 TTP 1 CVEA time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (<= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.
Arcane Unauthenticated Compose Template Content Disclosure
2 rules 1 TTPArcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.
Appsmith SQL Injection Vulnerability in FilterDataService
2 rules 1 TTPA SQL injection vulnerability exists in Appsmith's FilterDataServiceCE.java in versions 1.98 and earlier where the dropTable method constructs a SQL DROP TABLE statement using string concatenation with the table name, allowing arbitrary SQL command execution, leading to potential data loss, exfiltration, or modification.
Aider-MCP Command Injection Vulnerability (CVE-2026-7316)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.
Actual Privilege Escalation via change-password Endpoint on OpenID-Migrated Servers
2 rules 1 TTPAny authenticated user can escalate to ADMIN on Actual servers migrated from password authentication to OpenID Connect by exploiting a lack of authorization checks, orphaned password rows, and client-controlled login methods, leading to full administrative privileges.
Active Directory Discovery via ADExplorer Execution
2 rules 5 TTPsDetects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.
Account Configured with Never-Expiring Password
2 rules 1 TTPDetects the creation and modification of an account with the 'Don't Expire Password' option enabled, which attackers can abuse to persist in the domain and maintain long-term access.
666ghj MiroFish REST API Authentication Bypass (CVE-2026-7042)
2 rules 1 TTP 1 CVEA missing authentication vulnerability (CVE-2026-7042) exists in 666ghj MiroFish up to version 0.1.2, allowing remote attackers to bypass authentication via manipulation of the REST API Endpoint's create_app function.
Windows Proxy Execution of .NET Utilities via Scripts
2 rules 2 TTPsDetects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.
Unusual Process Spawned by a User Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.
Unusual Parent-Child Relationship Detection
3 rules 4 TTPsThis rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.
Unusual Child Processes of RunDLL32 Execution Without Arguments
2 rules 1 TTPThe execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.
Suspicious Process Execution via Renamed PsExec Executable
2 rules 3 TTPsDetects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.
Suspicious Process Creation Followed by Memory Access from Unknown Region
2 rules 1 TTPThe rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.
Suspicious Outbound Scheduled Task Activity via PowerShell
2 rules 3 TTPsThis rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.
Suspicious DNS Queries to Telegram API by Non-Telegram Processes
2 rules 2 TTPs 1 IOCDetection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.
Remote File Copy via TeamViewer
2 rules 2 TTPsAttackers may abuse legitimate utilities such as TeamViewer to deploy malware interactively by remotely copying executable or script files during a TeamViewer session.
ProblemChild ML Model Detects Unusual Process on Windows Host
2 rules 1 TTPThe ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.
PowerShell Loading .NET Assemblies via Reflection
2 rules 1 TTPThis analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.
PowerShell Execution via Environment Variables
2 rules 1 TTPAdversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.
Potential Persistence via Time Provider Modification
2 rules 2 TTPsAdversaries may establish persistence by registering and enabling a malicious DLL as a time provider by modifying registry keys associated with the W32Time service.
Potential Application Shimming via Sdbinst
2 rules 2 TTPsAttackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.
MpCmdRun.exe Used for Remote File Download
2 rules 1 TTPAttackers are abusing the Windows Defender MpCmdRun.exe utility to download remote files, potentially delivering malware or offensive tools into compromised systems.
LSASS Loading Suspicious DLL
2 rules 2 TTPs 9 IOCsDetection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.
Logon Script Registry Modification for Persistence and Privilege Escalation
2 rules 2 TTPsThis brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.
Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion
3 rules 2 TTPsAttackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.
IIS HTTP Logging Disabled via AppCmd
2 rules 1 TTPAn attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.
Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 CVEThe Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0, allowing unauthenticated attackers to inject arbitrary web scripts via form submissions that execute when an administrator views the entry detail page.
Executable or Script Creation in Suspicious Paths
2 rules 1 TTPThis analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.
Detects Kirbi File Creation
2 rules 1 TTPDetects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.
Detecting Remote Scheduled Task Creation for Lateral Movement
2 rules 2 TTPsThis rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.
CoreDNS Transfer Plugin ACL Bypass Vulnerability
2 rules 1 TTPCoreDNS' transfer plugin prior to version 1.14.3 can select the wrong ACL stanza due to lexicographic comparison, leading to unauthorized zone transfers by clients intended to be denied by subzone-specific transfer policies.
Adobe RdrCEF.exe Hijack for Persistence
2 rules 2 TTPsAttackers can maintain persistence by replacing the legitimate RdrCEF.exe executable with a malicious one, which is executed every time Adobe Acrobat Reader is launched.
Adding Hidden File Attribute via Attrib.exe
2 rules 2 TTPsAdversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.
Azure Identity Protection Atypical Travel Anomaly
2 rules 1 TTPThe Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.
Persistence via PowerShell Profile Modification
2 rules 2 TTPsAttackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.
OpenLearnX Remote Code Execution via Python Sandbox Escape
2 rules 1 TTPA critical RCE vulnerability in OpenLearnX allows for sandbox escape and arbitrary command execution in versions prior to 2.0.3.
Azure AD Privileged Role Assignment
2 rules 2 TTPsDetection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.
Azure AD Account Created and Deleted Within a Close Time Frame
2 rules 3 TTPsDetection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.
Account Password Reset Remotely
2 rules 2 TTPsThe rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.
Unusual Source IP for Windows Privileged Operations Detected via ML
2 rules 2 TTPsA machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.
Unusual Privilege Type Assigned to User via Machine Learning Anomaly
2 rules 4 TTPsA machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.
Unusual Host Name for Windows Privileged Operations Detected via ML
2 rules 2 TTPsA machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.
Suspicious CSC.exe Parent Process
3 rules 3 TTPsThe Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.
Control Panel Process with Unusual Arguments
2 rules 1 TTPAdversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.
Azure AD Failed Authentication Increase
2 rules 1 TTPDetects a significant increase (10% or greater) in failed Azure AD sign-in attempts, potentially indicating brute-force attacks, credential stuffing, or other unauthorized access attempts.
Detection of Suspicious Inbox Manipulation Rules in Azure
2 rules 2 TTPsThis brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.
AWS Root Account Usage Detected
3 rules 3 TTPsThe AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.
AWS S3 Bucket Deletion Detected via CloudTrail
3 rules 1 TTPAn AWS S3 bucket deletion event was detected via CloudTrail logs, potentially indicating data loss or unauthorized access attempts.
SMB (Windows File Sharing) Activity to the Internet
2 rules 2 TTPsThis rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.
Windows Delayed Execution via Ping Followed by Malicious Utilities
2 rules 14 TTPsAdversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.
MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read Vulnerability (CVE-2026-7668)
2 rules 1 TTP 1 CVEMikroTik RouterOS 6.49.8 is vulnerable to an out-of-bounds read in the SCEP endpoint component, triggered by remote manipulation of the transactionID/messageType argument, potentially leading to denial of service or information disclosure.
First Time Seen Removable Device Registry Modification
2 rules 2 TTPsDetection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.
WScript or CScript Dropper
2 rules 2 TTPsThe WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.
Windows Temporarily Scheduled Task Creation and Deletion
2 rules 2 TTPsDetection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.
Windows Scheduled Task Creation for Persistence
3 rules 1 TTPAdversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.
Windows Peripheral Device Discovery via fsutil
2 rules 1 TTPAdversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.
Windows Event Logs Cleared
2 rules 1 TTPAttackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.
Windows Audit Policy Sub-Category Disabled
2 rules 3 TTPsThis rule identifies attempts to disable auditing for security-sensitive audit policy sub-categories on Windows systems, often employed by attackers to evade detection and forensic analysis.
Windows Admin Account Brute Force Detection
2 rules 2 TTPsThis rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.
WeKan SSRF Vulnerability in Webhook Integration
2 rules 1 TTP 1 CVEWeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.
User Account ServicePrincipalName Attribute Modified
2 rules 2 TTPsDetection of modifications to the servicePrincipalName attribute on user accounts, potentially exposing them to Kerberoasting attacks by allowing attackers to request Kerberos tickets for the account.
Unusual Process Writing Data to an External Device via Machine Learning
2 rules 1 TTPA machine learning job detects a rare process writing data to an external device, potentially indicating data exfiltration masked by benign-looking processes.
Unusual Child Process from a System Virtual Process
2 rules 1 TTPA suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.
Unauthorized Guest User Invitations in Azure AD
2 rules 3 TTPsDetection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.
Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)
1 rule 1 TTP 1 CVEA stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.
Tenda F456 Remote Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 via manipulation of the 'page' argument in the fromDhcpListClient function of the /goform/DhcpListClient component, potentially leading to arbitrary code execution.
TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)
2 rules 1 CVEA server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.
Suspicious Unshare Usage for Namespace Manipulation
2 rules 2 TTPsThe `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.
Suspicious Unshare Usage for Container Escape and Privilege Escalation
2 rules 2 TTPsThe rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.
Suspicious Svchost.exe Child Process: cmd.exe
2 rules 2 TTPsDetection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.
Suspicious Remote Registry Access via SeBackupPrivilege
2 rules 3 TTPsDetection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.
Suspicious RDP Client Image Load
2 rules 1 TTPThe rule detects suspicious loading of the Remote Desktop Services ActiveX Client (mstscax.dll) from unusual locations, potentially indicating RDP lateral movement on Windows systems.
Suspicious PowerShell Reconnaissance via WMI Queries
2 rules 2 TTPsDetection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.
Suspicious Microsoft HTML Application Child Process
2 rules 1 TTPMshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.
Suspicious Local Scheduled Task Creation
2 rules 1 TTPThis rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.
Suspicious Inter-Process Communication via Outlook COM
2 rules 2 TTPsAdversaries may target user email to collect sensitive information or send email on their behalf via API by abusing Outlook's Component Object Model (COM) interface from unusual processes.
Suspicious Explorer Child Process via DCOM
2 rules 9 TTPsAdversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.
Suspicious Command Prompt Network Connection
2 rules 4 TTPsThis alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.
Suspicious Access to LDAP Attributes
2 rules 3 TTPsThe rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.
Suspicious .NET Code Compilation via Unusual Parent Processes
2 rules 3 TTPsAdversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.
Spike in Remote File Transfers via Lateral Movement
2 rules 2 TTPsA machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.
SMB Registry Hive Exfiltration
2 rules 3 TTPsDetection of medium-sized registry hive files being created or modified on Server Message Block (SMB) shares, potentially indicating exfiltration of Security Account Manager (SAM) data for credential extraction.
Service Control Executed from Script Interpreters
2 rules 8 TTPsDetection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.
S3 Browser Used to Create IAM Login Profiles
2 rules 2 TTPsThe S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.
RustFS Notification Target Admin API Authorization Bypass
2 rules 3 TTPsA vulnerability in RustFS allows a non-admin user to overwrite a shared admin-defined notification target, leading to event interception and audit evasion due to missing admin-action authorization on notification target admin API endpoints.
Remote Registry Lateral Movement via RPC Firewall
2 rules 3 TTPsThis brief details detection of lateral movement attempts using remote RPC calls to modify the registry, potentially leading to code execution, detected via RPC Firewall logs.
Potential Protocol Tunneling via Yuze
2 rules 3 TTPsThis alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.
Potential Masquerading as Svchost
2 rules 1 TTPAttackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.
Potential Invoke-Mimikatz PowerShell Script
2 rules 1 TTPThis rule detects the use of Invoke-Mimikatz or Mimikatz commands within PowerShell scripts to dump credentials, extract password stores, export certificates, or use alternate authentication material, indicating potential in-memory credential access.
Potential Credential Access via Renamed COM+ Services DLL
2 rules 3 TTPs 1 IOCDetection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.
Potential Credential Access via MSBuild Loading Credential Management DLLs
2 rules 1 TTPThe detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.
Potential Credential Access via DCSync
2 rules 3 TTPsThis rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.
Pardus OS My Computer OS Command Injection Vulnerability (CVE-2026-6849)
1 rule 1 TTP 1 CVECVE-2026-6849 is an OS Command Injection vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer versions <=0.7.5 before 0.8.0, allowing an attacker to execute arbitrary OS commands due to improper neutralization of special elements.
OpenRemote Improper Access Control Leads to Privilege Escalation
2 rules 1 TTPOpenRemote is vulnerable to privilege escalation, allowing an attacker with write:admin privileges in one Keycloak realm to gain administrator access to the master realm by manipulating Keycloak realm roles due to missing authorization checks in the updateUserRealmRoles function.
OpenClaw Symlink Race Condition Allows Sandbox Escape
1 rule 1 TTPA time-of-check/time-of-use (TOCTOU) race condition in OpenClaw versions 2026.4.21 and earlier allows a symlink swap to redirect filesystem writes outside the intended sandbox mount root, potentially leading to arbitrary file modification.
Okta User Session Start via Anonymizing Proxy Service
2 rules 1 TTPDetection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.
Okta User Account Lockout Detection
2 rules 1 TTPDetection of an Okta user account lockout, which may indicate brute-force attempts or other malicious activity targeting user accounts.
Okta Privileged Operations from Unusual Host Name Detected
2 rules 2 TTPsA machine learning job detected a user performing privileged operations in Okta from an uncommon device, potentially indicating a compromised account or insider threat attempting privilege escalation.
Okta Group Membership Spike Detection
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta group membership events, indicating potential privileged access activity where attackers or malicious insiders might be adding accounts to privileged groups to escalate their access, potentially leading to unauthorized actions or data breaches.
Nsenter Execution with Target Flag Inside Container
2 rules 1 TTPThe rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.
Nimiq Block Skip Block Quorum Bypass Vulnerability
2 rules 1 TTPA vulnerability exists in Nimiq Block's SkipBlockProof verification process, allowing attackers to bypass quorum checks by manipulating MultiSignature signers with out-of-range indices, potentially compromising blockchain integrity, and affecting rust/nimiq-block versions 0.2.0 and earlier.
Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall
2 rules 2 TTPsAdversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.
n8n Unauthenticated Denial of Service via MCP Client Registration
2 rules 1 TTPn8n is vulnerable to an unauthenticated denial of service (DoS) attack due to missing resource controls in the MCP OAuth client registration endpoint, allowing an attacker to exhaust server memory by sending large registration payloads, leading to service unavailability; this is resolved in versions 1.123.32, 2.17.4, and 2.18.1 and tracked as CVE-2026-42236.
MyBB Recent Threads 17.0 Persistent Cross-Site Scripting Vulnerability (CVE-2018-25309)
2 rules 1 TTP 1 CVEMyBB Recent threads 17.0 contains a persistent cross-site scripting vulnerability (CVE-2018-25309) that allows attackers to inject malicious scripts by creating threads with crafted subject lines, leading to arbitrary JavaScript execution in the browsers of users viewing the index page.
Multiple Remote Management Tool Vendors on Same Host
3 rulesThis detection identifies a Windows host where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.
Msiexec Arbitrary DLL Execution
2 rules 1 TTPAdversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.
MS Office Macro Security Registry Modifications
2 rules 2 TTPsAttackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.
Mounting of Hidden or WebDav Remote Shares via Net Utility
2 rules 4 TTPsAdversaries may leverage the `net.exe` utility to mount WebDav or hidden remote shares, potentially indicating lateral movement, data exfiltration preparation, or initial access via discovery of accessible shares.
Modification of WDigest Security Provider
2 rules 1 TTPThe rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.
MLOps_MCP Path Traversal Vulnerability (CVE-2026-7213)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in ef10007 MLOps_MCP version 1.0.0, allowing a remote attacker to manipulate the 'filename/destination' argument in the 'save_file Tool' component's 'fastmcp_server.py' file.
Microsoft IIS Service Account Password Dump via AppCmd
2 rules 2 TTPsAn attacker with IIS web server access via a web shell can extract service account passwords by requesting full configuration output or targeting credential-related fields using the AppCmd tool.
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.
LSASS Memory Dump Handle Access Detection
2 rules 1 TTPThis rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.
LSASS Memory Dump Creation Detection
2 rules 1 TTPThis rule identifies the creation of LSASS memory dump files, often indicative of credential access attempts using tools like Task Manager, SQLDumper, Dumpert, or AndrewSpecial, by monitoring for specific filenames and excluding legitimate dump locations.
locize Client SDK Cross-Origin DOM XSS and Handler Hijack Vulnerability
2 rules 1 TTPThe locize client SDK versions prior to 4.0.21 are vulnerable to cross-origin DOM XSS and handler hijack due to missing origin validation in the InContext Editor, allowing attackers to inject malicious code and exfiltrate data via crafted postMessage events.
Kubernetes Secrets Enumeration from Non-Loopback Client
2 rules 2 TTPsDetection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.
Impossible Travel Detection in Azure AD
2 rules 1 TTPThis brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.
High Number of Process and/or Service Terminations Detected
2 rules 2 TTPsA high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.
Heimdall Host Matching Case-Sensitivity Vulnerability
2 rules 1 TTPHeimdall performs case-sensitive host matching, which can lead to policy bypass because HTTP hostnames are case-insensitive, potentially leading to unauthorized access, data modification, or privilege escalation if the request host is part of the rule.
Heimdall Authorization Bypass via Path Normalization Mismatch
2 rules 2 TTPsHeimdall is vulnerable to an authorization bypass due to a path normalization mismatch between Heimdall and downstream components, potentially leading to unauthorized access and privilege escalation.
Gotenberg ExifTool Argument Injection via Metadata Values
2 rules 1 TTPGotenberg version 8.30.1 and earlier is vulnerable to argument injection, where an unauthenticated attacker can inject arbitrary ExifTool pseudo-tags via newline characters in metadata values, leading to arbitrary file manipulation within the container filesystem.
GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.
geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.
File with Right-to-Left Override Character (RTLO) Created/Executed
2 rules 2 TTPsThis rule detects the creation or execution of files or processes with names containing the Right-to-Left Override (RTLO) character, which can be used to disguise the file extension and trick users into executing malicious files on Windows systems.
FastlyMCP Command Injection Vulnerability (CVE-2026-7220)
2 rules 1 TTP 1 CVEA command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.
ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution
2 rules 4 TTPs 1 CVEThe ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.
ELBA5 5.8.0 Remote Code Execution Vulnerability
2 rules 3 TTPs 1 CVEELBA5 version 5.8.0 contains a remote code execution vulnerability (CVE-2018-25272) that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions, potentially leading to complete system compromise.
Disabling Windows Defender Security Settings via PowerShell
3 rules 2 TTPsAttackers use PowerShell commands like Set-MpPreference or Add-MpPreference, often with base64 encoding, to disable or weaken Windows Defender security settings in order to evade detection and execute malicious payloads.
Disabling User Account Control via Registry Modification
2 rules 3 TTPsAttackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.
Detection of Office Macro File Creation
2 rules 1 TTPThis brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.
Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)
2 rules 1 TTPAdversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.
Detecting Suspicious Scheduled Task Creation in Windows
2 rules 1 TTPThis rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.
Detecting Execution from Alternate Data Streams
2 rules 1 TTPAdversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.
Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)
2 rules 1 TTP 1 CVEDetect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.
D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd
2 rules 1 TTP 1 CVEA buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.
CVE-2018-0735 ECDSA Signature Generation Timing Attack
2 rules 1 TTP 1 CVECVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.
CVE-2017-3735 Vulnerability Targeting Microsoft Products
2 rules 1 TTP 1 CVECVE-2017-3735 is a vulnerability impacting Microsoft products, potentially allowing unauthorized access or code execution.
Creation or Modification of Domain Backup DPAPI Private Keys
3 rules 1 TTPDetection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.
Code Signing Policy Modification Through Registry
2 rules 2 TTPsAttackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.
CI4MS Theme Upload Zip Slip Vulnerability
2 rules 2 TTPsA critical vulnerability exists in ci4ms Theme::upload, where improper validation of ZIP archive entry names allows authenticated users with theme creation permissions to write files to arbitrary locations, leading to remote code execution.
choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)
3 rules 1 TTP 1 CVEThe choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.
Budibase XSS Leads to Account Takeover via JWT Theft
2 rules 1 TTPThe `budibase:auth` cookie in Budibase is set without the `httpOnly` flag, enabling attackers with XSS to steal JWTs and gain persistent access to user accounts.
Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.
BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.
Azure PIM - Role Assignment Outside of Privileged Identity Management
2 rules 4 TTPsDetection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.
Azure Domain Federation Settings Modified
2 rules 2 TTPsAn attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.
AWS GuardDuty IP Set Manipulation for Defense Impairment
2 rules 1 TTPAn attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.
AWS Config Service Disabling Detection
2 rules 1 TTPDetection of AWS Config Service disabling, potentially indicating an attempt to impair defenses by stopping configuration recording and delivery.
Algovate xhs-mcp Server-Side Request Forgery Vulnerability
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in Algovate xhs-mcp 0.8.11 within the xhs_publish_content function, allowing a remote attacker to manipulate the media_paths argument and potentially access internal resources.
Xwizard COM Object Execution for Defense Evasion
2 rules 2 TTPsAdversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.
Windows Privilege Escalation via Secondary Logon Service
2 rules 2 TTPsThe rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.
Suspicious MS Outlook Child Process
2 rules 3 TTPsDetection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.
Remote Execution of Windows Services via RPC
2 rules 2 TTPsDetection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.
PowerShell Obfuscation via Backtick-Escaped Variable Expansion
2 rules 1 TTPPowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.
Pipecat Remote Code Execution via Pickle Deserialization in LivekitFrameSerializer
2 rules 1 TTP 1 CVE 1 IOCA critical vulnerability, CVE-2025-62373, exists in Pipecat's LivekitFrameSerializer where the deserialize() method uses Python's pickle.loads() on WebSocket data without validation, allowing a malicious WebSocket client to execute arbitrary code on the Pipecat server if LivekitFrameSerializer is explicitly enabled.
Large ICMP Traffic Detection
2 rules 1 TTPThis analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.
Impact of Poor Security Operation Center (SOC) Metrics
2 rules 2 TTPsPoorly chosen performance metrics can significantly impair a SOC's ability to detect and respond to threats, leading to ineffective security operations and potential compromise.
High Variance in RDP Session Duration Detected via Machine Learning
2 rules 2 TTPsA machine learning job has detected unusually high variance of RDP session duration, potentially indicating lateral movement and session persistence by threat actors.
Execution via GitHub Actions Runner
3 rules 3 TTPsAdversaries compromising GitHub Actions workflows can execute arbitrary commands on runner hosts, leading to code execution, reconnaissance, credential harvesting, or network exfiltration.
NTDS or SAM Database File Copied
2 rules 1 TTPDetects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.
Detection of IIS HTTP Logging Disabled via AppCmd.exe
2 rules 2 TTPsThis analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.