OpenClaw (formerly Clawdbot), a personal AI assistant, contained a critical network binding vulnerability where the application incorrectly treated wildcard IP addresses (0.0.0.0) as loopback addresses. This allowed the sensitive Chrome extension relay service—intended only for local communication—to be exposed to the entire network, granting remote attackers control over the victim's browser via the Chrome DevTools Protocol.
OpenClaw, a TypeScript-based personal AI assistant designed to integrate with various tools and LLM providers, contained a critical Server-Side Request Forgery (SSRF) vulnerability. The flaw resided in how the application's tools—specifically the Image Tool and Web Fetch Tool—handled remote resource retrieval. By failing to validate destination IP addresses or enforce egress filtering, the application allowed attackers to coerce the server into making requests to arbitrary internal endpoints. This could lead to the exposure of sensitive cloud metadata (AWS/GCP), access to local services listening on loopback interfaces, or network scanning behind the firewall.
OpenClaw (formerly Moltbot), an autonomous AI agent framework, contained a critical authentication bypass in its BlueBubbles webhook integration. The vulnerability stemmed from an implicit trust of requests originating from loopback addresses (127.0.0.1). When deployed behind reverse proxies or tunnels, external requests appeared local to the application, allowing remote attackers to bypass authentication completely. This flaw is currently being exploited in the wild to hijack AI agents and exfiltrate credentials.
In the world of game server hosting, Pterodactyl is the undisputed king. But a synchronization gap between the management Panel and the remote Wings daemon created a zombie apocalypse scenario: SFTP sessions that refused to die. This vulnerability allowed malicious users to maintain full filesystem access to servers even after their accounts were deleted or passwords changed, turning a standard termination procedure into a race against a lingering, unauthorized open socket.
A critical failure in input sanitization within the `directorytree/imapengine` PHP library allows attackers to perform IMAP Command Injection. By manipulating the parameters passed to the `id()` method, malicious actors can break out of the protocol's quoted-string syntax and inject arbitrary IMAP commands. This can lead to unauthorized email exfiltration, data modification, or denial of service against the mail server.
A critical lapse in cryptographic hygiene within Keycloak's 'Organizations' feature allows attackers to forge invitation tokens. By neglecting to verify the digital signature of JSON Web Tokens (JWTs), Keycloak inadvertently permitted anyone with a valid invite to modify the payload—swapping organization IDs and email addresses—to gain unauthorized access to restricted tenants.
A critical OS Command Injection vulnerability exists in CodeIgniter 4's ImageMagick handler. By failing to properly escape filenames and configuration options before passing them to the system shell, the framework allows unauthenticated attackers to execute arbitrary commands. This affects any application utilizing the `ImageMagickHandler` for image manipulation, potentially turning a simple profile picture upload or meme generator into a root shell.
A classic algorithmic complexity vulnerability hiding in the X.509 certificate verification logic of GnuTLS. By crafting a certificate with a pathological combination of Name Constraints and Subject Alternative Names (SANs), an attacker can force the library into an exponential validation loop. This results in severe CPU and memory exhaustion, effectively causing a Denial of Service (DoS) with a single TLS handshake.
LightLLM, a high-performance LLM inference engine, contains a critical Remote Code Execution (RCE) vulnerability in its Prefill-Decode (PD) disaggregation system. The flaw arises from the unsafe deserialization of untrusted data using Python's `pickle` module on exposed WebSocket endpoints. Compounding the issue, the application explicitly forbids binding to localhost, forcing these vulnerable endpoints to be network-accessible. This allows unauthenticated attackers to execute arbitrary code with the privileges of the inference server, potentially compromising high-value GPU clusters and proprietary models.
A critical failure in cryptographic key management within Calero VeraSMART allows unauthenticated attackers to achieve Remote Code Execution (RCE) via ASP.NET ViewState deserialization. By shipping identical `machineKey` values in the `web.config` across all installations, the vendor essentially provided a master key to every instance of the software.
A Critical RCE in Crawl4AI's Docker API allows unauthenticated attackers to execute arbitrary Python code via the 'hooks' parameter. By leveraging an insecure implementation of 'exec()' and a failed attempt at sandboxing that left '__import__' exposed, attackers can bypass restrictions and compromise the host container.
A deep-dive analysis into a logic flaw within GitLab's Pipeline Schedules API. This vulnerability allows low-privileged users to bypass authorization checks and potentially exfiltrate sensitive CI/CD variables via user interaction vectors. The flaw highlights the danger of insufficient scope validation in complex API structures.
Or generate a custom report
Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis
Automated vulnerability intelligence. 688+ reports.