A critical OS Command Injection vulnerability in the OpenClaw AI assistant allows remote code execution via malicious OAuth tokens. By failing to sanitize inputs before passing them to the macOS 'security' utility, the application permits attackers to execute arbitrary shell commands with the privileges of the host user. This transforms the keychain credential management feature—designed for security—into a high-impact entry point for compromise.
A logic flaw in OpenClaw's manual OAuth input parsing allowed attackers to bypass state validation by simply providing a bare authorization code. The application helpfully, but insecurely, assumed that any non-URL input was a valid code and automatically attached the expected session state to it, enabling credential substitution attacks.
A process safety vulnerability in the OpenClaw Personal AI Assistant allowed the CLI runner to terminate arbitrary processes on the local system. By relying on loose regex matching of command-line arguments without verifying process lineage (PPID) or ownership, OpenClaw could accidentally execute a Denial of Service (DoS) against other users on shared environments.
A critical Path Traversal vulnerability in the OpenClaw BlueBubbles extension allowed attackers to exfiltrate sensitive local files via message attachments. By manipulating the media delivery pipeline, a malicious actor (or a confused AI) could trick the system into reading arbitrary files from the host server—such as SSH keys or password hashes—and sending them directly to an iMessage chat. The flaw stemmed from a lack of directory containment checks in the `sendBlueBubblesMedia` function.
A critical Server-Side Request Forgery (SSRF) and Local File Disclosure (LFD) vulnerability in the OpenClaw Feishu extension allows attackers to weaponize AI agents to fetch internal network resources or read sensitive local files.
OpenClaw's sandbox browser bridge server failed to enforce authentication during initialization, allowing local attackers to bypass security controls. This failure to wire credentials turned the secure browser environment into an open proxy, permitting arbitrary Chrome DevTools Protocol (CDP) execution and session hijacking.
A logic flaw in the Picklescan security tool allows attackers to bypass malware detection in PyTorch models. By dynamically generating the file header (magic number) using pickle opcodes, an attacker can cause the scanner to abort analysis early, effectively hiding malicious payloads located later in the file stream.
CVE-2023-38545 is a high-severity heap-based buffer overflow in curl's SOCKS5 proxy handshake implementation. It affects libcurl versions 7.69.0 through 8.3.0. The vulnerability is triggered when curl is configured to use a SOCKS5 proxy with remote hostname resolution (`socks5h://`) and encounters a slow handshake delay. This race-like condition in the non-blocking state machine allows a hostname up to 65,535 bytes to be copied into a much smaller heap buffer (default 16kB in libcurl), leading to heap corruption, Denial of Service (DoS), or potential Remote Code Execution (RCE).
Back in 2014, the browser landscape was a wild west of plugins, and Oracle's Java SE was the sheriff with a rusty badge. CVE-2014-6492 represents a critical, albeit cryptic, vulnerability in the Java Deployment component that specifically targeted Firefox users. Unlike generic Java exploits that sprayed attacks across all browsers, this one exploited the unique way Firefox's NPAPI (Netscape Plugin API) implementation talked to the Java Virtual Machine (JVM). It allowed a remote attacker to bypass the Java Sandbox entirely, escalating from a simple drive-by web visit to full remote code execution (RCE) with the privileges of the victim.
In the world of binary exploitation, legacy code is the gift that keeps on giving. CVE-2026-21514 is a prime example of 'tech debt' meeting 'logical fallacy.' This high-severity zero-day vulnerability in Microsoft Word allows attackers to bypass critical Object Linking and Embedding (OLE) security mitigations—essentially the digital equivalent of a 'Beware of Dog' sign that gets taken down by the burglar. By manipulating the internal XML structure of a document, an attacker can convince Word that a malicious OLE object is trustworthy, bypassing Mark-of-the-Web (MotW) protections and executing code without the user ever seeing a confirmation prompt.
In the world of enterprise software, nothing ever truly dies; it just becomes a legacy service running with SYSTEM privileges. CVE-2026-26221 is a catastrophic, unauthenticated Remote Code Execution vulnerability in Hyland OnBase's Workflow Timer Service. By leveraging the ancient and insecure .NET Remoting protocol, attackers can turn a helper service into a full-blown command center, executing arbitrary code via insecure deserialization. It’s a classic case of 2005-era architecture meeting modern exploitation tools, resulting in a CVSS 10.0 nightmare.
A deep dive into an Argument Injection vulnerability in OpenClaw's `safeBins` mechanism. By failing to account for shell expansion, the validator allowed attackers to bypass allowlists using wildcards and variables, turning 'harmless' tools like `head` into arbitrary file readers.
Or generate a custom report
Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis
Automated vulnerability intelligence. 715+ reports.