Overview
- lostisland
- faraday
09 Feb 2026
Published
10 Feb 2026
Updated
CVSS v3.1
MEDIUM (5.8)
EPSS
0.01%
KEV
Description
Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.
Statistics
- 1 Post
- 1 Interaction
Last activity: 23 hours ago
Bluesky
Overview
- Siemens
- SINEC Security Monitor
08 Oct 2024
Published
10 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.9)
EPSS
2.95%
KEV
Description
A vulnerability has been identified in SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command.
This could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS.
Statistics
- 1 Post
Last activity: 23 hours ago
Overview
- OpenClaw
- OpenClaw
05 Mar 2026
Published
06 Mar 2026
Updated
CVSS v4.0
CRITICAL (9.2)
EPSS
Pending
KEV
Description
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.
Statistics
- 1 Post
Last activity: 21 hours ago
Overview
- siyuan-note
- siyuan
06 Mar 2026
Published
06 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.3)
EPSS
0.03%
KEV
Description
SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when type=8, attacker-controlled content is embedded into SVG output without escaping. Because the endpoint is unauthenticated and returns image/svg+xml, a crafted URL can inject executable SVG/HTML event handlers (for example onerror) and run JavaScript in the SiYuan web origin. This can be chained to perform authenticated API actions and exfiltrate sensitive data when a logged-in user opens the malicious link. This issue has been patched in version 3.5.9.
Statistics
- 1 Post
Last activity: 21 hours ago
Overview
- WWBN
- AVideo-Encoder
06 Mar 2026
Published
09 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%
KEV
Description
AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.
Statistics
- 1 Post
Last activity: 22 hours ago
Overview
- zitadel
- zitadel
07 Mar 2026
Published
09 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.3)
EPSS
0.03%
KEV
Description
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0.
Statistics
- 1 Post
Last activity: 23 hours ago
Overview
- DeltaWW
- COMMGR2
09 Mar 2026
Published
09 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%
KEV
Description
Delta Electronics COMMGR2 has
Stack-based Buffer Overflow vulnerability.
Statistics
- 1 Post
Last activity: 22 hours ago
Overview
- Siemens
- SINEC Security Monitor
08 Oct 2024
Published
10 Mar 2026
Updated
CVSS v3.1
HIGH (8.8)
EPSS
0.11%
KEV
Description
A vulnerability has been identified in SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command.
This could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS.
Statistics
- 1 Post
Last activity: 22 hours ago
Overview
Description
This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.
Statistics
- 1 Post
Last activity: 21 hours ago