<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://aisecurityradar.com/</loc>
    <lastmod>2026-04-07T14:29:22.974Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/methodology</loc>
    <lastmod>2026-04-07T14:29:22.974Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/privacy</loc>
    <lastmod>2026-04-07T14:29:22.974Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/terms</loc>
    <lastmod>2026-04-07T14:29:22.974Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/security</loc>
    <lastmod>2026-04-07T14:29:22.974Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/2</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/3</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/4</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/5</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/6</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/7</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/8</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/9</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/10</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/11</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/12</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/13</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/14</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/15</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/page/16</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-gemini-oauth-exposed-the-pkce-veri-ghsa-9jpj-g8vv-j5mf</loc>
    <lastmod>2026-04-04T06:26:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-agentic-consent-bypass-llm-agent-c-ghsa-v3qc-wrwx-j3pw</loc>
    <lastmod>2026-04-03T03:03:18.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-221883-crewai-contains-multiple-vulnerab-https-kb-cert-org-vuls-id-22188</loc>
    <lastmod>2026-03-30T15:50:15.603Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-langchain-core-has-path-traversal-vulnerabi-ghsa-qh6h-p6c9-ff54</loc>
    <lastmod>2026-03-27T19:45:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-langflow-has-authenticated-code-execution-i-ghsa-v8hw-mh8c-jxfc</loc>
    <lastmod>2026-03-26T18:31:36.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-claude-code-has-a-workspace-trust-dialog-by-ghsa-mmgp-wc2j-qcv7</loc>
    <lastmod>2026-03-19T12:42:09.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-665416-sglang-sglang-is-vulnerable-to-co-https-kb-cert-org-vuls-id-66541</loc>
    <lastmod>2026-03-12T11:37:56.568Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-siteboon-claude-code-ui-vulnerable-to-unaut-ghsa-gv8f-wpm2-m5wr</loc>
    <lastmod>2026-03-11T00:37:25.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-siteboon-claude-code-ui-is-vulnerable-to-co-ghsa-f2fc-vc88-6w7q</loc>
    <lastmod>2026-03-11T00:25:43.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-siteboon-claude-code-ui-is-vulnerable-to-sh-ghsa-7fv4-fmmc-86g2</loc>
    <lastmod>2026-03-10T23:57:23.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-weknora-vulnerable-to-remote-code-execution-ghsa-8w32-6mrw-q5wv</loc>
    <lastmod>2026-03-06T23:59:20.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-zarf-s-symlink-targets-in-archives-are-not--ghsa-hcm4-6hpj-vghm</loc>
    <lastmod>2026-03-06T22:10:48.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-mercurius-s-querydepth-limit-bypassed-for-w-ghsa-m4h2-mjfm-mp55</loc>
    <lastmod>2026-03-06T18:47:52.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-parse-server-s-endpoint-loginas-allows-read-ghsa-79wj-8rqv-jvp5</loc>
    <lastmod>2026-03-06T18:46:27.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-github-copilot-cli-dangerous-shell-expansio-ghsa-g8r9-g2v8-jv6f</loc>
    <lastmod>2026-03-06T16:43:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-pingora-vulnerable-to-http-request-smugglin-ghsa-xq2h-p299-vjwv</loc>
    <lastmod>2026-03-05T20:55:29.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-gogs-release-tag-option-injection-in-releas-ghsa-v9vm-r24h-6rqm</loc>
    <lastmod>2026-03-05T19:29:44.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-gogs-cross-repository-lfs-object-overwrite--ghsa-cj4v-437j-jq4c</loc>
    <lastmod>2026-03-05T19:14:41.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-svgo-dos-through-entity-expansion-in-doctyp-ghsa-xpqw-6gx7-v673</loc>
    <lastmod>2026-03-04T22:59:28.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fickling-missing-rce-capable-modules-in-uns-ghsa-5hwf-rc88-82xm</loc>
    <lastmod>2026-03-04T21:31:03.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fickling-has-always-check-safety-bypass-pic-ghsa-wccx-j62j-r448</loc>
    <lastmod>2026-03-04T21:30:16.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-jackson-core-has-nesting-depth-constraint-b-ghsa-6v53-7c9g-w56r</loc>
    <lastmod>2026-03-04T21:23:45.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-authlib-setting-alg-none-and-a-blank-signat-ghsa-7wc2-qxgw-g8gg</loc>
    <lastmod>2026-03-04T20:55:47.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-craft-cms-has-unauthenticated-activation-em-ghsa-234q-vvw3-mrfq</loc>
    <lastmod>2026-03-04T20:52:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-time-calibrator-was-removed-from-crates-io--ghsa-77xj-rrh3-wx3v</loc>
    <lastmod>2026-03-04T20:44:35.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-irrd-web-ui-host-header-injection-allows-pa-ghsa-22m3-c7vp-49fj</loc>
    <lastmod>2026-03-04T20:33:21.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-locutus-call-user-func-array-vulnerable-to--ghsa-fp25-p6mj-qqg6</loc>
    <lastmod>2026-03-04T20:19:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vaultwarden-has-privilege-escalation-via-bu-ghsa-r32r-j5jq-3w4m</loc>
    <lastmod>2026-03-04T20:07:21.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-vulnerable-to-local-file-exfiltrat-ghsa-jjgj-cpp9-cvpv</loc>
    <lastmod>2026-03-04T19:28:11.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-hardlink-alias-checks-could-bypass-ghsa-3jx4-q2m7-r496</loc>
    <lastmod>2026-03-04T19:21:04.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-0847-nvd-cve-2026-0847</loc>
    <lastmod>2026-03-04T19:16:10.683Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-2026-002-multiple-vulnerabilities-in-cisco--security-advisories-10939</loc>
    <lastmod>2026-03-04T16:00:42.319Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-2025-042-critical-vulnerability-in-cisco-se-security-advisories-10937</loc>
    <lastmod>2026-03-04T16:00:42.319Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-2025-040-critical-vulnerability-in-windows--security-advisories-10935</loc>
    <lastmod>2026-03-04T16:00:42.319Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-2025-037-multiple-vulnerabilities-in-f5-pro-security-advisories-10932</loc>
    <lastmod>2026-03-04T16:00:42.319Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-2025-036-critical-vulnerabilities-in-cisco--security-advisories-10931</loc>
    <lastmod>2026-03-04T16:00:42.319Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-27966-nvd-cve-2026-27966</loc>
    <lastmod>2026-02-26T02:16:23.833Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fickling-has-safety-check-bypass-via-reduce-ghsa-mhc9-48gj-9gp3</loc>
    <lastmod>2026-02-25T15:24:18.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fickling-obj-opcode-call-invisibility-bypas-ghsa-mxhj-88fx-4pcv</loc>
    <lastmod>2026-02-24T21:41:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-statamic-is-vulnerable-to-account-takeover--ghsa-jxq9-79vj-rgvw</loc>
    <lastmod>2026-02-24T21:09:23.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fiber-has-a-denial-of-service-vulnerability-ghsa-mrq8-rjmw-wpq3</loc>
    <lastmod>2026-02-24T21:04:07.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fiber-is-vulnerable-to-denial-of-service-vi-ghsa-2mr3-m5q5-wgp6</loc>
    <lastmod>2026-02-24T20:57:25.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fiber-has-an-arbitrary-file-read-in-static--ghsa-m3c2-496v-cw3v</loc>
    <lastmod>2026-02-24T20:51:01.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-wasmtime-wasi-implementations-are-vulnerabl-ghsa-852m-cvvp-9p4w</loc>
    <lastmod>2026-02-24T20:47:08.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-wasmtime-is-vulnerable-to-panic-when-droppi-ghsa-xjhv-v822-pf94</loc>
    <lastmod>2026-02-24T20:44:46.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-caddy-unicode-case-folding-length-expansion-ghsa-5r3v-vc8m-m96g</loc>
    <lastmod>2026-02-24T20:39:08.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-caddy-matchhost-becomes-case-sensitive-for--ghsa-x76f-jf84-rqj8</loc>
    <lastmod>2026-02-24T20:34:01.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-caddy-matchpath-xx-escaped-path-branch-skip-ghsa-g7pc-pc7g-h8jh</loc>
    <lastmod>2026-02-24T20:31:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-caddy-mtls-client-authentication-silently-f-ghsa-hffm-g8v7-wrv7</loc>
    <lastmod>2026-02-24T20:22:53.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-actualbudget-server-is-missing-authenticati-ghsa-m2cq-xjgm-f668</loc>
    <lastmod>2026-02-24T20:13:30.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-mindsdb-path-traversal-in-api-files-leading-ghsa-4894-xqv6-vrfq</loc>
    <lastmod>2026-02-24T20:07:58.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-isso-affected-by-stored-xss-via-comment-web-ghsa-9fww-8cpr-q66r</loc>
    <lastmod>2026-02-24T16:03:04.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-oneuptime-node-vm-sandbox-escape-in-probe-a-ghsa-v264-xqh4-9xmm</loc>
    <lastmod>2026-02-24T16:00:56.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-imagemagick-msl-image-stack-index-may-fail--ghsa-782x-jh29-9mf7</loc>
    <lastmod>2026-02-24T15:45:13.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-imagemagick-policy-bypass-through-path-trav-ghsa-8jvj-p28h-9gm7</loc>
    <lastmod>2026-02-24T15:40:06.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-imagemagick-infinite-loop-vulnerability-whe-ghsa-pqgj-2p96-rx85</loc>
    <lastmod>2026-02-24T15:29:12.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-craft-cms-has-cloud-metadata-ssrf-protectio-ghsa-gp2f-7wcm-5fhx</loc>
    <lastmod>2026-02-23T22:16:01.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-craft-cms-has-stored-xss-in-table-field-via-ghsa-3jh3-prx3-w6wc</loc>
    <lastmod>2026-02-23T22:15:03.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-yt-dlp-arbitrary-command-injection-when-usi-ghsa-g3gw-q23r-pgqm</loc>
    <lastmod>2026-02-23T22:13:58.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-ormar-is-vulnerable-to-sql-injection-throug-ghsa-xxh2-68g9-8jqr</loc>
    <lastmod>2026-02-23T22:12:17.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-new-api-has-an-sql-like-wildcard-injection--ghsa-w6x6-9fp7-fqm4</loc>
    <lastmod>2026-02-23T21:56:47.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-acp-prompt-size-checks-missing-in--ghsa-cxpw-2g23-2vgw</loc>
    <lastmod>2026-02-20T21:52:44.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-avideo-has-stored-cross-site-scripting-via--ghsa-rcqw-6466-3mv7</loc>
    <lastmod>2026-02-20T21:15:06.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-static-web-server-affected-by-timing-based--ghsa-qhp6-635j-x7r2</loc>
    <lastmod>2026-02-20T18:25:27.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-26321-nvd-cve-2026-26321</loc>
    <lastmod>2026-02-19T23:16:25.180Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-safebins-file-existence-oracle-inf-ghsa-6c9j-x93c-rw6j</loc>
    <lastmod>2026-02-19T22:06:26.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-zumba-json-serializer-has-a-potential-php-o-ghsa-v7m3-fpcr-h7m2</loc>
    <lastmod>2026-02-19T22:05:40.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-dagu-affected-by-unauthenticated-rce-via-in-ghsa-6qr9-g2xw-cw92</loc>
    <lastmod>2026-02-19T22:04:39.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-has-a-path-traversal-in-apply-patc-ghsa-r5fq-947m-xm57</loc>
    <lastmod>2026-02-19T20:45:58.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-feathers-has-an-origin-validation-bypass-vi-ghsa-mp4x-c34x-wv3x</loc>
    <lastmod>2026-02-19T20:32:28.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-feathers-has-an-open-redirect-in-oauth-call-ghsa-ppf9-4ffw-hh4p</loc>
    <lastmod>2026-02-19T20:32:15.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-formwork-improperly-managed-privileges-in-u-ghsa-34p4-7w83-35g2</loc>
    <lastmod>2026-02-19T20:31:07.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-leaf-kit-html-escaping-does-not-work-on-cha-ghsa-4hfh-fch3-5q7p</loc>
    <lastmod>2026-02-19T19:40:08.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cilium-may-not-enforce-host-firewall-polici-ghsa-5r23-prx4-mqg3</loc>
    <lastmod>2026-02-19T19:39:01.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-26057-nvd-cve-2026-26057</loc>
    <lastmod>2026-02-19T19:22:29.537Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-keycloak-missing-check-on-disabled-client-f-ghsa-fjf4-6f34-w64q</loc>
    <lastmod>2026-02-19T18:31:51.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-kata-container-to-guest-micro-vm-privilege--ghsa-wwj6-vghv-5p64</loc>
    <lastmod>2026-02-19T15:25:54.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-unauthorized-npm-publish-of-cline-2-3-0-wit-ghsa-9ppg-jx86-fqw7</loc>
    <lastmod>2026-02-19T15:17:10.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-kargo-has-an-authorization-bypass-vulnerabi-ghsa-7g9x-cp9g-92mr</loc>
    <lastmod>2026-02-19T15:16:46.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-kargo-has-missing-authorization-vulnerabili-ghsa-5vvm-67pj-72g4</loc>
    <lastmod>2026-02-19T15:16:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fabric-js-affected-by-stored-xss-via-svg-ex-ghsa-hfvx-25r5-qc3w</loc>
    <lastmod>2026-02-18T22:44:58.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-session-tool-visibility-hardening--ghsa-6hf3-mhgc-cm65</loc>
    <lastmod>2026-02-18T22:43:53.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-docker-container-escape-via-unvali-ghsa-w235-x559-36mg</loc>
    <lastmod>2026-02-18T22:42:42.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-keras-has-a-local-file-disclosure-via-hdf5--ghsa-3m4q-jmj6-r34q</loc>
    <lastmod>2026-02-18T22:41:58.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-redisearch-query-injection-in-langchain-lan-ghsa-5mx2-w598-339m</loc>
    <lastmod>2026-02-18T22:40:09.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-minimatch-has-a-redos-via-repeated-wildcard-ghsa-3ppc-4f35-3m26</loc>
    <lastmod>2026-02-18T22:38:11.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-command-injection-via-unsanitized-locate-ou-ghsa-5vv4-hvf7-2h46</loc>
    <lastmod>2026-02-18T22:36:50.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-go-ethereum-affected-by-dos-via-malicious-p-ghsa-2gjw-fg97-vg3r</loc>
    <lastmod>2026-02-18T22:35:15.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-librenms-sql-injection-in-ajax-table-php-sp-ghsa-h3rv-q4rq-pqcv</loc>
    <lastmod>2026-02-18T22:30:18.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-librenms-has-a-stored-xss-in-custom-oid-uni-ghsa-fqx6-693c-f55g</loc>
    <lastmod>2026-02-18T22:08:15.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-librenms-port-groups-name-stored-cross-site-ghsa-93fx-g747-695x</loc>
    <lastmod>2026-02-18T22:07:42.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-librenms-device-groups-name-stored-cross-si-ghsa-5pqf-54qp-32wx</loc>
    <lastmod>2026-02-18T22:07:19.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-systeminformation-has-a-command-injection-v-ghsa-9c88-49p5-5ggf</loc>
    <lastmod>2026-02-18T21:51:26.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-picklescan-scan-pytorch-bypass-via-dynamic--ghsa-97f8-7cmv-76j2</loc>
    <lastmod>2026-02-18T17:45:52.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-has-an-authentication-bypass-in-sa-ghsa-h9g4-589h-68xv</loc>
    <lastmod>2026-02-18T17:45:31.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-has-two-ssrf-via-sendmediafeishu-a-ghsa-x22m-j5qq-j49m</loc>
    <lastmod>2026-02-18T17:45:12.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-has-a-lfi-in-bluebubbles-media-pat-ghsa-rwj8-p9vq-25gv</loc>
    <lastmod>2026-02-18T17:44:58.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-inter-session-prompts-could-be-tre-ghsa-w5c7-9qqw-6645</loc>
    <lastmod>2026-02-18T00:56:51.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-libredesk-has-a-ssrf-vulnerability-in-webho-ghsa-wgm6-9rvv-3438</loc>
    <lastmod>2026-02-18T00:56:30.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-command-hijacking-via-unsafe-path--ghsa-jqpq-mgvm-f9r6</loc>
    <lastmod>2026-02-18T00:55:50.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-affected-by-denial-of-service-via--ghsa-q447-rj3r-2cgh</loc>
    <lastmod>2026-02-18T00:53:07.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-affected-by-denial-of-service-thro-ghsa-h89v-j3x9-8wqj</loc>
    <lastmod>2026-02-18T00:52:54.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-denial-of-service-through-large-ba-ghsa-w2cg-vxx6-5xjg</loc>
    <lastmod>2026-02-18T00:52:36.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-exec-approvals-safebins-could-bypa-ghsa-xvhf-x56f-2hpp</loc>
    <lastmod>2026-02-18T00:50:47.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-has-a-command-injection-in-maintai-ghsa-m7x8-2w3w-pr42</loc>
    <lastmod>2026-02-18T00:46:54.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-google-chat-spoofing-access-with-a-ghsa-chm2-m3w2-wcxm</loc>
    <lastmod>2026-02-17T22:56:39.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-node-host-system-run-rawcommand-co-ghsa-h3f9-mjwj-w476</loc>
    <lastmod>2026-02-17T21:42:49.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-has-a-local-file-disclosure-via-se-ghsa-8jpq-5h99-ff5r</loc>
    <lastmod>2026-02-17T21:41:52.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-macos-deep-link-confirmation-trunc-ghsa-7q2j-c4q5-rm27</loc>
    <lastmod>2026-02-17T21:41:40.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-twitch-allowfrom-is-not-enforced-i-ghsa-33rq-m5x2-fvgf</loc>
    <lastmod>2026-02-17T21:37:55.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-s-unauthenticated-nostr-profile-ht-ghsa-mv9j-6xhh-g383</loc>
    <lastmod>2026-02-17T21:31:17.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-openclaw-affected-by-ssrf-via-attachment-me-ghsa-wfp2-v9c7-fh79</loc>
    <lastmod>2026-02-17T21:30:48.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-fast-xml-parser-affected-by-dos-through-ent-ghsa-jmr7-xgp7-cmfj</loc>
    <lastmod>2026-02-17T21:30:10.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-improper-digest-verification-in-httpsig-hyp-ghsa-7v42-g35v-xrch</loc>
    <lastmod>2026-02-17T21:29:34.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-skill-scanner-unsecured-network-binding-vul-ghsa-ppfx-73j5-fhxc</loc>
    <lastmod>2026-02-17T18:55:39.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-pterodactyl-panel-allows-cross-node-server--ghsa-g7vw-f8p5-c728</loc>
    <lastmod>2026-02-17T18:54:49.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-indico-has-server-side-request-forgery-ssrf-ghsa-f47c-3c5w-v7p4</loc>
    <lastmod>2026-02-17T18:53:25.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-unauthenticated-file-upload-in-gogs-ghsa-fc-ghsa-fc3h-92p8-h36f</loc>
    <lastmod>2026-02-17T18:44:07.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-gogs-has-a-protected-branch-deletion-bypass-ghsa-2c6v-8r3v-gh6p</loc>
    <lastmod>2026-02-17T18:43:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-gogs-has-an-authorization-bypass-allows-cro-ghsa-cv22-72px-f4gh</loc>
    <lastmod>2026-02-17T18:42:08.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-known-affected-by-account-takeover-via-pass-346</loc>
    <lastmod>2026-02-13T22:49:27.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cloudflare-agents-has-a-reflected-cross-sit-347</loc>
    <lastmod>2026-02-13T21:04:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-wildfly-elytron-integration-susceptible-to--ghsa-qhp6-6p8p-2rqh</loc>
    <lastmod>2026-02-13T20:52:26.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-26268-nvd-cve-2026-26268</loc>
    <lastmod>2026-02-13T17:16:14.227Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cloudflare-agents-is-vulnerable-to-reflecte-ghsa-cvhv-6xm6-c3v4</loc>
    <lastmod>2026-02-13T03:31:23.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-1731-cisa-kev-cve-2026-1731</loc>
    <lastmod>2026-02-13T00:00:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-magiclink-insecure-deserialization-of-magic-ghsa-r33w-fg8j-9c94</loc>
    <lastmod>2026-02-12T22:11:56.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-arbitrary-wasm-code-execution-via-annotatio-ghsa-wj8p-jj64-h7ff</loc>
    <lastmod>2026-02-12T22:06:45.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-unauthenticated-admission-webhook-endpoints-ghsa-965m-v4cc-6334</loc>
    <lastmod>2026-02-12T22:06:36.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cedipay-affected-by-improper-input-validati-ghsa-wvr6-395c-5pxr</loc>
    <lastmod>2026-02-12T17:04:50.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-qs-s-arraylimit-bypass-in-comma-parsing-all-ghsa-w7fw-mjwx-w883</loc>
    <lastmod>2026-02-12T17:04:39.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-xwiki-vulnerable-to-click-jacking-through-c-ghsa-74rh-c5rh-88vg</loc>
    <lastmod>2026-02-12T15:54:19.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-frankenphp-s-unicode-case-folding-length-ex-ghsa-g966-83w7-6w38</loc>
    <lastmod>2026-02-12T15:29:36.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-webtransport-go-memory-exhaustion-attack-du-ghsa-2f2x-8mwp-p2gc</loc>
    <lastmod>2026-02-12T15:29:11.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-webtransport-go-memory-exhaustion-attack-du-ghsa-g6x7-jq8p-6q9q</loc>
    <lastmod>2026-02-12T15:28:52.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2025-15556-cisa-kev-cve-2025-15556</loc>
    <lastmod>2026-02-12T00:00:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-458422-casl-ability-contains-a-prototype-https-kb-cert-org-vuls-id-45842</loc>
    <lastmod>2026-02-10T15:14:08.814Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2025-32393-nvd-cve-2025-32393</loc>
    <lastmod>2026-02-05T23:15:52.763Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-24423-cisa-kev-cve-2026-24423</loc>
    <lastmod>2026-02-05T00:00:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-23760-cisa-kev-cve-2026-23760</loc>
    <lastmod>2026-01-26T00:00:00.000Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-22793-nvd-cve-2026-22793</loc>
    <lastmod>2026-01-21T21:16:10.107Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-481830-libheif-uncompressed-codec-lacks--https-kb-cert-org-vuls-id-48183</loc>
    <lastmod>2026-01-20T19:56:22.846Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-458022-open5gs-webui-uses-a-hard-coded-s-https-kb-cert-org-vuls-id-45802</loc>
    <lastmod>2026-01-20T17:41:53.104Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-271649-stack-based-buffer-overflow-in-li-https-kb-cert-org-vuls-id-27164</loc>
    <lastmod>2026-01-20T16:27:51.898Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-818729-safetica-contains-a-kernel-driver-https-kb-cert-org-vuls-id-81872</loc>
    <lastmod>2026-01-20T13:35:14.934Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-244846-server-side-template-injection-ss-https-kb-cert-org-vuls-id-24484</loc>
    <lastmod>2026-01-20T13:33:36.108Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-924114-dr-flac-contains-an-integer-overf-https-kb-cert-org-vuls-id-92411</loc>
    <lastmod>2026-01-20T11:49:59.863Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-23523-nvd-cve-2026-23523</loc>
    <lastmod>2026-01-16T17:15:54.480Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-650657-livewire-filemanager-contains-an--https-kb-cert-org-vuls-id-65065</loc>
    <lastmod>2026-01-16T12:43:50.126Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-472136-information-leak-and-dos-vulnerab-https-kb-cert-org-vuls-id-47213</loc>
    <lastmod>2026-01-15T15:16:43.150Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-22813-nvd-cve-2026-22813</loc>
    <lastmod>2026-01-12T23:15:53.523Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2025-68472-nvd-cve-2025-68472</loc>
    <lastmod>2026-01-12T17:15:52.887Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2026-21869-nvd-cve-2026-21869</loc>
    <lastmod>2026-01-08T00:16:00.297Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-vu-420440-vulnerable-python-version-used-in-https-kb-cert-org-vuls-id-42044</loc>
    <lastmod>2026-01-06T14:38:37.357Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2025-67732-nvd-cve-2025-67732</loc>
    <lastmod>2026-01-05T22:15:51.837Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2025-68669-nvd-cve-2025-68669</loc>
    <lastmod>2025-12-23T23:15:45.470Z</lastmod>
  </url>
  <url>
    <loc>https://aisecurityradar.com/incidents/ai-security-incident-cve-2025-66580-nvd-cve-2025-66580</loc>
    <lastmod>2025-12-19T17:15:53.243Z</lastmod>
  </url>
</urlset>