8.6

CVSS3.1

CVE-2026-34954 - PraisonAI: SSRF in FileTools.download_file() via Unvalidated URL

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reachโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:54 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.

9.1

CVSS3.1

CVE-2026-34953 - PraisonAI: Authentication Bypass in OAuthManager.validate_token()

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access โ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:54 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.

9.3

CVSS4.0

CVE-2017-20236 - ProSoft Technology ICX35-HWC Command Injection via Web Interface

ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an input validation vulnerability in the web user interface that allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields. Attackers can exploit this vulnerabiโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:54 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

9.1

CVSS3.1

CVE-2026-34952 - PraisonAI: Missing Authentication in WebSocket Gateway

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and theirโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:53 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.

6.5

CVSS3.1

CVE-2026-34939 - PraisonAI: ReDoS via Unvalidated User-Controlled Regex in MCPToolIndex.search_tools()

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Pythoโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:52 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.

8.7

CVSS4.0

CVE-2017-20235 - ProSoft Technology ICX35-HWC Authentication Bypass

ProSoft Technology ICX35-HWC version 1.3 and prior cellular gateways contain an authentication bypass vulnerability in the web user interface that allows unauthenticated attackers to gain access to administrative functions without valid credentials. Attackers can bypass the authentication mechanismโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:51 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

10

CVSS3.1

CVE-2026-34938 - PraisonAI: Python Sandbox Escape via str Subclass startswith() Override in execute_code

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:51 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

7.8

CVSS3.1

CVE-2026-34937 - PraisonAI: Shell Injection in run_python() via Unescaped $() Substitution

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and baโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:50 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

7.7

CVSS3.1

CVE-2026-34936 - PraisonAI: SSRF via Unvalidated api_base in passthrough() Fallback

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the litellm primary path raises AttributeError. No URL โ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:50 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

9.3

CVSS4.0

CVE-2017-20234 - GarrettCom Magnum 6K and 10K Authentication Bypass via Hardcoded String

GarrettCom Magnum 6K and 10K managed switches contain an authentication bypass vulnerability that allows unauthenticated attackers to gain unauthorized access by exploiting a hardcoded string in the authentication mechanism. Attackers can bypass login controls to access administrative functions andโ€ฆ

๐Ÿ“… Published: April 3, 2026, 10:49 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.
Total resulsts: 343923
Page 174 of 34,393
ยซ previous page ยป next page
Filters