7.2

CVSS4.0

CVE-2026-34512 - OpenClaw < 2026.3.25 - Improper Access Control in /sessions/:sessionKey/kill Endpoint

OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route that allows any bearer-authenticated user to invoke admin-level session termination functions without proper scope validation. Attackers can exploit this by sending authenticated…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 15, 2026, 5:23 p.m.

5.3

CVSS3.1

CVE-2026-40152 - PraisonAIAgents has a Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace …

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() support…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 20, 2026, 6:33 p.m.

7.1

CVSS4.0

CVE-2026-21919 - Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting NETCONF sessions ca…

An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane. When NETCONF sessions are quickly established and dis…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 17, 2026, 6:04 p.m.

8.4

CVSS4.0

CVE-2026-21915 - JSI Virtual Lightweight Collector: Shell escape allows privilege escalation to root

A Permissive List of Allowed Input vulnerability in the CLI of Juniper Networks Support Insights (JSI) Virtual Lightweight Collector (vLWC) allows a local, high privileged attacker to escalate their privileges to root. The CLI menu accepts input without carefully validating it, which allows for sh…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 13, 2026, 3:02 p.m.

5.1

CVSS4.0

CVE-2026-21904 - Junos Space: ilpFilter field on nLegacy.jsp is vulnerable to reflected cross-site script injection

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the list filter field that, when visited by another user, enables the attacker to execute commands with the target's pe…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 13, 2026, 3:02 p.m.

7.7

CVSS3.1

CVE-2026-40150 - PraisonAIAgents has SSRF and Local File Read via Unvalidated URLs in web_crawl Tool

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. …

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 24, 2026, 2:53 p.m.

7.1

CVSS4.0

CVE-2025-59969 - Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will…

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An…

📅 Published: April 9, 2026, 9:25 p.m. 🔄 Last Modified: April 13, 2026, 3:02 p.m.

8.5

CVSS4.0

CVE-2026-33793 - Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, a local …

An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system. When a configuration that allows unsigned Python op scripts is present …

📅 Published: April 9, 2026, 9:24 p.m. 🔄 Last Modified: April 16, 2026, 6:42 p.m.

7.9

CVSS3.1

CVE-2026-40149 - PraisonAI has an Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safety Contro…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is configured (the default). By adding dangerous tool names (e.g., shell_exec, file_write) to the allowli…

📅 Published: April 9, 2026, 9:23 p.m. 🔄 Last Modified: April 20, 2026, 7:53 p.m.

6.5

CVSS3.1

CVE-2026-40148 - PraisonAI Affected by Decompression Bomb DoS via Recipe Bundle Extraction Without Size Limits

PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall() function in PraisonAI's recipe registry validates archive members against path traversal attacks but performs no checks on individual member sizes, cumulative extracted size, or member count before calling tar.extract…

📅 Published: April 9, 2026, 9:22 p.m. 🔄 Last Modified: April 17, 2026, 5:38 p.m.
Total resulsts: 346531
Page 291 of 34,654
« previous page » next page
Filters