Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2026-33776 | 5.5 (v3.1) 6.8 (v4.0) | Junos OS and Junos OS Evolved: Specific low privileged… |
Juniper Networks |
Junos OS |
2026-04-09T21:34:50.469Z | 2026-04-10T14:13:45.754Z |
| cve-2026-33774 | 6.5 (v3.1) 6.9 (v4.0) | Junos OS: MX Series: Firewall filters on lo0.<non-0> i… |
Juniper Networks |
Junos OS |
2026-04-09T21:34:21.126Z | 2026-04-10T14:14:24.774Z |
| cve-2026-33771 | 7.4 (v3.1) 9.1 (v4.0) | CTP OS: Configuring password requirements does not wor… |
Juniper Networks |
CTP OS |
2026-04-09T21:33:57.007Z | 2026-04-13T18:06:19.274Z |
| cve-2025-13914 | 8.7 (v3.1) 7 (v4.0) | Apstra: SSH host key validation vulnerability for mana… |
Juniper Networks |
Apstra |
2026-04-09T21:32:14.834Z | 2026-04-14T14:35:15.915Z |
| cve-2026-33797 | 7.4 (v3.1) 7.1 (v4.0) | Junos OS and Junos OS Evolved: An attacker sending a s… |
Juniper Networks |
Junos OS |
2026-04-09T21:31:22.902Z | 2026-04-23T20:08:35.655Z |
| cve-2026-33779 | 6.5 (v3.1) 8.3 (v4.0) | Junos OS: SRX Series: Insufficient certificate verific… |
Juniper Networks |
Junos OS |
2026-04-09T21:30:56.635Z | 2026-04-13T18:06:19.571Z |
| cve-2026-5982 | D-Link DIR-605L POST Request formAdvNetwork buffer overflow |
D-Link |
DIR-605L |
2026-04-09T21:30:18.192Z | 2026-04-10T13:56:49.891Z | |
| cve-2026-33775 | 6.5 (v3.1) 7.1 (v4.0) | Junos OS: MX Series: Mismatch between configured and r… |
Juniper Networks |
Junos OS |
2026-04-09T21:30:08.528Z | 2026-04-13T18:06:19.695Z |
| cve-2026-40151 | PraisonAI Affected by Unauthenticated Information Disc… |
MervinPraison |
PraisonAI |
2026-04-09T21:29:47.415Z | 2026-04-10T17:10:27.256Z | |
| cve-2026-33782 | 6.5 (v3.1) 8.7 (v4.0) | Junos OS: MX Series: In specific DHCPv6 scenarios jdhc… |
Juniper Networks |
Junos OS |
2026-04-09T21:29:45.496Z | 2026-04-13T18:06:19.824Z |
| cve-2026-33780 | 6.5 (v3.1) 7.1 (v4.0) | Junos OS and Junos OS Evolved: In an EVPN-MPLS scenari… |
Juniper Networks |
Junos OS |
2026-04-09T21:29:20.534Z | 2026-04-13T18:06:19.950Z |
| cve-2026-33773 | 5.8 (v3.1) 6.9 (v4.0) | Junos OS: EX Series, QFX Series: If the same egress fi… |
Juniper Networks |
Junos OS |
2026-04-09T21:28:56.625Z | 2026-04-13T18:06:20.091Z |
| cve-2026-33786 | 5.5 (v3.1) 6.8 (v4.0) | Junos OS: SRX1600, SRX2300, SRX4300: When a specific s… |
Juniper Networks |
Junos OS |
2026-04-09T21:28:29.648Z | 2026-04-13T18:06:20.220Z |
| cve-2026-21916 | 7.3 (v3.1) 7 (v4.0) | Junos OS: A low privileged user can escalate their pri… |
Juniper Networks |
Junos OS |
2026-04-09T21:28:05.552Z | 2026-04-13T13:04:16.395Z |
| cve-2026-40153 | PraisonAIAgents Affected by Environment Variable Secre… |
MervinPraison |
PraisonAIAgents |
2026-04-09T21:27:45.545Z | 2026-04-13T15:37:40.235Z | |
| cve-2026-33788 | 7.8 (v3.1) 8.5 (v4.0) | Junos OS Evolved: Local, authenticated attacker can ga… |
Juniper Networks |
Junos OS Evolved |
2026-04-09T21:27:44.046Z | 2026-04-13T13:04:16.251Z |
| cve-2026-35646 | 6.3 (v4.0) 4.8 (v3.1) | OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit B… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:11.563Z | 2026-04-10T13:57:32.078Z |
| cve-2026-35645 | 6.1 (v4.0) 8.1 (v3.1) | OpenClaw < 2026.3.25 - Privilege Escalation via Synthe… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:10.890Z | 2026-04-10T17:12:00.441Z |
| cve-2026-35644 | 7.1 (v4.0) 6.5 (v3.1) | OpenClaw < 2026.3.22 - Credential Exposure via baseUrl… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:10.193Z | 2026-04-10T15:55:06.465Z |
| cve-2026-35642 | 5.3 (v4.0) 4.3 (v3.1) | OpenClaw < 2026.3.25 - Authorization Bypass in Group R… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:09.493Z | 2026-04-13T18:08:36.617Z |
| cve-2026-35640 | 6.9 (v4.0) 5.3 (v3.1) | OpenClaw < 2026.3.25 - Denial of Service via Unauthent… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:08.792Z | 2026-04-10T12:29:52.811Z |
| cve-2026-35639 | 8.7 (v4.0) 8.8 (v3.1) | OpenClaw < 2026.3.22 - Privilege Escalation via device… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:08.064Z | 2026-04-14T03:11:11.176Z |
| cve-2026-35638 | 8.7 (v4.0) 8.8 (v3.1) | OpenClaw < 2026.3.22 - Privilege Escalation via Self-D… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:07.349Z | 2026-04-10T13:58:19.688Z |
| cve-2026-35637 | 6.9 (v4.0) 7.3 (v3.1) | OpenClaw < 2026.3.22 - Premature Cite Expansion Before… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:06.620Z | 2026-04-10T17:13:18.224Z |
| cve-2026-35636 | 7.1 (v4.0) 6.5 (v3.1) | OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Byp… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:05.899Z | 2026-04-13T15:37:47.279Z |
| cve-2026-35635 | 6.3 (v4.0) 4.8 (v3.1) | OpenClaw < 2026.3.22 - Webhook Path Route Replacement … |
OpenClaw |
OpenClaw |
2026-04-09T21:27:05.119Z | 2026-04-13T18:11:18.830Z |
| cve-2026-35634 | 5.1 (v4.0) 5.1 (v3.1) | OpenClaw < 2026.3.23 - Authentication Bypass via Local… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:04.328Z | 2026-04-10T12:30:19.947Z |
| cve-2026-35633 | 6.9 (v4.0) 5.3 (v3.1) | OpenClaw < 2026.3.22 - Unbounded Memory Allocation via… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:03.600Z | 2026-04-14T03:10:02.033Z |
| cve-2026-35632 | 6.9 (v4.0) 7.1 (v3.1) | OpenClaw < 2026.2.22 - Symlink Traversal via IDENTITY.… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:02.813Z | 2026-04-10T13:59:38.855Z |
| cve-2026-35631 | 7.1 (v4.0) 6.5 (v3.1) | OpenClaw < 2026.3.22 - Missing Authorization Enforceme… |
OpenClaw |
OpenClaw |
2026-04-09T21:27:01.899Z | 2026-04-10T17:14:31.600Z |
| ID | Description | Updated |
|---|
| ID | Description | Updated |
|---|
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2023-avi-0224 | Multiples vulnérabilités dans les routeurs Cisco Small Business | 2023-03-15T00:00:00.000000 | 2023-03-15T00:00:00.000000 |
| certfr-2023-avi-0223 | Multiples vulnérabilités dans les produits Mozilla | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0221 | Multiples vulnérabilités dans MOXA NPort 6000 | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0220 | Multiples vulnérabilités dans les produits Siemens | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0219 | Multiples vulnérabilités dans IBM Sterling B2B Integrator | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0218 | Multiples vulnérabilités dans les produits Schneider Electric | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0217 | Multiples vulnérabilités dans TrendMicro Worry-Free Business Security | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0216 | Vulnérabilité dans les produits Tenable | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-avi-0215 | Vulnérabilité dans TrendMicro TXOne StellarOne | 2023-03-13T00:00:00.000000 | 2023-03-13T00:00:00.000000 |
| certfr-2023-avi-0214 | Multiples vulnérabilités dans les produits IBM | 2023-03-13T00:00:00.000000 | 2023-03-13T00:00:00.000000 |
| certfr-2023-avi-0213 | Vulnérabilité dans SPIP | 2023-03-10T00:00:00.000000 | 2023-03-13T00:00:00.000000 |
| certfr-2023-avi-0212 | Multiples vulnérabilités dans le noyau Linux de RedHat | 2023-03-10T00:00:00.000000 | 2023-03-10T00:00:00.000000 |
| certfr-2023-avi-0211 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2023-03-10T00:00:00.000000 | 2023-03-10T00:00:00.000000 |
| certfr-2023-avi-0210 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2023-03-10T00:00:00.000000 | 2023-03-10T00:00:00.000000 |
| certfr-2023-avi-0209 | Multiples vulnérabilités dans Google Android | 2023-03-10T00:00:00.000000 | 2023-03-10T00:00:00.000000 |
| certfr-2023-avi-0208 | Multiples vulnérabilités dans Nessus | 2023-03-10T00:00:00.000000 | 2023-03-10T00:00:00.000000 |
| certfr-2023-avi-0207 | Vulnérabilité dans Cisco IOS XR | 2023-03-09T00:00:00.000000 | 2023-03-09T00:00:00.000000 |
| certfr-2023-avi-0206 | Multiples vulnérabilités dans les produits Apple | 2023-03-09T00:00:00.000000 | 2023-03-09T00:00:00.000000 |
| certfr-2023-avi-0205 | Multiples vulnérabilités dans IBM WebSphere | 2023-03-09T00:00:00.000000 | 2023-03-10T00:00:00.000000 |
| certfr-2023-avi-0204 | Vulnérabilité dans Moxa MXsecurity | 2023-03-08T00:00:00.000000 | 2023-05-25T00:00:00.000000 |
| certfr-2023-avi-0203 | Vulnérabilité dans Veeam Backup | 2023-03-08T00:00:00.000000 | 2023-03-08T00:00:00.000000 |
| certfr-2023-avi-0202 | Multiples vulnérabilités dans Google Chrome | 2023-03-08T00:00:00.000000 | 2023-03-08T00:00:00.000000 |
| certfr-2023-avi-0201 | Multiples vulnérabilités dans Tenable Nessus | 2023-03-08T00:00:00.000000 | 2023-03-08T00:00:00.000000 |
| certfr-2023-avi-0200 | Multiples vulnérabilités dans Apache HTTP Server | 2023-03-08T00:00:00.000000 | 2023-03-08T00:00:00.000000 |
| certfr-2023-avi-0199 | Multiples vulnérabilités dans les produits Fortinet | 2023-03-08T00:00:00.000000 | 2023-03-09T00:00:00.000000 |
| certfr-2023-avi-0198 | Multiples vulnérabilités dans les produits IBM | 2023-03-06T00:00:00.000000 | 2023-03-06T00:00:00.000000 |
| certfr-2023-avi-0197 | Multiples vulnérabilités dans VMware Spring | 2023-03-06T00:00:00.000000 | 2023-03-06T00:00:00.000000 |
| certfr-2023-avi-0196 | Multiples vulnérabilités dans les produits SonicWall | 2023-03-03T00:00:00.000000 | 2023-03-03T00:00:00.000000 |
| certfr-2023-avi-0195 | Multiples vulnérabilités dans les produits RedHat | 2023-03-03T00:00:00.000000 | 2023-03-03T00:00:00.000000 |