Total CVEs

124,116

Critical Severity

2,092

High Severity

7,265

Last 7 Days

1,051
Quick preset (or use dates below)
Clear Filters
๐Ÿ“† Custom Date Range: Apr 9, 2026 - Apr 9, 2026 Clear Custom Dates โ†’
Showing 1 - 20 of 263 CVEs
CVE-2026-5988 HIGH - 8.8

A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Performing a manipulation of the argument mit_ssid results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be use...

Published: Apr 09, 2026
Source: NVD
CVE-2026-5987 MEDIUM - 4.7

A security vulnerability has been detected in Sanluan PublicCMS up to 6.202506.d. This affects the function AbstractFreemarkerView.doRender of the file publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/base/AbstractFreemarkerView.java of the component FreeMarker Template Handler. Su...

Published: Apr 09, 2026
Source: NVD
CVE-2026-5986 MEDIUM - 5.3

A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted element is the function getTime in the library lib/util.js. This manipulation of the argument timestamp causes inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has b...

Published: Apr 09, 2026
Source: NVD
CVE-2026-5985 HIGH - 7.3

A security flaw has been discovered in code-projects Simple IT Discussion Forum 1.0. The affected element is an unknown function of the file /crud.php. The manipulation of the argument user_Id results in sql injection. The attack may be performed from remote. The exploit has been released to the pub...

Published: Apr 09, 2026
Source: NVD

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the appli...

Published: Apr 09, 2026
Source: NVD

A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes are not validated.

Published: Apr 09, 2026
Source: NVD

In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared WOLFSSL_CTX when no inner SNI was configured. TLSX_EchRestoreSNI then failed to clean it up because...

Published: Apr 09, 2026
Source: NVD

A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() function in wolfcrypt/src/pkcs7.c. When processing a CMS EnvelopedData message containing an OtherRecipientInfo (ORI) recipient, the function copies an ASN.1-parsed OID into a fixed 32-byte stack buffe...

Published: Apr 09, 2026
Source: NVD
CVE-2026-34424 CRITICAL - 9.8

Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system that allows unauthenticated attackers to execute arbitrary code and commands. Attackers can trigger pre-authentication remote shell execution via HTT...

Vendor: Nextendweb
Product: Smart Slider 3 Pro for WordPress, Smart Slider 3 Pro for Joomla
Published: Apr 09, 2026
Source: NVD
CVE-2026-5984 HIGH - 8.8

A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formSetLog of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is pu...

Published: Apr 09, 2026
Source: NVD
CVE-2026-5983 HIGH - 8.8

A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit...

Published: Apr 09, 2026
Source: NVD
CVE-2026-5982 HIGH - 8.8

A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file /goform/formAdvNetwork of the component POST Request Handler. Performing a manipulation of the argument curTime results in buffer overflow. Remote exploitation of the attack is po...

Published: Apr 09, 2026
Source: NVD
CVE-2026-5981 HIGH - 8.8

A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has bee...

Published: Apr 09, 2026
Source: NVD

Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large va...

Published: Apr 09, 2026
Source: NVD

A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname string, the function reads one byte past the buffer without a bounds chec...

Published: Apr 09, 2026
Source: NVD

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

Published: Apr 09, 2026
Source: NVD

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the nameConstraints of the issuing CA, and wolfSSL would a...

Published: Apr 09, 2026
Source: NVD
CVE-2026-40154 CRITICAL - 9.3

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through malicious templates. This vulnerability is fixed in 4....

Vendor: MervinPraison
Product: PraisonAI
Published: Apr 09, 2026
Source: NVD
CVE-2026-40153 HIGH - 7.4

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_command function in shell_tools.py calls os.path.expandvars() on every command argument at line 64, manually re-implementing shell-level environment variable expansion despite using shell=False (line 88) for security. This ...

Vendor: MervinPraison
Product: PraisonAIAgents
Published: Apr 09, 2026
Source: NVD
CVE-2026-40152 MEDIUM - 5.3

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() sup...

Vendor: MervinPraison
Product: PraisonAIAgents
Published: Apr 09, 2026
Source: NVD