Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
9.2 CRITICAL
CVE-2026-35556 — Plaintext storage of a password in OpenPLC_V3

OpenPLC_V3 is vulnerable to a Plaintext Storage of a Password vulnerability that could allow an attacker to retrieve credentials and access sensitive information.

openplc_v3_firmware openplc_v3 | Remote | Cryptography
Apr 09, 2026 Apr 16, 2026
Apr 09, 2026
Apr 16, 2026
6.1 MEDIUM
CVE-2026-35195 — Wasmtime has an out-of-bounds write or crash when transcoding component model strings

Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings between components contains a bug where the return value of a gues…

wasmtime | Remote | Memory Corruption
Apr 09, 2026 Apr 15, 2026
Apr 09, 2026
Apr 15, 2026
7.5 HIGH
CVE-2026-35186 — Wasmtime has an improperly masked return value from `table.grow` with Winch compiler back…

Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler backend contains a bug where translating the table.grow operator causes the result t…

wasmtime | Remote | Denial of Service
Apr 09, 2026 Apr 15, 2026
Apr 09, 2026
Apr 15, 2026
6.3 MEDIUM
CVE-2026-34988 — Wasmtime leaks data between pooling allocator instances

Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of its pooling allocator contains a bug where in certain configurations the contents…

wasmtime | Remote | Memory Corruption
Apr 09, 2026 Apr 15, 2026
Apr 09, 2026
Apr 15, 2026
9.9 CRITICAL
CVE-2026-34987 — Wasmtime with Winch compiler backend on aarch64 may allow a sandbox-escaping memory access

Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime with its Winch (baseline) non-default compiler backend may allow properly constructed guest Wasm to a…

wasmtime | Remote | Memory Corruption
Apr 09, 2026 Apr 15, 2026
Apr 09, 2026
Apr 15, 2026
5.0 MEDIUM
CVE-2026-34983 — Wasmtime has a use-after-free bug after cloning `wasmtime::Linker`

Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be trig…

wasmtime | Memory Corruption
Apr 09, 2026 Apr 15, 2026
Apr 09, 2026
Apr 15, 2026
9.0 CRITICAL
CVE-2026-34971 — Wasmtime miscompiled guest heap access enables sandbox escape on aarch64 Cranelift

Wasmtime is a runtime for WebAssembly. From 32.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Cranelift compilation backend contains a bug on aarch64 when performing a certain shape of heap acc…

wasmtime | Remote | Memory Corruption
Apr 09, 2026 Apr 15, 2026
Apr 09, 2026
Apr 15, 2026
5.9 MEDIUM
CVE-2026-34946 — Wasmtime's host panics when Winch compiler executes `table.fill`

Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler contains a vulnerability where the compilation of the table.fill instruction can res…

wasmtime | Remote | Denial of Service
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
2.3 LOW
CVE-2026-34945 — Wasmtime leaks host data with 64-bit tables and Winch

Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler contains a bug where a 64-bit table, part of the memory64 proposal of WebAssembly, i…

wasmtime | Remote | Information Disclosure
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
4.1 MEDIUM
CVE-2026-34944 — Wasmtime segfault or unused out-of-sandbox load with `f64x2.splat` operator on x86-64

Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, On x86-64 platforms with SSE3 disabled Wasmtime's compilation of the f64x2.splat WebAssembly instruction with Crane…

wasmtime | Memory Corruption
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
5.6 MEDIUM
CVE-2026-34943 — Wasmtime panics when lifting `flags` component value

Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val…

wasmtime | Remote | Denial of Service
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
5.9 MEDIUM
CVE-2026-34942 — Wasmtime panics when transcoding misaligned utf-16 strings

Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings into the Component Model's utf16 or latin1+utf16 encodings imprope…

wasmtime | Remote | Denial of Service
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
6.9 MEDIUM
CVE-2026-34941 — Wasmtime has a Heap OOB read in component model UTF-16 to latin1+utf16 string transcoding

Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encodi…

wasmtime | Remote | Memory Corruption
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
9.8 CRITICAL
CVE-2026-31170 — ToToLink A3300R Command Injection Vulnerability

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stun-pass parameter to /cgi-bin/cstecgi.cgi.

Remote | Injection
Apr 09, 2026 Apr 14, 2026
Apr 09, 2026
Apr 14, 2026
9.2 CRITICAL
CVE-2026-28205 — Initialization of a resource with an insecure default in OpenPLC_V3

OpenPLC_V3 is vulnerable to an Initialization of a Resource with an Insecure Default vulnerability which could allow an attacker to gain access to the system by bypassing authentication via an API.

Remote | Authentication
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
7.5 HIGH
CVE-2026-5971 — FoundationAgents MetaGPT XML action_node.py ActionNode.xml_fill eval injection

A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Exe…

Remote | XML External Entity
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
7.5 HIGH
CVE-2026-5970 — FoundationAgents MetaGPT HumanEvalBenchmark/MBPPBenchmark check_solution code injection

A vulnerability was detected in FoundationAgents MetaGPT up to 0.8.1. This affects the function check_solution of the component HumanEvalBenchmark/MBPPBenchmark. Performing a manipulation results in …

Remote | Injection
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
8.5 HIGH
CVE-2026-5329 — Rapid7 Velociraptor Improper Input Validation in Client Message Handler

Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an au…

velociraptor | Remote | Misconfiguration
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
1.7 LOW
CVE-2026-40072 — web3.py affected by SSRF via CCIP Read (EIP-3668) OffchainLookup URL handling

web3.py allows you to interact with the Ethereum blockchain using Python. From 6.0.0b3 to before 7.15.0 and 8.0.0b2, web3.py implements CCIP Read / OffchainLookup (EIP-3668) by performing HTTP reques…

Remote | Server-Side Request Forgery
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
5.4 MEDIUM
CVE-2026-40071 — pyLoad WebUI JSON permission mismatch lets ADD/DELETE users invoke MODIFY-only actions

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the /json/package_order, /json/link_order, and /json/abort_link WebUI JSON endpoints enforce weaker permis…

pyload pyload-ng | Remote | Authorization
Apr 09, 2026 Apr 13, 2026
Apr 09, 2026
Apr 13, 2026
Showing 20 of 6503 Results