Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 10 April 2026

RSS

146 vulnerabilities published on 10 April 2026

Severity:
Totolink A7100RU Router Allows Unauthenticated Password Changes
CVE-2026-5997
A flaw in the Totolink A7100RU router's password management system can allow an attacker to change administrator passwords without needing a password. This means an attacker could gain control of the ...
8.9
Totolink A7100RU Router - Remote Command Injection via CGI Handler
CVE-2026-5996
A security flaw in the Totolink A7100RU router's CGI Handler allows an attacker to execute arbitrary system commands over the internet. This could potentially allow an attacker to gain control of the ...
8.9
Totolink A7100RU Router: Remote Command Execution Possible
CVE-2026-5995
Hackers can potentially run unauthorized commands on the Totolink A7100RU router by manipulating a specific setting. This makes the router vulnerable to attacks from anywhere on the internet. Users sh...
8.9
Totolink A7100RU Router Telnet Configuration Can Be Hacked Remotely
CVE-2026-5994
A security issue in the Totolink A7100RU router's configuration tool allows hackers to remotely access and control the device. This means that an attacker can potentially take control of your router a...
8.9
Totolink A7100RU: Malicious commands can be executed remotely
CVE-2026-5993
A vulnerability in the Totolink A7100RU router's web interface allows an attacker to execute malicious commands on the device, potentially giving them control over the router. This could lead to unaut...
8.9
Tenda F451 Software Allows Remote Attack
CVE-2026-5992
A security flaw in the Tenda F451 software version 1.0.0.7 allows a hacker to potentially take control of the device from a remote location. This could happen if the hacker knows how to manipulate the...
7.4
Tenda F451 Router: Remote Code Execution via Stack Overflow
CVE-2026-5991
The Tenda F451 router's configuration page has a bug that can be exploited by a hacker to execute malicious code remotely. This means a hacker could potentially take control of the router. To protect ...
7.4
Tenda F451 Router Can Crash from Malicious Email Filter Input
CVE-2026-5990
A bug in the Tenda F451 router's email filter can cause the device to crash if it receives a specially crafted email. This can happen remotely, and exploit code is now publicly available. Update your ...
7.4
Tenda F451 1.0.0.7: Remote code execution through manipulated page input
CVE-2026-5989
A critical flaw in the Tenda F451 router's page handling code can allow an attacker to execute malicious code on the router. This could potentially allow the attacker to take control of the router. Up...
7.4
wolfSSL: Man-in-the-middle attack on encrypted data
CVE-2026-5500
An attacker can intercept and modify encrypted data, potentially allowing them to access sensitive information. This affects users of wolfSSL, a cryptographic library used in various systems. To prote...
8.7
wolfSSL with OpenSSL compatibility accepts fake certificates from trusted CAs
CVE-2026-5501
A vulnerability in wolfSSL's OpenSSL compatibility layer allows an attacker to create fake certificates that appear to be from a trusted CA. This could be used to impersonate a trusted website or serv...
8.6
Nginx update fixes four security risks: Denial of Service and Code Execution
RLSA-2026:7343
A security update is available for Nginx, a popular web server software. This update fixes four security issues that could allow hackers to crash the server, modify files, or execute malicious code. T...
8.2
Perfmatters Plugin for WordPress Allows Attackers to Delete Server Files
CVE-2026-4351
The Perfmatters plugin for WordPress is insecure, allowing attackers with Subscriber-level access to delete any file on the server. This could cause your website to stop working or behave unexpectedly...
8.1
MagicINFO 9 Server has default permissions that can be exploited
CVE-2026-25203
The MagicINFO 9 Server has a default permission setting that could allow an attacker to gain elevated access to the system. This means that an unauthorized user could potentially get access to sensiti...
7.8
wolfSSL ChaCha20-Poly1305 Decryption Fails to Verify Authentication Tag
CVE-2026-5479
A flaw in wolfSSL's ChaCha20-Poly1305 decryption process can allow an attacker to tamper with encrypted data without being detected. This affects applications using the EVP API to decrypt data. To pro...
7.6
wolfSSL's ECCSI Signature Verifier Allows Forgery of Any Identity
CVE-2026-5466
A security issue in wolfSSL's ECCSI signature verifier could allow an attacker to create fake signatures that can be used to impersonate anyone, even with limited information. This means an attacker c...
7.6
Tutor LMS plugin for WordPress exposes user billing info to attackers
CVE-2026-3360
An attacker can modify any user's billing information by guessing or finding an incomplete order ID. This can happen because the plugin doesn't check if the user making the change is authorized to do ...
7.5
Important: nodejs:24 security update
RLSA-2026:7350
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Nodejs denial of service (CVE-2026...
7.5
Simple IT Discussion Forum 1.0 Allows Unrestricted Database Access
CVE-2026-6004
A security issue in Simple IT Discussion Forum 1.0 allows attackers to access sensitive database information. This could lead to unauthorized changes or theft of data. Update to the latest version of ...
6.9
WordPress AddFunc Head & Footer Code plugin allows attackers to inject scripts
CVE-2026-2305
An attacker with Contributor-level access or higher can inject malicious scripts into WordPress websites using the AddFunc Head & Footer Code plugin. This can happen when an administrator previews or ...
6.4
Webling Plugin for WordPress: Malicious Code Injection Risk
CVE-2026-1263
The Webling plugin for WordPress has a security flaw that allows hackers to inject malicious code into certain areas of the admin dashboard, potentially allowing them to take control of the site. This...
6.4
CodeAstro Online Classroom: SQL Injection Vulnerability Exposes User Data
CVE-2026-6010
An attacker can exploit a flaw in CodeAstro Online Classroom to access sensitive information. This could happen if a malicious user manipulates certain input fields. To protect your data, update to th...
5.3
itsourcecode Construction Management System 1.0 File Deletion Vulnerability
CVE-2026-6007
A flaw in the itsourcecode Construction Management System 1.0 allows an attacker to access sensitive information by manipulating a file deletion function. This could put your company's data at risk. U...
5.3
Patient Record Management System 1.0: Malicious Data Injection Risk
CVE-2026-6006
A security flaw in Patient Record Management System 1.0 allows hackers to potentially inject malicious data into the system. This could compromise sensitive patient information. Update the software to...
5.3
Patient Record Management System 1.0: Unauthorized Data Access Risk
CVE-2026-6005
A security issue has been discovered in the Patient Record Management System 1.0. If an attacker manipulates certain data, they may be able to access sensitive patient information without permission. ...
5.3