Search

Search Results (342973 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-29085 1 Hono 1 Hono 2026-03-06 6.5 Medium
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\r) or newline (\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4.
CVE-2026-29086 1 Hono 1 Hono 2026-03-06 5.4 Medium
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, the setCookie() utility did not validate semicolons (;), carriage returns (\r), or newline characters (\n) in the domain and path options when constructing the Set-Cookie header. Because cookie attributes are delimited by semicolons, this could allow injection of additional cookie attributes if untrusted input was passed into these fields. This issue has been patched in version 4.12.4.
CVE-2025-70218 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.
CVE-2025-70220 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAutoDetecWAN_wizard4.
CVE-2025-70223 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvNetwork.
CVE-2025-70226 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWizard.
CVE-2025-70219 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot.
CVE-2025-70221 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin.
CVE-2025-70225 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component
CVE-2025-70222 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode.
CVE-2025-70229 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.
CVE-2025-70230 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.
CVE-2025-70231 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.
CVE-2025-70232 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.
CVE-2025-70233 1 Dlink 2 Dir-513, Dir-513 Firmware 2026-03-06 9.8 Critical
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.
CVE-2026-28484 1 Openclaw 1 Openclaw 2026-03-06 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-65085 1 Ashlar 5 Argon, Cobalt, Cobalt Share and 2 more 2026-03-06 9.8 Critical
A Heap-based Buffer Overflow vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that could allow an attacker to disclose information or execute arbitrary code.
CVE-2026-27123 2026-03-06 N/A
Reason: This candidate was issued in error.
CVE-2025-12107 1 Wso2 2 Identity Server, Wso2 Identity Server 2026-03-06 8.4 High
Due to the use of a vulnerable third-party Velocity template engine, a malicious actor with admin privilege may inject and execute arbitrary template syntax within server-side templates. Successful exploitation of this vulnerability could allow a malicious actor with admin privilege to inject and execute arbitrary template code on the server, potentially leading to remote code execution, data manipulation, or unauthorized access to sensitive information.
CVE-2026-26998 1 Traefik 1 Traefik 2026-03-06 4.4 Medium
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing the ForwardAuth middleware responses. When Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no maxResponseBodySize configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process. This results in a denial of service for all routes served by the affected Traefik instance. This issue has been patched in versions 2.11.38 and 3.6.9.