Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 2 April 2026

RSS

7 vulnerabilities published on 2 April 2026

Severity:
Juju Database Cluster Allows Unauthenticated Access
CVE-2026-4370 GHSA-gvrj-cjch-728p
An attacker can join Juju's database cluster without a password, gaining access to sensitive data. This means an attacker could potentially steal or modify Juju's internal data. To address this, updat...
10.0
HCL BigFix Platform: Private Keys Accessible Due to Incorrect Windows Permissions
CVE-2026-21765
The HCL BigFix Platform uses private cryptographic keys on Windows machines. If these keys have overly permissive permissions, unauthorized users may access them, potentially compromising sensitive da...
8.8
Nothings stb version 1.22 allows remote attackers to write to memory
CVE-2026-5317
A security flaw in the stb library, used in audio processing, allows a remote attacker to write to memory, potentially causing unexpected behavior or crashes. This affects users who rely on stb for au...
5.3
IBM Content Navigator Website Allows Malicious Code Injection
CVE-2026-1243
Authenticated users can add malicious JavaScript code to the IBM Content Navigator website, potentially allowing them to access sensitive information. This could happen even when a user is already log...
5.4
Nothings stb Vorbis Library Allows Uncontrolled Resource Allocation
CVE-2026-5316
Nothings stb Vorbis library, used in various applications, has a vulnerability that could allow an attacker to cause the system to run out of resources, potentially leading to a denial of service. Thi...
5.3
Nothings stb: TTF File Handler Allows Remote Data Exposure
CVE-2026-5315
A security issue in Nothings stb version 1.26 and earlier can allow an attacker to access sensitive data from a TTF file remotely. This means that a malicious actor could potentially access confidenti...
5.3
HCL BigFix Platform: Unauthorized Access to Sensitive Areas
CVE-2026-21767
The HCL BigFix Platform may allow users to access areas of the platform without properly verifying their identity. This could lead to malicious users accessing sensitive information or making unauthor...
4.0