Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 3 April 2026

RSS

150 vulnerabilities published on 3 April 2026

Severity:
Debian Linux: Unprivileged user can access sensitive system files
DEBIAN-CVE-2026-35536
A vulnerability in Debian Linux allows an attacker with normal user privileges to access sensitive system files, potentially leading to data theft or tampering. This could be exploited by a malicious ...
Suricata 7.0.14 and earlier: Poor Buffer Handling in DCERPC Can Cause Slow Performance
DEBIAN-CVE-2026-31937
A weakness in Suricata's handling of DCERPC data can slow down the program. This issue affects versions of Suricata up to 7.0.14. Users should update to version 7.0.15 to fix the issue.
Sudo Privilege Escalation Through Privilege Drop Failure
DEBIAN-CVE-2026-35535
A weakness in Sudo's privilege management could allow an attacker to gain extra permissions. This issue affects all versions of Sudo before 1.9.17.2. To mitigate this risk, update Sudo to the latest v...
Suricata: Slow Performance Searching for Mailed URLs
DEBIAN-CVE-2026-31934
Suricata's email scanning can be slow when looking for URLs in certain emails. This affects versions of Suricata from 8.0.0 to before 8.0.4. To fix, update to version 8.0.4 or later.
Suricata: Crashes when using 'tls.alpn' rule keyword
DEBIAN-CVE-2026-31931
Suricata, a network security tool, can crash if a specific rule is used. This can happen if you're using an older version of Suricata. Update to the latest version (8.0.4 or later) to fix the issue.
Suricata may crash if attacked with crafted HTTP2 frames
DEBIAN-CVE-2026-31935
Suricata, a network security tool, can be taken down by a specific type of malicious traffic. This means it won't be available to detect and prevent other threats. Update to version 7.0.15 or 8.0.4 to...
Suricata Network Engine Can Slow Down Under Heavy Traffic
DEBIAN-CVE-2026-31933
A specific type of network traffic can cause Suricata to slow down, impacting its ability to monitor and respond to threats. This issue has been fixed in versions 7.0.15 and 8.0.4, which are recommend...
BELL-CVE-2026-23413
BELL-CVE-2026-23413
Apache Commons Compress: Uncontrolled Resource Consumption
ECHO-abe8-b546-ad42
The Apache Commons Compress library has a bug that can cause a denial-of-service (DoS) attack if an attacker sends a specially crafted file. This can lead to a server crash or slowdown. Update to a fi...
Apache HTTP Server allows remote attacker to access sensitive files
ECHO-185f-c78c-4e82
A flaw in the Apache HTTP Server can allow an attacker to access files on a website that they shouldn't be able to access. This could happen if the server is not configured correctly. To fix this, upd...
Microsoft Office Memory Corruption Leads to Remote Code Execution
ECHO-758d-edbe-6881
A vulnerability in Microsoft Office can allow attackers to execute malicious code on a victim's computer by sending a specially crafted file. This could potentially allow a hacker to take control of t...
Apache HTTP Server Cross-Site Scripting (XSS) in mod_proxy_ajp
ECHO-9e39-7166-9c17
Apache's HTTP Server has a security issue that allows an attacker to inject malicious code into web pages. This can happen when a user visits a website that uses Apache's mod_proxy_ajp module to conne...
Adobe Flash Player allows attackers to run malicious code
ECHO-bc93-24a8-8727
Adobe Flash Player has a security vulnerability that could allow hackers to execute unauthorized code on a user's computer. This could lead to data theft, system compromise, or other malicious activit...
Apache HTTP Server Unauthenticated Remote Code Execution
ECHO-f8cb-56ce-2d8e
Apache HTTP Server's mod_proxy module has a vulnerability that allows an attacker to execute code on a remote server without needing a password. This could allow an attacker to take control of the ser...
Apache HTTP Server Allows Remote Code Execution
ECHO-2e96-17f7-cc4b
Apache's web server software has a flaw that could let hackers run malicious code on your server. This means an attacker could take control of your server and do whatever they want. You should update ...
Apache HTTP Server: Malicious Files Can Be Served
ECHO-ac58-cda1-4c8b
Apache HTTP Server may allow attackers to serve malicious files. This could happen if a server is configured to use a directory traversal attack, allowing attackers to serve files outside of the inten...
MS Teams webhook in OpenClaw may allow unauthenticated resource exhaustion
GHSA-p464-m8x6-vhv8
MS Teams webhooks in OpenClaw versions 2026.3.28 and earlier can be exploited to cause a denial-of-service (resource exhaustion) attack without authenticating the request. This is because the webhook ...
Adobe Reader vulnerability allows malicious document execution
ECHO-a95f-c9f9-a568
Adobe Reader has a security flaw that could be exploited by an attacker to run unauthorized code on your computer when you open a malicious PDF file. This means that if someone sends you a fake PDF, t...
MINI-5g48-p755-pjmf
MINI-5g48-p755-pjmf
MINI-q7gp-vmg7-r4jx
MINI-q7gp-vmg7-r4jx
MINI-m95r-25pq-7rgw
MINI-m95r-25pq-7rgw
Apache HTTP Server Unauthenticated File Disclosure on Windows
MINI-v76p-f288-2f2c
An issue has been discovered in the Apache HTTP Server software on Windows systems, which can allow an attacker to access files without needing a password. This is a concern because sensitive informat...
Apache HTTP Server Malicious Configuration File Overwrite
MINI-64h2-q2x3-g776
A configuration file in the Apache HTTP Server can be overwritten by an attacker, potentially allowing them to gain unauthorized access to the server. This is a concern for businesses that rely on Apa...
Google Chrome: Data leakage when handling local files
ECHO-b728-5f8b-4ad6
A bug in Google Chrome allows hackers to steal sensitive data from local files on your computer. This means that if you open a malicious website in Chrome, the hacker could potentially access and stea...
MINI-37cj-564v-w58g
MINI-37cj-564v-w58g