Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 8 April 2026

RSS

704 vulnerabilities published on 8 April 2026

Severity:
Google Chrome Before 147.0.7727.55: Sensitive Data Leak via Malicious Web Page
CVE-2026-5869
A security issue in older versions of Google Chrome makes it possible for a hacker to access sensitive information from your computer. This happens when you visit a fake or malicious website. To stay ...
Google Chrome on Mac: Malicious Webpage Can Run Arbitrary Code
CVE-2026-5868
A security issue in Google Chrome on Mac allows a hacker to create a malicious webpage that could run malicious code on your computer. This could lead to unauthorized access or data theft. To stay saf...
Google Chrome: Malicious Web Page Can Steal Sensitive Data
CVE-2026-5867
If you're using an outdated version of Google Chrome, a hacker could create a website that extracts sensitive information from your computer. This affects Chrome versions prior to 147.0.7727.55. Updat...
Google Chrome: Malicious HTML can execute arbitrary code
CVE-2026-5865
A security issue in older versions of Google Chrome could allow a hacker to run malicious code on your computer if you visit a specially crafted website. This could potentially give the hacker control...
Google Chrome's WebAudio can leak sensitive data from your computer
CVE-2026-5864
An older version of Google Chrome's WebAudio feature can be exploited by a malicious website to access sensitive information on your computer. This is a serious issue that affects versions of Chrome p...
Google Chrome: Malware can run in your browser
CVE-2026-5863
A security issue in older versions of Google Chrome could allow hackers to run malicious code in your browser, even if you're browsing in a secure mode. This means they could potentially steal sensiti...
Google Chrome: Malicious Website Can Run Code on Your Computer
CVE-2026-5862
A flaw in Google Chrome allows a hacker to create a malicious website that can run unauthorized code on your computer. This could potentially allow the hacker to access sensitive information or cause ...
Google Chrome: Remote Code Execution via Malicious HTML Page
CVE-2026-5861
A security issue in older versions of Google Chrome allows a hacker to execute code on your computer if you visit a malicious website. This could lead to unauthorized actions being taken on your syste...
Google Chrome: Untrusted Code Can Run in Sandbox
CVE-2026-5860
A security issue in older versions of Google Chrome allows an attacker to run malicious code on your computer via a specially crafted website. This can potentially lead to unauthorized access to your ...
Google Chrome prior to 147.0.7727.55: Remote Code Execution via Malicious Website
CVE-2026-5859
If you're using an outdated version of Google Chrome, a hacker could potentially trick your browser into crashing or allowing them to take control of your computer. This is a serious issue for anyone ...
Google Chrome: Malicious HTML Can Execute Code on Your Computer
CVE-2026-5858
A security issue in Google Chrome can allow a hacker to run malicious code on your computer if you visit a specially crafted webpage. This means your computer could be taken over and your data stolen....
WordPress Plugin WP Statistics Allows Unauthorized Data Access
MINI-5x9q-cccr-m4p4
A security issue affects the WP Statistics plugin for WordPress, potentially allowing unauthorized users to access sensitive data. This could happen if an attacker exploits a weakness in the plugin's ...
MINI-qmw8-jcjc-h8xj
MINI-qmw8-jcjc-h8xj
Adobe Reader for Windows: Malicious PDFs Can Execute Code
MINI-j244-8hr5-rvrf
Adobe Reader for Windows is vulnerable to a flaw that allows attackers to execute malicious code on a system by sending a specially crafted PDF file. This means that users who open the PDF could have ...
MINI-27cj-2277-vcqf
MINI-27cj-2277-vcqf
MINI-6wvx-vq4h-6vg8
MINI-6wvx-vq4h-6vg8
MINI-p266-9pwx-xfcj
MINI-p266-9pwx-xfcj
MINI-94qm-p32v-9q45
MINI-94qm-p32v-9q45
MINI-jqr7-j766-q252
MINI-jqr7-j766-q252
Apache Log4j vulnerability in some Java applications can lead to remote code execution
MINI-c64q-vxwr-c34m
The Apache Log4j library, used in some Java applications, has a flaw that can allow hackers to execute unauthorized code on a server. This could happen if an attacker sends a malicious message to a vu...
MINI-3224-jjwg-cm8v
MINI-3224-jjwg-cm8v
Adobe Reader and Acrobat: Unauthorized Code Execution Risk
MINI-mvxc-w3rv-685m
Adobe Reader and Acrobat users are at risk of having their computers hijacked by malicious code when opening specially crafted PDF files. This means that an attacker could potentially take control of ...
MINI-wxh7-939q-p26v
MINI-wxh7-939q-p26v
MINI-p7wc-9hpp-4jmm
MINI-p7wc-9hpp-4jmm
WordPress Plugin WP Hide and SEO Hooks Allows Arbitrary File Uploads
MINI-whc8-crc9-hcjp
A WordPress plugin that helps with search engine optimization allows attackers to upload any file to a website. This can be used to install malware or steal sensitive data. Update the plugin to the la...