Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 8 April 2026
RSS716 vulnerabilities published on 8 April 2026
Severity:
Go Compiler Allows Memory Corruption in Certain Code
GO-2026-4867
CVE-2026-27144
The Go compiler can misinterpret certain code, leading to potential data corruption. This is a concern for developers who use the Go compiler to write code, as it can cause unexpected behavior or cras...
Unsecured Pointer Unwrapping in Microsoft Visual Studio Compiler
DEBIAN-CVE-2026-27144
The Microsoft Visual Studio compiler fails to properly unwrap pointers in certain memory move operations, potentially causing memory corruption when the program runs. This could lead to crashes or une...
Adobe Flash Player allows invalid indexing with arithmetic loops
DEBIAN-CVE-2026-27143
Adobe Flash Player may crash or behave unexpectedly when using loops with arithmetic variables. This could lead to data corruption or crashes. Update to the latest version of Adobe Flash Player to fix...
Go Compiler Can Cause Program Crashes with Invalid Memory Access
GO-2026-4868
CVE-2026-27143
If you use the Go compiler, it may not check some calculations correctly, leading to a program crash or data loss. This affects any Go application that uses the compiler. Update to the latest Go versi...
Go Code Build Time Command Injection in SWIG Files
DEBIAN-CVE-2026-27140
Using SWIG files with 'cgo' and malicious code, attackers can inject commands during Go code builds, potentially leading to code execution. This can happen if developers don't carefully review SWIG fi...
SWIG Code Generation in Go Allows Malicious Code at Build Time
GO-2026-4871
CVE-2026-27140
A bug in the way Go uses SWIG to generate code can allow attackers to inject malicious code into a project during the build process. This could potentially allow an attacker to execute arbitrary code ...
WordPress Plugin Arbitrary File Upload Vulnerability Allows Unauthorized Access
ECHO-4471-00bd-faf3
A security issue in a WordPress plugin allows attackers to upload any file to a WordPress site, potentially leading to unauthorized access or data tampering. This affects websites using the vulnerable...
Microsoft Exchange Server allows unauthorized access to emails
ECHO-6fc6-4872-7ea8
A flaw in Microsoft Exchange Server could allow hackers to access and read emails without permission. This affects organizations that use Exchange Server for email. Users should patch their systems as...
WordPress Plugin 'ECHO' Allows Unauthorized File Uploads
ECHO-f779-bf6a-ba8e
A security issue in the ECHO plugin for WordPress allows attackers to upload malicious files, potentially leading to unauthorized actions on your website. This could compromise your site's security an...
Adobe Reader Can Crash or Misbehave When Opening Certain Files
ECHO-9d88-691e-4e0f
Adobe Reader, a popular PDF viewer, may crash or behave unexpectedly when opening certain types of files. This can happen if an attacker tricks a user into opening a malicious PDF that exploits this w...
Apache HTTP Server Denial of Service via Malformed Request
ECHO-cd1b-a137-2e06
Apache HTTP Server can crash if it receives a specially crafted request. This can happen if an attacker sends a malicious HTTP request, potentially leading to a denial of service. Apache administrator...
Adobe Reader Remote Code Execution Vulnerability
ECHO-ba3d-b3f7-03e8
Adobe Reader has a flaw that can allow an attacker to execute malicious code on your computer if you open a specially crafted PDF file. This means that if you open a malicious PDF, the attacker could ...
CGA-q985-v7px-cj5w
Adobe Acrobat Reader: Unrestricted File Access via Malicious PDF
CGA-q985-v7px-cj5w
Adobe Acrobat Reader allows attackers to access and potentially modify files on your system if you open a malicious PDF. This could lead to unauthorized data theft or system compromise. Update Adobe A...
Apache Zookeeper: Unauthorized Access in Certain Versions
CLEANSTART-2026-MP09743
Apache Zookeeper versions prior to 3.8.6-r0 are vulnerable to unauthorized access. This means that an attacker could potentially gain access to sensitive data or disrupt service. Upgrade to version 3....
Apache ZooKeeper versions 3.6.4-r4 vulnerable to security issue
CLEANSTART-2026-BB02574
Apache ZooKeeper versions 3.6.4-r4 contain a security vulnerability that could allow unauthorized access to sensitive data. To protect your system, update to a newer version of Apache ZooKeeper that h...