Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 8 April 2026
RSS133 vulnerabilities published on 8 April 2026
Severity:
rootio-linux: Unpatched root access granted through command injection
ROOT-OS-DEBIAN-13-CVE-2026-31407
The rootio-linux package for Debian 13 had a security issue that allowed an attacker to gain root access. This could have let a hacker take control of the system. The issue has been fixed by the Root ...
rootio-linux: Unpatched Root Access Possible Through Malicious Input
ROOT-OS-DEBIAN-12-CVE-2026-31407
The rootio-linux package for Debian 12 has a security issue that allows an attacker to gain unauthorized root access on a system. This means that a hacker could potentially take control of your server...
rootio-linux: Unauthorized Access to Root Account
ROOT-OS-DEBIAN-12-CVE-2026-23401
The rootio-linux package on Debian 12 has a security issue that could allow someone to access the root account without proper permission. This means that a malicious user could gain control of the ent...
rootio-linux: Unauthenticated Remote Code Execution
ROOT-OS-DEBIAN-12-CVE-2026-23455
An attacker can gain unauthorized access to rootio-linux systems without a password. This affects all users of rootio-linux, especially those using Root:Debian:12. Update to the latest version to fix ...
rootio-linux: Untrusted root access in rootio-linux
ROOT-OS-DEBIAN-12-CVE-2026-31408
A security patch has been released for rootio-linux, a component of the Root platform, which could allow unauthorized users to access sensitive data. This vulnerability affects Root users and requires...
rootio-linux: Unrestricted File Access in rootio-linux
ROOT-OS-DEBIAN-12-CVE-2026-23450
A security patch has been released for the rootio-linux package to prevent unauthorized access to files on a Debian 12 system. This update addresses a previously known issue and is recommended for ins...
Pygments: CPU Consumption Issue in Certain Lexers
MGASA-2026-0090
A weakness in Pygments' AdlLexer can lead to high CPU usage, potentially causing slow performance or system crashes. This issue affects older versions of Pygments. Upgrade to the latest version to res...
MINI-c7gm-2c6w-r3pq
MINI-c7gm-2c6w-r3pq
Adobe Reader for Android Unsecured Data Storage
MINI-ch3x-mx4m-2rq9
Adobe Reader for Android stores sensitive data in an unsecured location, allowing unauthorized access to documents and user information. This could lead to sensitive data theft or unauthorized access ...
MINI-72v7-qxqr-42c3
MINI-72v7-qxqr-42c3
MINI-c5r7-9v8w-wrv9
MINI-c5r7-9v8w-wrv9
MINI-553w-gfv3-cj7g
MINI-553w-gfv3-cj7g
MINI-f45w-8rgj-q862
MINI-f45w-8rgj-q862
Adobe Flash Player on Windows May Allow Remote Code Execution
MINI-324r-626v-pv33
Adobe Flash Player on Windows computers may allow an attacker to run malicious code on the system without permission. This could happen if a user visits a website that contains a malicious Flash file....
Wildcard Certificates Can Bypass Validation in Some Cases
GO-2026-4866
CVE-2026-33810
A bug in certificate validation can allow a malicious certificate to be accepted as trusted, even if it shouldn't be. This happens when a certificate has a wildcard domain name that doesn't match the ...
Mistakes in HTML Template Code Can Lead to Website Hacking
GO-2026-4865
CVE-2026-32289
A bug in some HTML templates can allow hackers to inject malicious code into a website, potentially taking control of it. This issue affects websites that use a specific type of template engine. To st...
GNU tar can run out of memory when reading corrupt archives
GO-2026-4869
CVE-2026-32288
A malicious archive can cause GNU tar to consume excessive memory, potentially crashing or freezing the system. This issue affects systems that use GNU tar to extract archives. To mitigate this risk, ...
TLS 1.3 Key Update Records Can Cause Persistent Connections
GO-2026-4870
CVE-2026-32283
A vulnerability in TLS 1.3 can cause connections to become stuck, wasting server resources. This happens when a server or client sends multiple key update messages in one go, freezing the connection. ...
Linux Chmod Can Access Sensitive Files Through Symlink
GO-2026-4864
CVE-2026-32282
Linux systems using the Chmod function may allow unauthorized access to sensitive files if an attacker replaces the target with a symbolic link. This could potentially lead to unauthorized changes or ...
Large Certificate Chains Cause Slow Certificate Validation in Some Software
GO-2026-4946
CVE-2026-32281
Certain software that checks digital certificates for trust may take a long time to validate certificates that have many policy mappings. This can cause the software to become unresponsive or slow. If...
Crypto/X509: Excessive Work in Certificate Chain Verification
GO-2026-4947
CVE-2026-32280
When verifying a chain of digital certificates, a large number of intermediate certificates can cause the system to become unresponsive or even crash. This issue affects users of the crypto/x509 and c...
Go Compiler Allows Memory Corruption in Certain Code
GO-2026-4867
CVE-2026-27144
The Go compiler can misinterpret certain code, leading to potential data corruption. This is a concern for developers who use the Go compiler to write code, as it can cause unexpected behavior or cras...
Go Compiler Can Cause Program Crashes with Invalid Memory Access
GO-2026-4868
CVE-2026-27143
If you use the Go compiler, it may not check some calculations correctly, leading to a program crash or data loss. This affects any Go application that uses the compiler. Update to the latest Go versi...
SWIG Code Generation in Go Allows Malicious Code at Build Time
GO-2026-4871
CVE-2026-27140
A bug in the way Go uses SWIG to generate code can allow attackers to inject malicious code into a project during the build process. This could potentially allow an attacker to execute arbitrary code ...
WordPress Plugin Arbitrary File Upload Vulnerability Allows Unauthorized Access
ECHO-4471-00bd-faf3
A security issue in a WordPress plugin allows attackers to upload any file to a WordPress site, potentially leading to unauthorized access or data tampering. This affects websites using the vulnerable...