Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

729 vulnerabilities published on 14 April 2026

Severity:
rootio-fastmcp: Unauthenticated Code Execution via Network Request
ROOT-APP-PYPI-CVE-2025-62801
The rootio-fastmcp package contains a security flaw that could allow an attacker to run unauthorized code on your server. This could happen if an attacker sends a special network request to your serve...
rootio-fastmcp: Unauthorized Access via Unvalidated User Input
ROOT-APP-PYPI-GHSA-c2jp-c369-7pvx
A security patch has been released for rootio-fastmcp, a library used in some Root systems. If left unpatched, an attacker could potentially access unauthorized areas of the system by sending maliciou...
rootio-fastmcp: Unauthorized Access to Sensitive Data
ROOT-APP-PYPI-CVE-2026-32871
A security issue in rootio-fastmcp could allow an attacker to access sensitive data without permission. This affects users of the rootio-fastmcp package on the Root PyPI repository. To stay secure, up...
rootio-fastmcp: Unauthorized Access to Sensitive Data
ROOT-APP-PYPI-CVE-2026-27124
A patch has been released to prevent unauthorized access to sensitive data in the rootio-fastmcp software. This issue affects users who install and use rootio-fastmcp. To ensure security, update to th...
rootio-fastmcp: Unauthorized access to sensitive configuration data
ROOT-APP-PYPI-CVE-2025-62800
The rootio-fastmcp software has a weakness that could allow an attacker to gain access to sensitive configuration settings. This could lead to unauthorized changes to the system or data exposure. Upda...
rootio-fastmcp: Unauthenticated Remote Code Execution
ROOT-APP-PYPI-CVE-2025-64340
The rootio-fastmcp package has a security flaw that allows unauthorized access to your system. This could allow attackers to run malicious code on your server. Update to the latest version of rootio-f...
Unauthenticated Command Execution in Apache HTTP Server
BELL-CVE-2026-31410
The Apache HTTP Server has a vulnerability that allows an attacker to execute arbitrary commands without being authenticated. This means that anyone can potentially take control of the server. To prot...
BELL-CVE-2026-31409
BELL-CVE-2026-31409
Outdated PHP Version in WordPress Allows Remote Code Execution
BELL-CVE-2026-31405
A security issue exists in older versions of WordPress due to its outdated PHP version. This can allow an attacker to take control of a website, leading to data theft or unauthorized changes. To fix t...
Oracle MySQL affects non-BellSoft installations
BELL-CVE-2026-31397
A security issue was discovered in Oracle MySQL that could allow an attacker to access sensitive data. This affects non-BellSoft installations of Oracle MySQL. Users of affected systems should apply t...
BELL-CVE-2026-31391
BELL-CVE-2026-31391
BELL-CVE-2026-23446
BELL-CVE-2026-23446
Apache HTTP Server Uncontrolled Resource Consumption
BELL-CVE-2026-23474
A flaw in the Apache HTTP Server can cause the server to consume excessive resources, leading to a denial of service. This affects Apache HTTP Server versions 2.4.25 and 2.4.26. To mitigate this issue...
BELL-CVE-2026-23470
BELL-CVE-2026-23470
Apache HTTP Server Unauthenticated Remote Code Execution
BELL-CVE-2026-23469
Apache HTTP Server allows an attacker to run malicious code on a server without a login. This could happen if a website is using an outdated version of the Apache HTTP Server software. To protect agai...
Apache Tomcat Exposes Sensitive Server Information
BELL-CVE-2026-23468
Apache Tomcat servers may expose sensitive information about the server and its configuration. This could allow an attacker to gather valuable information that could be used to launch targeted attacks...
BELL-CVE-2026-23464
BELL-CVE-2026-23464
Adobe Flash Player allows malicious files to be executed remotely
BELL-CVE-2026-23443
Adobe Flash Player has a vulnerability that could allow hackers to run malicious code on your computer without your knowledge or permission. This could lead to data theft, system compromise, or other ...
BELL-CVE-2026-23460
BELL-CVE-2026-23460
BellSoft Software Not Affected by Vulnerability
BELL-CVE-2026-23459
This vulnerability does not affect BellSoft software, so no action is needed. All BellSoft products are safe to use. No update or patch is required for BellSoft users.
CVE-2026-23453 does not affect BellSoft software
BELL-CVE-2026-23453
Apache HTTP Server Unauthenticated Remote Code Execution Vulnerability
BELL-CVE-2026-23438
Apache's HTTP Server software has a critical security flaw that can be exploited by attackers to run malicious code on a server without needing a password. This means that if your website or web appli...
Apache Tomcat Remote Code Execution Vulnerability
BELL-CVE-2026-23435
A vulnerability in Apache Tomcat's Java-based web server software allows attackers to execute arbitrary code on a server. This could lead to unauthorized access and data theft. Update to the latest ve...
WordPress Plugin 'WP GDPR Compliance' Unpatched Vulnerability
BELL-CVE-2026-23433
An unpatched vulnerability in the WP GDPR Compliance plugin for WordPress allows an attacker to access sensitive data. This can lead to unauthorized access to user data, potentially compromising user ...
No impact on BellSoft software
BELL-CVE-2026-23432
This vulnerability does not affect BellSoft software products. You do not need to take any action regarding this issue.