Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 14 April 2026
RSS729 vulnerabilities published on 14 April 2026
Severity:
Microsoft Office Word Remote Code Execution Vulnerability
BELL-CVE-2026-23431
Microsoft Office Word has a security weakness that could allow an attacker to run malicious code on your computer if you open a specially crafted file. This could lead to data theft, system compromise...
GitLab Server-Side Request Forgery Vulnerability in GitLab
BELL-CVE-2026-23429
A vulnerability in GitLab's API can be exploited by an attacker to trick the server into accessing unauthorized resources. This could lead to data exposure or server compromise. Update to the latest v...
BELL-CVE-2026-23428
BELL-CVE-2026-23428
BELL-CVE-2026-23427
BELL-CVE-2026-23427
Apache HTTP Server Allows Unauthorized File Access via Malicious URLs
BELL-CVE-2026-23426
The Apache HTTP Server is vulnerable to a bug that could allow attackers to access files on the server without permission. This could happen if an attacker sends a specially crafted URL to the server....
CVE-2026-23425 does not affect BellSoft software
BELL-CVE-2026-23425
No risk to BellSoft software users
BELL-CVE-2026-23424
BellSoft software is not affected by this vulnerability, so you don't need to worry about it. This means you can continue to use your BellSoft software without any additional security concerns. No act...
Apache HTTP Server Allows Remote Code Execution through Malicious URL
BELL-CVE-2026-23422
A flaw in the Apache HTTP Server could allow hackers to run malicious code on a server by manipulating a specially crafted URL. This could lead to unauthorized access to sensitive data or system compr...
Snyk Vulnerability in Microsoft Office Does Not Affect BellSoft Software
BELL-CVE-2026-23416
This vulnerability affects Microsoft Office, but since BellSoft software is not affected, you do not need to take any action. However, if you use Microsoft Office, your IT team should review the vulne...
Apache Kafka Users May Be Able to Access Unauthorized Topics
BELL-CVE-2026-31426
Apache Kafka users may be able to access unauthorized topics due to a security issue in the software. This means that sensitive data may be exposed to users who shouldn't have access to it. To protect...
WordPress Plugin Allows Unauthorized File Uploads
BELL-CVE-2026-31425
A security issue with a popular WordPress plugin allows hackers to upload and execute malicious files on websites using the plugin. This could lead to unauthorized access, data theft, or even the comp...
Microsoft Excel vulnerable to remote code execution when opening malicious files
BELL-CVE-2026-31428
Microsoft Excel has a vulnerability that could allow hackers to run unauthorized code on a user's computer if they open a specially crafted file. This could lead to data theft or system compromise. Up...
Adobe Acrobat Reader allows code execution through malicious PDF files
BELL-CVE-2026-31427
Adobe Acrobat Reader has a security issue that could allow hackers to run unauthorized code on your computer if you open a malicious PDF file. This could lead to your computer being taken over or sens...
WordPress Plugin Vulnerability: Unauthorized Data Exposure via User Input
BELL-CVE-2026-31424
A security issue affects a popular WordPress plugin, allowing an attacker to view sensitive information by manipulating user input. This could potentially expose confidential data, compromising user t...
BELL-CVE-2026-31415
BELL-CVE-2026-31415
Adobe Flash Player Arbitrary Code Execution Risk
BELL-CVE-2026-31423
Adobe Flash Player has a critical weakness that allows hackers to run malicious code on your computer. This could let attackers steal sensitive information or take control of your system. Update to th...
Apache HTTP Server Unauthenticated Remote Code Execution
BELL-CVE-2026-31422
An attacker can exploit a weakness in the Apache HTTP Server software, potentially allowing them to run malicious code on a vulnerable server without being authorized. This could lead to unauthorized ...
Adobe Acrobat Reader Remote Code Execution Vulnerability
BELL-CVE-2026-31421
A security issue in Adobe Acrobat Reader on Windows allows an attacker to take control of your computer without your permission. This could happen if you open a specially crafted document. To protect ...
Rootio Linux: Unauthenticated Code Execution in Debian 13
ROOT-OS-DEBIAN-13-CVE-2026-31411
A security patch has been released for Rootio Linux to prevent unauthorized code execution in Debian 13. If left unpatched, an attacker could potentially exploit this vulnerability to execute maliciou...
rootio-linux: Unauthorized access to system files possible
ROOT-OS-DEBIAN-13-CVE-2026-23468
The rootio-linux system has a security patch available for a vulnerability that could allow an attacker to access sensitive system files without permission. This affects users of rootio-linux who have...
rootio-linux: Unauthorized data exposure on Debian 13
ROOT-OS-DEBIAN-13-CVE-2026-23475
A security patch has been released for rootio-linux on Debian 13. If left unpatched, an attacker could potentially access sensitive data. Update to the latest version to ensure your system remains sec...
rootio-linux: Unauthorized Access to Configuration Files
ROOT-OS-DEBIAN-13-CVE-2026-23426
The rootio-linux package has a security issue that allows an attacker to access sensitive configuration files without permission. This can happen on systems running Root:Debian:13. To fix this, update...
rootio-linux: Malicious Code Execution via Specially Crafted Message
ROOT-OS-DEBIAN-13-CVE-2026-23380
A security patch has been released for the rootio-linux package to fix a vulnerability that could allow an attacker to execute malicious code on your system. This affects users running Debian 13 on Ro...
rootio-linux: Unauthenticated Remote Code Execution
ROOT-OS-DEBIAN-13-CVE-2026-23428
A security patch has been released for rootio-linux to prevent an attacker from running unauthorized code on your system without a password. This affects users who have not updated their rootio-linux ...
Rootio-Linux: Unprivileged local code execution possible
ROOT-OS-DEBIAN-13-CVE-2026-23474
A security patch has been released for Rootio-Linux to fix a vulnerability that could allow an attacker with local access to run malicious code with elevated privileges. This could potentially lead to...