Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

729 vulnerabilities published on 14 April 2026

Severity:
rootio-linux: Unauthorized access to sensitive data
ROOT-OS-DEBIAN-13-CVE-2026-23438
A security patch has been released for rootio-linux on Debian 13. This patch fixes a vulnerability that could allow unauthorized access to sensitive data. To protect your system, update your rootio-li...
Rootio-Linux: Unauthenticated Access to Root Directory Possible
ROOT-OS-DEBIAN-13-CVE-2026-23313
A security patch has been released by Root to fix a vulnerability in the rootio-linux package that affects Root:Debian:13. This issue allowed unauthorized access to the root directory, potentially lea...
rootio-linux: Unpatched Linux System Can Be Compromised Remotely
ROOT-OS-DEBIAN-13-CVE-2026-23469
A security patch has been released for the rootio-linux package to fix a critical vulnerability that could allow an attacker to access and control a Linux system remotely. This affects users who have ...
Rootio Linux: Unauthorized Access to System Configuration
ROOT-OS-DEBIAN-13-CVE-2026-23460
A security patch has been released for rootio-linux, fixing a vulnerability that could allow an attacker to access and modify system settings without permission. This affects users of Root:Debian:13. ...
rootio-linux: Unauthorized access to system files possible
ROOT-OS-DEBIAN-13-CVE-2026-23321
A security update has been released for rootio-linux to fix a vulnerability that could allow an attacker to access system files without permission. This affects users of Root:Debian:13. To stay secure...
Rootio-Linux: Unauthorized Access to System Settings
ROOT-OS-DEBIAN-13-CVE-2026-23287
A security patch has been released for Rootio-Linux to fix a vulnerability that could allow an attacker to access and modify system settings without permission. This affects Rootio-Linux version 13 an...
rootio-linux: Unpatched Versions Allow Remote Code Execution
ROOT-OS-DEBIAN-13-CVE-2026-23360
A security patch was released for rootio-linux on Debian 13, but older versions are still vulnerable. If not updated, attackers might be able to run malicious code on your system. Update to the latest...
Rootio-Linux Software: Privilege Escalation Risk Fixed
ROOT-OS-DEBIAN-13-CVE-2026-23470
A security issue in Rootio-Linux allowed unauthorized access to sensitive data. This has been fixed by the developers, and users are advised to update their software to the latest version to ensure th...
rootio-linux: Unauthenticated Remote Code Execution
ROOT-OS-DEBIAN-13-CVE-2026-23428
A security patch has been released for rootio-linux to prevent an attacker from running unauthorized code on your system without a password. This affects users who have not updated their rootio-linux ...
rootio-linux: Unprivileged access to sensitive system files
ROOT-OS-DEBIAN-13-CVE-2026-23446
A vulnerability in rootio-linux allows unprivileged users to access sensitive system files and directories, potentially leading to unauthorized data disclosure or modification. This issue affects the ...
rootio-linux: Unauthenticated Remote Code Execution
ROOT-OS-DEBIAN-13-CVE-2026-31409
The rootio-linux package on Debian 13 has a security issue that allows an attacker to execute malicious code on your system without needing a password. This can happen if you have rootio-linux install...
rootio-linux: Unprivileged Access to Sensitive System Data
ROOT-OS-DEBIAN-13-CVE-2026-31410
A security patch has been released for the rootio-linux package to prevent unauthorized access to sensitive system data. This affects Root:Debian:13, and multiple updated versions are available. To st...
rootio-linux: Unpatched Software May Be Hacked by Unauthorized Access
ROOT-OS-DEBIAN-13-CVE-2026-31405
The rootio-linux package in Root:Debian:13 hasn't been updated to fix a security issue. This means that attackers might be able to gain unauthorized access to your system. To protect your system, upda...
Rootio Linux for Debian 13: Unpatched System Password Exposure
ROOT-OS-DEBIAN-13-CVE-2026-23297
A security patch has been released for Rootio Linux on Debian 13, which fixes a vulnerability that could allow an attacker to access sensitive system passwords. If left unpatched, this could lead to u...
rootio-linux: Unauthorized data exposure on Debian 13
ROOT-OS-DEBIAN-13-CVE-2026-23475
A security patch has been released for rootio-linux on Debian 13. If left unpatched, an attacker could potentially access sensitive data. Update to the latest version to ensure your system remains sec...
rootio-linux Unauthenticated Remote Command Execution Risk
ROOT-OS-DEBIAN-13-CVE-2026-31391
A patch has been released for rootio-linux to prevent unauthorized access to the system. This fix addresses a security risk that could allow an attacker to execute commands remotely without a password...
rootio-linux: Unauthenticated Access to Sensitive System Files
ROOT-OS-DEBIAN-13-CVE-2026-23434
An attacker can access sensitive system files without a password on some versions of rootio-linux. This is a security risk because it could allow an attacker to view or modify sensitive data. Update t...
rootio-linux: Unauthorized access to system files possible
ROOT-OS-DEBIAN-13-CVE-2026-23468
The rootio-linux system has a security patch available for a vulnerability that could allow an attacker to access sensitive system files without permission. This affects users of rootio-linux who have...
rootio-linux: Unauthorized Access to Configuration Files
ROOT-OS-DEBIAN-13-CVE-2026-23426
The rootio-linux package has a security issue that allows an attacker to access sensitive configuration files without permission. This can happen on systems running Root:Debian:13. To fix this, update...
CGA-x528-3gm3-q4j9
CGA-x528-3gm3-q4j9
CGA-j4ph-g7ff-g67c
CGA-j4ph-g7ff-g67c
Kimai SAML Authentication Allows Malicious Redirects
GHSA-3jp4-mhh4-gcgr
Kimai's SAML authentication feature can be tricked into redirecting users to malicious websites if SAML is enabled. This allows attackers to steal credentials or session tokens. Update to the latest v...
Kimai allows attackers to redirect users to malicious websites
GHSA-3jp4-mhh4-gcgr
Kimai's SAML authentication feature doesn't properly check the URL it redirects users to after a successful login. If an attacker can manipulate the SAML login process, they can trick users into visit...
Rand library can cause unexpected behavior with custom loggers
GHSA-cq8v-f236-94qc
The Rand library may cause unexpected behavior in certain situations. This can happen when a custom logger is used with the Rand library, and the logger tries to reseed the random number generator whi...
Rand Library in Rust Can Cause Unexpected Behavior
GHSA-cq8v-f236-94qc
Using the `rand` library in Rust with a custom logger can cause unexpected behavior when generating random numbers. This issue affects versions 0.7 to 0.9.3 and 0.10.0 of the `rand` library. To mitiga...