Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 April 2026

RSS

950 vulnerabilities published on 16 April 2026

Severity:
Mako: Untrusted Files Can Be Accessed
GHSA-v92g-xgxw-vvmm
Mako's TemplateLookup can access any file readable by the process if given a specially crafted URL. This can happen if an application passes untrusted input to TemplateLookup.get_template(). To fix, u...
6.3
Arcserve UDP Console Exposes Sensitive Data to Wrong Server
CVE-2026-40118
The Arcserve UDP Console may reveal sensitive information to an unintended server if the activation server hostname is set to an invalid URL. This could potentially put sensitive data at risk. Users s...
5.1
Renovate: Bazel Manager Allows Remote Code Execution with Malicious Dependency
GHSA-5vjq-5jmg-39xq
Renovate's Bazel manager allowed a malicious dependency to execute code on your system if you used a specific feature. This has been fixed, but you should review your settings to ensure you're not vul...
6.3
Renovate Remote Code Execution Possible with Bazel Managers
GHSA-5vjq-5jmg-39xq
Renovate's Bazel module and Bazelisk managers had a vulnerability that could allow malicious code to be executed on your system if you used the lockFileMaintenance feature. This was fixed by default, ...
6.3
OnlyOffice Desktop Editors: File Access with Elevated Privileges
CVE-2026-41030
The update service in OnlyOffice Desktop Editors has a security weakness that could allow an attacker to access and modify files with elevated privileges. This could potentially lead to unauthorized c...
6.2
AdonisJS Redirects to Untrusted Sites with Malicious Links
GHSA-6qvv-pj99-48qm CVE-2026-40255
AdonisJS applications using an outdated version of the HTTP server are vulnerable to redirects to malicious sites. An attacker can trick users into visiting a fake site by manipulating the URL link. T...
6.1
GitHub OAuth Callback on zrok Allows Arbitrary Script Execution
GHSA-4fxq-2x3x-6xqx CVE-2026-40302
An attacker can trick a user into clicking a malicious link, leading to arbitrary JavaScript execution on the OAuth server. This can allow the attacker to initiate new OAuth flows or submit forms on b...
6.1
ApostropheCMS allows XSS through form and textarea elements
CVE-2026-40186 GHSA-9mrh-v2v3-xpfm
A bug in ApostropheCMS's form and textarea handling can let hackers inject malicious code into forms and text areas. This is a risk for sites using ApostropheCMS's form builders or CMS platforms. Upgr...
6.1
User Input is Not Properly Encoded in Authentication Page
CVE-2025-6024
An attacker can inject malicious scripts into the authentication page, potentially redirecting users to fake sites, manipulating the page, or stealing information. This does not allow hackers to steal...
6.1
Apache HTTP Server: Malicious Scripts Injected in Authentication
CVE-2024-10242
Apache HTTP Server's authentication endpoint doesn't properly check user input, allowing hackers to inject malicious code that can redirect users to fake sites, alter web page content, or steal inform...
6.1
Customer Reviews for WooCommerce plugin allows malicious scripts to be injected
CVE-2026-3355
The Customer Reviews for WooCommerce plugin for WordPress has a security flaw that lets attackers put malicious code on a website if a user clicks on a link. This could allow the attacker to steal sen...
6.1
CodeColorer plugin for WordPress allows attackers to inject malicious code
CVE-2026-4032
The CodeColorer WordPress plugin is at risk because attackers can inject malicious code into web pages. This could happen when a user views a page with a malicious comment. To stay safe, update the pl...
6.1
Flowise Execute Flow Node Allows Remote Access to Internal Network
GHSA-9hrv-gvrv-6gf2
The Flowise Execute Flow node in some versions of Flowise allows an attacker to trick the system into making unauthorized requests to internal network addresses, potentially exposing sensitive informa...
6.0
WSO2 Identity Server: Locked Users Can Keep Access to Protected Resources
CVE-2025-12624
A locked user account in WSO2 Identity Server can still access protected resources using previously issued access tokens. This means that a locked account can continue to access sensitive data or perf...
6.0
Eaton Intelligent Power Protector allows malicious code execution
CVE-2026-22615
The Eaton Intelligent Power Protector software has a security flaw that allows an attacker with admin access to the system to run unauthorized code. This could lead to unauthorized changes or data the...
6.0
Fastify Static Path Decoding Allows File Access Bypass
CVE-2026-6414 GHSA-x428-ghpx-8j92
The Fastify Static package incorrectly decodes path separators in URLs, allowing attackers to bypass security protections. This affects users of Fastify Static versions 8.0.0 through 9.1.0. To fix thi...
5.9
junrar: Attackers can write files to any directory
GHSA-hf5p-q87m-crj7
The junrar software has a bug that lets attackers write files to any directory on your computer if they send a special kind of RAR file. This could be used to spread malware or steal sensitive data. U...
5.9
WinRAR: Malicious Files Can Be Written to Wrong Folders
GHSA-hf5p-q87m-crj7
WinRAR has a flaw that lets attackers write files to other folders on your computer by crafting a special type of archive. This can happen if you extract a malicious RAR file in a certain way. To stay...
5.9
Oauth Server: Weak Code Verifier Allows Brute-Force Token Theft
GHSA-jhm7-29pj-4xvf
A security weakness in the Oauth server allows an attacker who intercepts an authorization code to try different code verifier values until they guess the correct one, allowing them to obtain an acces...
5.9
OAuth Server: Weak Code Verifier Allows Brute-Force Token Theft
GHSA-jhm7-29pj-4xvf
A security flaw in the OAuth server allows an attacker to steal tokens by guessing a weak code verifier. This can happen if an attacker intercepts an authorization code and tries different weak code v...
5.9
Ruby Zlib Interface Fails to Ensure Safe Data Storage
CVE-2026-27820 GHSA-g857-hhfv-j68w
A flaw in the Ruby Zlib interface can cause data to be stored in an incorrect location, potentially leading to memory corruption. This issue affects users of the affected versions who decompress data ...
5.9
AMD EPYC 9005 CPUs: Guest Data Exposure by Authorized Users
CVE-2025-54510
A security issue in AMD EPYC 9005 Series CPUs could allow a user with certain privileges to access sensitive data in a virtual environment. This could potentially happen when a user with authorized ac...
5.9
Eaton Intelligent Power Protector HTTP Header Exposes Users to Attacks
CVE-2026-22618
A security flaw in Eaton's Intelligent Power Protector software could allow hackers to launch web-based attacks. This issue has been fixed in the latest version, which is available for download. Updat...
5.9
Sparx Enterprise Architect fails to verify OAuth credentials
CVE-2025-15621
The Sparx Systems Enterprise Architect software does not properly check the identity of the recipient when sharing sensitive login credentials. This could allow an attacker to intercept and misuse the...
5.7
Eaton Intelligent Power Protector Unsecured Login Cookie Exposes User Accounts
CVE-2026-22617
The Eaton Intelligent Power Protector software uses a weak login cookie that can be intercepted by an attacker on the same network. This could allow an unauthorized person to access your account and c...
5.7