Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 17 April 2026
RSS277 vulnerabilities published on 17 April 2026
Severity:
CGA-rchf-99f9-9vxg
CGA-rchf-99f9-9vxg
CGA-rchf-99f9-9vxg
Apache HTTP Server: Malicious File Uploads via Incorrectly Configured CGI Scripts
CGA-r2hq-c5hj-rqc6
The Apache HTTP Server is vulnerable to a security issue that allows attackers to upload malicious files. If not properly configured, CGI scripts can be exploited, potentially leading to severe conseq...
Adobe Acrobat Reader Denial of Service Vulnerability
Adobe Acrobat Reader may crash or freeze if a specially crafted PDF file is opened. This could disrupt work and potentially allow an attacker to exploit the situation to steal sensitive information. U...
CGA-phqf-m8g3-w5cg
CGA-phqf-m8g3-w5cg
CGA-phqf-m8g3-w5cg
CGA-rm5j-hw8f-wrx7
CGA-rm5j-hw8f-wrx7
CGA-rm5j-hw8f-wrx7
CGA-mp85-55jx-x5w7
CGA-mp85-55jx-x5w7
CGA-mp85-55jx-x5w7
CGA-qqcx-grj4-992v
CGA-qqcx-grj4-992v
CGA-qqcx-grj4-992v
CGA-rpc5-4ccq-86wj
CGA-rpc5-4ccq-86wj
CGA-rpc5-4ccq-86wj
Adobe Acrobat and Reader: Uncontrolled Search Path Vulnerability
CGA-r9pc-3f2p-pf35
Adobe Acrobat and Reader have a vulnerability that can allow an attacker to execute malicious code on a victim's computer. This happens when a specially crafted PDF is opened, allowing the attacker to...
CGA-r9pc-3f2p-pf35
Apache HTTP Server: Unauthenticated Remote Code Execution
Apache's HTTP Server software has a bug that allows hackers to execute malicious code on a server without needing a password. This means that if you're using Apache's HTTP Server, you should update it...
CGA-j4qf-cwm8-w3w5
CGA-j4qf-cwm8-w3w5
CGA-pw2x-jfff-76rh
CGA-pw2x-jfff-76rh
CGA-pw2x-jfff-76rh
CGA-mfqm-xj44-2cm8
CGA-mfqm-xj44-2cm8
CGA-mfqm-xj44-2cm8
CGA-q8vx-45p9-vxp3
CGA-q8vx-45p9-vxp3
CGA-q8vx-45p9-vxp3
Adobe Acrobat Reader: File Extraction Without User Interaction Possible
CGA-jwgr-q42q-cqqw
Adobe Acrobat Reader has a security issue that could allow an attacker to extract sensitive information from a file without needing you to interact with it. This means that if you open a malicious fil...